{"id":"https://openalex.org/W4205578031","doi":"https://doi.org/10.1109/milcom52596.2021.9652903","title":"vCDS: A Virtualized Cross Domain Solution Architecture","display_name":"vCDS: A Virtualized Cross Domain Solution Architecture","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W4205578031","doi":"https://doi.org/10.1109/milcom52596.2021.9652903"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652903","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028082559","display_name":"Nathan Daughety","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089612","display_name":"United States Air Force","ror":"https://ror.org/006gmme17","country_code":"US","type":"government","lineage":["https://openalex.org/I1330347796","https://openalex.org/I4210089612","https://openalex.org/I4210102105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nathan Daughety","raw_affiliation_strings":["90th COS United States Air Force, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"90th COS United States Air Force, San Antonio, USA","institution_ids":["https://openalex.org/I4210089612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023559211","display_name":"Marcus Pendleton","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089612","display_name":"United States Air Force","ror":"https://ror.org/006gmme17","country_code":"US","type":"government","lineage":["https://openalex.org/I1330347796","https://openalex.org/I4210089612","https://openalex.org/I4210102105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marcus Pendleton","raw_affiliation_strings":["90th COS United States Air Force, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"90th COS United States Air Force, San Antonio, USA","institution_ids":["https://openalex.org/I4210089612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019179799","display_name":"Shouhuai Xu","orcid":"https://orcid.org/0000-0001-8034-0942"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shouhuai Xu","raw_affiliation_strings":["University of Col. Col. Springs,Dept. of Computer Science,Colorado Springs,USA"],"affiliations":[{"raw_affiliation_string":"University of Col. Col. Springs,Dept. of Computer Science,Colorado Springs,USA","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042072991","display_name":"Laurent Njilla","orcid":"https://orcid.org/0000-0001-8902-7418"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurent Njilla","raw_affiliation_strings":["Air Force Research Laboratory, Cyber Assurance Branch, Rome, USA"],"affiliations":[{"raw_affiliation_string":"Air Force Research Laboratory, Cyber Assurance Branch, Rome, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104029655","display_name":"John Franco","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Franco","raw_affiliation_strings":["University of Cincinnati,Dept. of E.E. and C.S.,Cincinnati,USA"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Dept. of E.E. and C.S.,Cincinnati,USA","institution_ids":["https://openalex.org/I63135867"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.198,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.450845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":67,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"68"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5719611},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security Policy","score":0.47291383},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.45523244},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.41765833},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.41170877}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7753669},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.70489925},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.68011326},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.659132},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5952028},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5719611},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.51239973},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5037667},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.49952006},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.47780043},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.47291383},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.45523244},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.41765833},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.41170877},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3732929},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3447069},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.23772538},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15768862},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09668848},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652903","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"2122631,1814825,2115134"},{"funder":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office","award_id":"W911NF-17-1-0566"}],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1491597649","https://openalex.org/W1502982454","https://openalex.org/W1559498407","https://openalex.org/W1996475033","https://openalex.org/W203302081","https://openalex.org/W2035142022","https://openalex.org/W2052801306","https://openalex.org/W2083854694","https://openalex.org/W2098592421","https://openalex.org/W2106066346","https://openalex.org/W2147334802","https://openalex.org/W2152353077","https://openalex.org/W2155146646","https://openalex.org/W2163347957","https://openalex.org/W2775584553","https://openalex.org/W2893106650","https://openalex.org/W2911663673","https://openalex.org/W2951708793","https://openalex.org/W2962754566","https://openalex.org/W307802606","https://openalex.org/W3101233422","https://openalex.org/W4236786653","https://openalex.org/W791694307"],"related_works":["https://openalex.org/W2373668370","https://openalex.org/W2354489789","https://openalex.org/W2348106919","https://openalex.org/W2164954154","https://openalex.org/W2161017395","https://openalex.org/W2142520924","https://openalex.org/W2111290067","https://openalex.org/W2035636390","https://openalex.org/W2006426112","https://openalex.org/W1571551520"],"abstract_inverted_index":{"With":[0],"the":[1,38,63,66,127,151,182,193,227,240],"paradigm":[2,183],"shift":[3,184],"to":[4,11,36,82,107,150,185,191,212,229,245,254],"cloud-based":[5,261],"operations,":[6],"reliable":[7],"and":[8,12,68,92,102,132,145,178,210],"secure":[9,39],"access":[10,40],"transfer":[13,42],"of":[14,43,65,112,142,195,242],"data":[15,44],"between":[16,45,129],"differing":[17,48],"security":[18,49,55,59,74,160],"domains":[19,50],"has":[20],"never":[21],"been":[22],"more":[23,163],"essential.":[24],"A":[25],"Cross":[26,57],"Domain":[27],"Solution":[28],"(CDS)":[29],"is":[30,190,226,239],"a":[31,73,202,220,231,247],"guarded":[32],"interface":[33],"which":[34,71,97,225,250],"serves":[35],"execute":[37],"and/or":[41,47],"isolated":[46,170],"defined":[51],"by":[52,140],"an":[53],"administrative":[54],"policy.":[56,75],"domain":[58],"requires":[60],"trustworthiness":[61,197],"at":[62],"confluence":[64],"hardware":[67],"software":[69],"components":[70,77],"implement":[72],"Security":[76],"must":[78],"be":[79,99,199,255],"relied":[80],"upon":[81],"defend":[83],"against":[84],"widely":[85],"encompassing":[86],"threats":[87,91],"\u2013":[88,106],"consider":[89],"insider":[90],"nation":[93],"state":[94],"threat":[95,104],"actors":[96,105],"can":[98,198],"both":[100],"onsite":[101],"offsite":[103],"information":[108],"assurance.":[109],"Current":[110],"implementations":[111],"CDS":[113,205,222,237,253],"systems":[114],"use":[115,230,259],"suboptimal":[116],"Trusted":[117],"Computing":[118],"Bases":[119],"(TCB)":[120],"without":[121],"any":[122],"formal":[123],"verification":[124],"proofs,":[125],"confirming":[126],"gap":[128],"blind":[130],"trust":[131],"trustworthiness.":[133],"Moreover,":[134],"most":[135],"CDSs":[136,164],"are":[137,146,155,165,179],"exclusively":[138],"operated":[139],"Department":[141],"Defense":[143],"agencies":[144],"not":[147],"readily":[148],"available":[149,157],"commercial":[152],"sectors,":[153],"nor":[154],"they":[156],"for":[158,258],"independent":[159],"verification.":[161],"Still,":[162],"only":[166],"usable":[167],"in":[168,201,260],"physically":[169],"environments":[171],"such":[172],"as":[173],"Sensitive":[174],"Compartmented":[175],"Information":[176],"Facilities":[177],"inconsistent":[180],"with":[181],"cloud":[186],"environments.":[187],"Our":[188],"purpose":[189],"address":[192],"question":[194],"how":[196],"implemented":[200],"remotely":[203,256],"deployable":[204,257],"that":[206],"also":[207],"supports":[208],"availability":[209],"accessibility":[211],"all":[213],"sectors.":[214],"In":[215],"this":[216],"paper,":[217],"we":[218],"present":[219],"novel":[221],"system":[223],"architecture":[224],"first":[228,241],"formally":[232],"verified":[233],"TCB.":[234],"Additionally,":[235],"our":[236,252],"model":[238],"its":[243],"kind":[244],"utilize":[246],"computation-isolation":[248],"approach":[249],"allows":[251],"solutions.":[262]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4205578031","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-18T04:50:45.014860","created_date":"2022-01-26"}