2007
DOI: 10.3844/jcssp.2007.726.735
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Based Security for Wireless Components in High Assurance Computer Systems

Abstract: Abstract:To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) architecture for high assurance computer system design of security and safety-critical multi-enclave systems to pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The layered queuing network solver, the model supports forwarding technique to clients (Barati, 2008;Bause, 1993;Wahsheh and Alves, 2007;Yang et al, 2007). The early replies are used to reduce the response time by replying to a client before all of its work at a server is completed.…”
Section: Methodsmentioning
confidence: 99%
“…The layered queuing network solver, the model supports forwarding technique to clients (Barati, 2008;Bause, 1993;Wahsheh and Alves, 2007;Yang et al, 2007). The early replies are used to reduce the response time by replying to a client before all of its work at a server is completed.…”
Section: Methodsmentioning
confidence: 99%
“…The abstracts for these publications can be found in final section of this report. Publications related to design and analysis of MILS system are filed under the following keys: Alves-Foss02a [29], Alves-Foss04a [32], Alves-Foss04b [34], Alves-Foss06a [30], ConteDeLeon02b [81], ConteDeLeon06a [82], ConteDeLeon06b [83], ConteDeLeon07a [84], Dai03a [88], Hanebutte05a [124], Harrison05a [127], Joy06a [135], Oman04a [209], Robinson07a, [221], Robinson07b [222], Robinson07c [223], Rossebo06a [227], Son06a [246], Son07a [247], Son08a [245], Taylor04a [254], Wahsheh06a [261], Wahsheh07a [262], Wahsheh07b [263], Wahsheh08a [260], Wahsheh08b [264], Wahsheh08c [265], Wang06e [267], Wang06f [266], Yang05d [274], Zhou06c [287], and Zhou08a [285].…”
Section: Computation Sequential Exponentiationmentioning
confidence: 99%
“…Significant related work regarding security policies had been reported in the literature, including our earlier work [2], [18], [19]. In this section, we focus on related policy work regarding Prolog and visualization techniques.…”
Section: Related Workmentioning
confidence: 99%