A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
English
2014
International Journal of Innovative Research in Computer and Communication Engineering
English
Existing MAC solutions belongs to authorization mechanism however authorization mechanism along is not sufficient for achieving system assurance. ...
In order to demonstrate the application of Process Authentication proposed System Call monitoring framework for preventing unauthorized use or access of system resources like HDD, RAM. ...
Hence Operating System level secure computing is now playing critical role for high assurance systems. ...
doi:10.15680/ijircce.2014.0212045
fatcat:k3ehxiyk6jhsxnsvl6mdwmbzie
SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor
2016
MILCOM 2016 - 2016 IEEE Military Communications Conference
In this paper, we present a SHAMROCK (Synthesizable High Assurance Management/Reservation/ Operation of Cryptography and Keys) coprocessor. ...
For performance, maintainability and usability, military communications systems must properly integrate and coordinate cryptographic primitives and use adequate key management schemes. ...
High-assurance is an important goal of many military systems. ...
doi:10.1109/milcom.2016.7795301
dblp:conf/milcom/WhelihanVUKGAGG16
fatcat:3qg7inmq4zgjldakn3f3xeftui
A Roadmap for High Assurance Cryptography
[chapter]
2018
Lecture Notes in Computer Science
In detail, we outline the need for a suite of high-assurance cryptographic software with per-microarchitecture optimizations that maintain competitive speeds with existing hand-optimized assembly and the ...
We outline the steps needed to move from low-assurance cryptography, as given by libraries such as OpenSSL, to high assurance cryptography in deployment. ...
Harry Halpin would like to thank Peter Schwabe for many of the original ideas in this paper and for some of the text itself, while taking sole responsibility for any lack of clarity or problems with this ...
doi:10.1007/978-3-319-75650-9_6
fatcat:fxwimrpesjddnjfvflveuqbz2q
Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures
2007
10th IEEE High Assurance Systems Engineering Symposium (HASE'07)
Finally the requirements for a high assurance framework to manage the lifecycle of applications and services deployed within such SOA based Grid infrastructures is presented. ...
Recently, SOA based Grid infrastructure has emerged as a viable commercial alternatives to expensive dedicated high assurance IT systems, especially within the Finance sector. ...
As a result, solutions to provide end-to-end high assurance systems capable of supporting the lifecycle of applications and services deployed within SOA based grid infrastructures are immature. ...
doi:10.1109/hase.2007.45
dblp:conf/hase/DonachyPHS07
fatcat:yca65wdcynhizkcqx3cf4ye5he
In Search For A Simple Secure Protocol For Safety-Critical High-Assurance Applications
2018
International Conference on High Performance Embedded Architectures and Compilers
In this work-in-progress publication we discuss, how this evolution has greatly improved the situation for critical systems, and how the architecture of MILS systems can raise the confidence for high-assurance ...
systems. ...
This publication summarizes the findings selecting state of the art methods and algorithms leading to a certifiable cryptographic component for a high-assurance MILS system. ...
doi:10.5281/zenodo.1306101
dblp:conf/hipeac/SchulzGT18
fatcat:34evwiaifnh4dpp4cvukek73y4
An Approach to Security Requirements Engineering for a High Assurance System *
2002
Requirements Engineering
Requirements specifications for high assurance secure systems are rare in the open literature. ...
The system is designed to be secure, yet combines popular commercial components with specialized high assurance ones. Functional and non-functional requirements pertinent to security are discussed. ...
Luqi for useful discussions of the requirements engineering process. The authors are grateful to their U.S. Navy and government sponsors for their support of this research. ...
doi:10.1007/s007660200015
fatcat:652zihg3nfcdpaazyyu2e2ajom
Towards a High Assurance Secure Computing Platform
2007
10th IEEE High Assurance Systems Engineering Symposium (HASE'07)
Existing commodity operating systems alone do not satisfy the robust requirements of a general purpose, high assurance, secure computing platform. ...
This paper presents the Trusted Ring Framework, a software architecture that provides a foundation from which to host security services that enhance the security of a commodity operating system. ...
Such systems would provide a user-friendly operating environment while simultaneously providing high assurance in the strong enforcement of the platform's security policy. ...
doi:10.1109/hase.2007.25
dblp:conf/hase/DiRossi07
fatcat:a3umhxresvgzro7csxdy3yf6ai
The Caernarvon secure embedded operating system
2008
ACM SIGOPS Operating Systems Review
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. ...
The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance. ...
INTRODUCTION The goal of this paper is to describe a high assurance embedded operating system developed in anticipation of a market need for secure, multi-application devices running arbitrary, field-downloadable ...
doi:10.1145/1341312.1341320
fatcat:jnwsn7ikubbtllr44mqnrkpgtu
Implementing a High-Assurance Smart-Card OS
[chapter]
2010
Lecture Notes in Computer Science
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. ...
We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions ...
We must also thank Wietse Venema for his very useful suggestions on improving the paper. ...
doi:10.1007/978-3-642-14577-3_7
fatcat:dsompuuwubbb5ou74inch2evqa
Crypto-integrity
[chapter]
2002
Lecture Notes in Computer Science
In order to enable the inclusion of cryptographic components in the future infrastructure and within future applications, it is argued that assurance of their (secure) operation has to be provided and ...
We review the need for crypto-integrity in various known settings, ways to implement it based on known protocol techniques as well as potential future directions. ...
Another similar application is the international key escrow game. ...
doi:10.1007/3-540-36178-2_35
fatcat:w4ydprherzawlc3zynft2sr7ve
Protecting Data in Modern Computing Devices
2016
International Journal Of Engineering And Computer Science
The modern era is moving towards computing devices that have a high degree of mobility. ...
High Assurance Boot The Operating System in computing device for booting is to be protected from unauthorized modifications. ...
The IITM tablet has a tamper detection mechanism, high assurance secure boot, encrypted file system support. This makes it as a perfect lab platform for developing secure systems. ...
doi:10.18535/ijecs/v5i6.33
fatcat:qnywwamfbze3pahzqs34tfs3pa
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
[chapter]
2003
Lecture Notes in Computer Science
for the operating system to protect one application from another. ...
This paper presents an authentication protocol for highassurance smart card operating systems that support download of mutually suspicious applications. ...
We also thank Philips Semiconductors for their continuing support. Finally, we thank the anonymous reviewers of the program committee and Yves Deswarte for their suggested improvements to the paper. ...
doi:10.1007/978-3-540-39650-5_11
fatcat:qhsdwewlsze6hpjnpzuvliy7kq
Using Models at Runtime to Address Assurance for Self-Adaptive Systems
[chapter]
2014
Lecture Notes in Computer Science
We then outline key research challenges for assurance at runtime and characterize assurance methods. ...
The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance. ...
Thus, a key challenge for the software engineering community is to develop runtime assurance techniques for self-adaptive systems that provide high performance, high confidence, and reconfigurable operation ...
doi:10.1007/978-3-319-08915-7_4
fatcat:kux6b5ye2fd4pnlqyop3oog6pa
Using Models at Runtime to Address Assurance for Self-Adaptive Systems
[article]
2015
arXiv
pre-print
We then outline key research challenges for assurance at runtime and characterize assurance methods. ...
The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance. ...
Thus, a key challenge for the software engineering community is to develop runtime assurance techniques for self-adaptive systems that provide high performance, high confidence, and reconfigurable operation ...
arXiv:1505.00903v1
fatcat:kjfxpuizhjaadm4ialw4nmeldq
Cover feature - A trusted open platform
2003
Computer
A Trusted Open Platform Microsoft's next-generation secure computing base extends personal computers to offer mechanisms that let high-assurance software protect itself from the operating systems, device ...
NGSCB platforms isolate operating systems and processes and implement hardware and software security primitives. ...
One or more other systems could be dedicated to providing high-assurance execution environments. ...
doi:10.1109/mc.2003.1212691
fatcat:mqhi2n62nbepvcgzvbucvjo2ua
« Previous
Showing results 1 — 15 out of 437,439 results