-
1
-
-
47949106447
-
The MILS architecture for high-assurance embedded systems
-
to appear
-
J. Alves-Foss, W. S. Harrison, P. Oman, and C. Taylor, "The MILS architecture for high-assurance embedded systems," The International Journal of Embedded Systems (to appear), 2005.
-
(2005)
The International Journal of Embedded Systems
-
-
Alves-Foss, J.1
Harrison, W.S.2
Oman, P.3
Taylor, C.4
-
2
-
-
12344302980
-
A multi-layered approach to security in high assurance systems
-
J. Alves-Foss, C. Taylor, and P. Oman, "A multi-layered approach to security in high assurance systems," in Proceedings of the, 37th Annual Hawaii International Conference on System Sciences (HICSS'37), 2004.
-
(2004)
Proceedings of the, 37th Annual Hawaii International Conference on System Sciences (HICSS'37)
-
-
Alves-Foss, J.1
Taylor, C.2
Oman, P.3
-
3
-
-
26044479514
-
MILS/MLS architecture for deeply embedded systems
-
M. Dransfield, W. Vanfleet, B. Beckwith, L. MacLaren, J. Luke, and B. Calloni, "MILS/MLS architecture for deeply embedded systems," in Net Centric Operations 2004, 2004.
-
(2004)
Net Centric Operations 2004
-
-
Dransfield, M.1
Vanfleet, W.2
Beckwith, B.3
MacLaren, L.4
Luke, J.5
Calloni, B.6
-
6
-
-
0020779556
-
A distributed secure system
-
J. Rushby and B. Randell, "A distributed secure system," IEEE Computer, vol. 16, no. 7, 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
-
-
Rushby, J.1
Randell, B.2
-
7
-
-
33745452515
-
Common criteria for information technology security evaluation version 2.1
-
Common Criteria Recognition Arrangement, "Common criteria for information technology security evaluation version 2.1," 2004.
-
(2004)
Common Criteria Recognition Arrangement
-
-
-
11
-
-
33745453736
-
Keeping secrets in integrated avionics, reprint
-
C. Adams, "Keeping secrets in integrated avionics, reprint," Green Hills Software, 2004.
-
(2004)
Green Hills Software
-
-
Adams, C.1
-
12
-
-
12344297027
-
Real-time software goes modular
-
September
-
B. Ames, "Real-time software goes modular," Military and Aerospace Electronics, vol. 14, September 2003.
-
(2003)
Military and Aerospace Electronics
, vol.14
-
-
Ames, B.1
-
14
-
-
0042457632
-
Survivable network analysis method
-
CMU/SEI-2000-TR-013 ESC-2000-TR-013, CMU/SEI
-
N. Mead, R. Ellison, R. Linger, T. Longstaff, and J. McHugh, "Survivable network analysis method," Tech. Rep, CMU/SEI-2000-TR-013 ESC-2000-TR-013, CMU/SEI, 2000.
-
(2000)
Tech. Rep
-
-
Mead, N.1
Ellison, R.2
Linger, R.3
Longstaff, T.4
McHugh, J.5
-
17
-
-
84957587060
-
Synchronous IPC over transparent monitors
-
T. Jaeger, J. Tidswell, A. Gefflaut, Y. Park, J. Liedkte, and K. Elphinstone, "Synchronous IPC over transparent monitors," in Proceedings of the 9th ACM Special Interest Group on Operating Systems (SIGOPS) European Workshop, 2000.
-
(2000)
Proceedings of the 9th ACM Special Interest Group on Operating Systems (SIGOPS) European Workshop
-
-
Jaeger, T.1
Tidswell, J.2
Gefflaut, A.3
Park, Y.4
Liedkte, J.5
Elphinstone, K.6
-
19
-
-
4644303349
-
Network pump (NP) security target
-
Naval Research Laboratory
-
A. Moore, "Network pump (NP) security target," Tech. Rep. NRL/MR/5540-00-8459, Naval Research Laboratory, 2000.
-
(2000)
Tech. Rep.
, vol.NRL-MR-5540-00-8459
-
-
Moore, A.1
-
22
-
-
84858891384
-
-
"Integrity-178b RTOS." http://www.ghs.com/products/ safety_critical/integrity-do-178b.html, 2004.
-
(2004)
Integrity-178b RTOS
-
-
|