Objective
This project addressed the area of security and integrity in office systems in order to make substantial and innovative proposals to deal with the needs of future office systems. The objectives of the project were to:
-study the current nature of security threats and examine state-of-the-art countermeasures in office information systems
-develop a security model for an office information system, with particular emphasis on the banking environment
-produce guidelines for implementing standards for secure office information systems, again emphasising banking
-specify the requirements for a key-management centre and end-user security facilities.
MARS produced a comprehensive description of possible threats and risk-analysis methods and the ways and means of implementing appropriate safeguards. Two security models were developed and guidelines produced.
The security models comprise a workstations model and a communication model. Based on a component/countermeasures matrix with eight different levels of security, the workstation security model supports the implementation of security measures by analysing the workstation into its component parts and determining the countermeasures needed. The communication model supports the design and the tests by providing a medium through which the results of the design can be expressed.
Together with the models, the guidelines promote the implementation of security in office automation systems by supplying precisely defined recommendations in the areas of access control, workstations, encryption and auditing.
In the last phase of the project work was directed towards applying the models and recommendations to an existing office application requiring a high level of security in order to define requirements and design specifications. The security system was specified around an ISO/OSI architecture that clearly specifies the components and protocol layers. End-User Security Facilities (EUSFs) protect both the application interfacing to the user and the transport layer in the communications system by using the services provided by a Key-Management Centre (KMC).
The key-management facilities have been based on a three-level hierarchy using symmetrical keys for confidentiality and data integrity. Asymmetrical keys have been specified for authentication, non-repudiation and key management. A security officer appointed in each branch should handle the local security management, and personal chipcards would be used in the identification process.
The EUSFs are viewed as integrated parts of the workstations and the front-end processors and would consist of hardware in a cryptobox as well as software running on the processor. Based on public keys, the system design anticipates for the future by allowing users registered by the KMC to set up secure communications by the automatic exchange of secret keys.
Exploitation
The requirements and design specifications, together with the enhanced ability to specify and design secure systems, will have a very positive impact on the reliability of future secure office systems. The project has clearly shown the importance of well-defined and standardised security facilities and has demonstrated how these can be integrated into the systems themselves. The results from the project support the development of secure office systems from European manufacturers, and provides input for further standardisation in the area.
Fields of science (EuroSciVoc)
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
- engineering and technology electrical engineering, electronic engineering, information engineering electronic engineering control systems
- natural sciences computer and information sciences computer security access control
- natural sciences computer and information sciences internet transport layer
- natural sciences computer and information sciences computer security cryptography
- social sciences sociology industrial relations automation
You need to log in or register to use this function
Programme(s)
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
Topic(s)
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Data not available
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Call for proposal
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
Data not available
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
Funding Scheme
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
Data not available
Coordinator
1049 BRUXELLES
Belgium
The total costs incurred by this organisation to participate in the project, including direct and indirect costs. This amount is a subset of the overall project budget.