General Dynamics cross-domain technologies have revolutionized the computer users’ access to sensitive information.
4Secure is the leading provider of cross-domain and data diode network cybersecurity solutions across Governments, Defence, and Critical Infrastructure.
Figure 1 shows a traditional cross-domain solution deployment between two security domains. Security Domain A is connected to Security Domain B using a CDS. If the CDS is an OWT device, resources deployed in Network A can communicate to resources deployed in Network B by sending dat...
Chandersekaran, C., Simpson, W., Trice, A.: Cross-Domain Solutions in an Era of Information Sharing. In: The 1st International Multi-Conference on Engineering and Technological Innovation: IMET2008, Orlando, FL, vol. I, pp. 313–318 (June 2008)...
applications between multiple (3+) domains. There is also a special case of Transfer Solution known as a Multi-Level Security CDS, which uses mandatory labeling to store data at different classifications and allows users to query and retrieve the data based upon their security domain and ...
Systems and methods for providing a cross-domain, remote terminal secure browse capability are disclosed. The Collaborate-Access-Browse (CAB) Cross-Domain Solution (CDS) enables high-side users to browse low-side material with the same privileges as any other low-side user. The Assured File Tran...
Cross-Domain Solutions: An information assurance solution that provides the ability to manually and/or automatically access and/or transfer between two or more differing security domains. (CDS) are integrated systems of hardware and software that enable transfer of information among incompatible security...
Or a system or user within one security domain needs to communicate directly or obtain data from a system or user in a separate security domain. For security domains with highly sensitive data, organizations can deploy a cross-domain solution (CDS) to allow data transfer between security domains...
Yu Zheng.Methodologies for Cross-Domain Data Fusion: An Overview(opens in new tab). IEEE Transactions on Big Data, vol. 1, no. 1. 2015. 2. The Stage-Based Data Fusion Methods This category of methods uses different datasets at the different stages of a data mining task. So, different ...
Cross-domain security for data vault is described. At least one database is accessible from a plurality of network domains, each network domain having