Filters








437,439 Hits in 6.4 sec

Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
English

Pradnya Patil, Shubham Joshi
2014 International Journal of Innovative Research in Computer and Communication Engineering  
Existing MAC solutions belongs to authorization mechanism however authorization mechanism along is not sufficient for achieving system assurance.  ...  In order to demonstrate the application of Process Authentication proposed System Call monitoring framework for preventing unauthorized use or access of system resources like HDD, RAM.  ...  Hence Operating System level secure computing is now playing critical role for high assurance systems.  ... 
doi:10.15680/ijircce.2014.0212045 fatcat:k3ehxiyk6jhsxnsvl6mdwmbzie

SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor

David Whelihan, Michael Vai, Dan Utin, Roger Khazan, Karen Gettings, Tom Anderson, Antonio Godfrey, Raymond Govotski, Mark Yeager, Brendon Chetwynd, Ben Nahill, Eric Koziel
2016 MILCOM 2016 - 2016 IEEE Military Communications Conference  
In this paper, we present a SHAMROCK (Synthesizable High Assurance Management/Reservation/ Operation of Cryptography and Keys) coprocessor.  ...  For performance, maintainability and usability, military communications systems must properly integrate and coordinate cryptographic primitives and use adequate key management schemes.  ...  High-assurance is an important goal of many military systems.  ... 
doi:10.1109/milcom.2016.7795301 dblp:conf/milcom/WhelihanVUKGAGG16 fatcat:3qg7inmq4zgjldakn3f3xeftui

A Roadmap for High Assurance Cryptography [chapter]

Harry Halpin
2018 Lecture Notes in Computer Science  
In detail, we outline the need for a suite of high-assurance cryptographic software with per-microarchitecture optimizations that maintain competitive speeds with existing hand-optimized assembly and the  ...  We outline the steps needed to move from low-assurance cryptography, as given by libraries such as OpenSSL, to high assurance cryptography in deployment.  ...  Harry Halpin would like to thank Peter Schwabe for many of the original ideas in this paper and for some of the text itself, while taking sole responsibility for any lack of clarity or problems with this  ... 
doi:10.1007/978-3-319-75650-9_6 fatcat:fxwimrpesjddnjfvflveuqbz2q

Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures

P C Donachy, R H Perrott, T J Harmer, F Sharkey
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
Finally the requirements for a high assurance framework to manage the lifecycle of applications and services deployed within such SOA based Grid infrastructures is presented.  ...  Recently, SOA based Grid infrastructure has emerged as a viable commercial alternatives to expensive dedicated high assurance IT systems, especially within the Finance sector.  ...  As a result, solutions to provide end-to-end high assurance systems capable of supporting the lifecycle of applications and services deployed within SOA based grid infrastructures are immature.  ... 
doi:10.1109/hase.2007.45 dblp:conf/hase/DonachyPHS07 fatcat:yca65wdcynhizkcqx3cf4ye5he

In Search For A Simple Secure Protocol For Safety-Critical High-Assurance Applications

Thorsten Schulz, Frank Golatowski, Dirk Timmermann
2018 International Conference on High Performance Embedded Architectures and Compilers  
In this work-in-progress publication we discuss, how this evolution has greatly improved the situation for critical systems, and how the architecture of MILS systems can raise the confidence for high-assurance  ...  systems.  ...  This publication summarizes the findings selecting state of the art methods and algorithms leading to a certifiable cryptographic component for a high-assurance MILS system.  ... 
doi:10.5281/zenodo.1306101 dblp:conf/hipeac/SchulzGT18 fatcat:34evwiaifnh4dpp4cvukek73y4

An Approach to Security Requirements Engineering for a High Assurance System *

Cynthia E. Irvine, Timothy Levin, Jeffery D. Wilson, David Shifflett, Barbara Pereira
2002 Requirements Engineering  
Requirements specifications for high assurance secure systems are rare in the open literature.  ...  The system is designed to be secure, yet combines popular commercial components with specialized high assurance ones. Functional and non-functional requirements pertinent to security are discussed.  ...  Luqi for useful discussions of the requirements engineering process. The authors are grateful to their U.S. Navy and government sponsors for their support of this research.  ... 
doi:10.1007/s007660200015 fatcat:652zihg3nfcdpaazyyu2e2ajom

Towards a High Assurance Secure Computing Platform

Michael D. DiRossi
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
Existing commodity operating systems alone do not satisfy the robust requirements of a general purpose, high assurance, secure computing platform.  ...  This paper presents the Trusted Ring Framework, a software architecture that provides a foundation from which to host security services that enhance the security of a commodity operating system.  ...  Such systems would provide a user-friendly operating environment while simultaneously providing high assurance in the strong enforcement of the platform's security policy.  ... 
doi:10.1109/hase.2007.25 dblp:conf/hase/DiRossi07 fatcat:a3umhxresvgzro7csxdy3yf6ai

The Caernarvon secure embedded operating system

David C. Toll, Paul A. Karger, Elaine R. Palmer, Suzanne K. McIntosh, Sam Weber
2008 ACM SIGOPS Operating Systems Review  
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable.  ...  The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance.  ...  INTRODUCTION The goal of this paper is to describe a high assurance embedded operating system developed in anticipation of a market need for secure, multi-application devices running arbitrary, field-downloadable  ... 
doi:10.1145/1341312.1341320 fatcat:jnwsn7ikubbtllr44mqnrkpgtu

Implementing a High-Assurance Smart-Card OS [chapter]

Paul A. Karger, David C. Toll, Elaine R. Palmer, Suzanne K. McIntosh, Samuel Weber, Jonathan W. Edwards
2010 Lecture Notes in Computer Science  
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges.  ...  We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions  ...  We must also thank Wietse Venema for his very useful suggestions on improving the paper.  ... 
doi:10.1007/978-3-642-14577-3_7 fatcat:dsompuuwubbb5ou74inch2evqa

Crypto-integrity [chapter]

Moti Yung
2002 Lecture Notes in Computer Science  
In order to enable the inclusion of cryptographic components in the future infrastructure and within future applications, it is argued that assurance of their (secure) operation has to be provided and  ...  We review the need for crypto-integrity in various known settings, ways to implement it based on known protocol techniques as well as potential future directions.  ...  Another similar application is the international key escrow game.  ... 
doi:10.1007/3-540-36178-2_35 fatcat:w4ydprherzawlc3zynft2sr7ve

Protecting Data in Modern Computing Devices

M. Suganiya, Dr. A. Pravin
2016 International Journal Of Engineering And Computer Science  
The modern era is moving towards computing devices that have a high degree of mobility.  ...  High Assurance Boot The Operating System in computing device for booting is to be protected from unauthorized modifications.  ...  The IITM tablet has a tamper detection mechanism, high assurance secure boot, encrypted file system support. This makes it as a perfect lab platform for developing secure systems.  ... 
doi:10.18535/ijecs/v5i6.33 fatcat:qnywwamfbze3pahzqs34tfs3pa

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card [chapter]

Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
2003 Lecture Notes in Computer Science  
for the operating system to protect one application from another.  ...  This paper presents an authentication protocol for highassurance smart card operating systems that support download of mutually suspicious applications.  ...  We also thank Philips Semiconductors for their continuing support. Finally, we thank the anonymous reviewers of the program committee and Yves Deswarte for their suggested improvements to the paper.  ... 
doi:10.1007/978-3-540-39650-5_11 fatcat:qhsdwewlsze6hpjnpzuvliy7kq

Using Models at Runtime to Address Assurance for Self-Adaptive Systems [chapter]

Betty H. C. Cheng, Kerstin I. Eder, Martin Gogolla, Lars Grunske, Marin Litoiu, Hausi A. Müller, Patrizio Pelliccione, Anna Perini, Nauman A. Qureshi, Bernhard Rumpe, Daniel Schneider, Frank Trollmann (+1 others)
2014 Lecture Notes in Computer Science  
We then outline key research challenges for assurance at runtime and characterize assurance methods.  ...  The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance.  ...  Thus, a key challenge for the software engineering community is to develop runtime assurance techniques for self-adaptive systems that provide high performance, high confidence, and reconfigurable operation  ... 
doi:10.1007/978-3-319-08915-7_4 fatcat:kux6b5ye2fd4pnlqyop3oog6pa

Using Models at Runtime to Address Assurance for Self-Adaptive Systems [article]

Betty Cheng, Kerstin Eder, Martin Gogolla, Lars Grunske, Marin Litoiu, Hausi Müller, Patrizio Pelliccione, Anna Perini, Nauman Qureshi, Bernhard Rumpe, Daniel Schneider, Frank Trollmann, Norha Villegas
2015 arXiv   pre-print
We then outline key research challenges for assurance at runtime and characterize assurance methods.  ...  The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance.  ...  Thus, a key challenge for the software engineering community is to develop runtime assurance techniques for self-adaptive systems that provide high performance, high confidence, and reconfigurable operation  ... 
arXiv:1505.00903v1 fatcat:kjfxpuizhjaadm4ialw4nmeldq

Cover feature - A trusted open platform

P. England, B. Lampson, J. Manferdelli, M. Peinado, B. Willman
2003 Computer  
A Trusted Open Platform Microsoft's next-generation secure computing base extends personal computers to offer mechanisms that let high-assurance software protect itself from the operating systems, device  ...  NGSCB platforms isolate operating systems and processes and implement hardware and software security primitives.  ...  One or more other systems could be dedicated to providing high-assurance execution environments.  ... 
doi:10.1109/mc.2003.1212691 fatcat:mqhi2n62nbepvcgzvbucvjo2ua
« Previous Showing results 1 — 15 out of 437,439 results