메뉴 건너뛰기




Volumn 2, Issue 3-4, 2006, Pages 239-247

The MILS architecture for high-assurance embedded systems

Author keywords

high assurance; MILS; MLS; multi level secure

Indexed keywords


EID: 84949686528     PISSN: 17411068     EISSN: 17411076     Source Type: Journal    
DOI: 10.1504/ijes.2006.014859     Document Type: Article
Times cited : (119)

References (27)
  • 3
    • 0026154766 scopus 로고
    • Verification of secure distributed systems in higher order logic: a modular approach using generic components
    • Oakland, CA
    • Alves-Foss, J. and Levitt, K. (1991) ‘Verification of secure distributed systems in higher order logic: a modular approach using generic components’, Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp.122–135.
    • (1991) Proc. IEEE Symposium on Research in Security and Privacy , pp. 122-135
    • Alves-Foss, J.1    Levitt, K.2
  • 5
    • 12344297027 scopus 로고    scopus 로고
    • Real-time software goes modular
    • September
    • Ames, B. (2003) ‘Real-time software goes modular’, Military and Aerospace Electronics, September, Vol. 14, No. 9.
    • (2003) Military and Aerospace Electronics , vol.14 , Issue.9
    • Ames, B.1
  • 6
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Tech. Rep. ESD-TR-73–51, October, Bedford, Mass
    • Anderson, J. (1972) ‘Computer security technology planning study’, USAF Electronic Systems Div., Tech. Rep. ESD-TR-73–51, October, Bedford, Mass.
    • (1972) USAF Electronic Systems Div.
    • Anderson, J.1
  • 11
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • Oakland, CA
    • McCullough, D. (1988a) ‘Noninterference and the composability of security properties’, Proc. IEEE Symposium on Security and Privacy, Oakland, CA, pp.177–187.
    • (1988) Proc. IEEE Symposium on Security and Privacy , pp. 177-187
    • McCullough, D.1
  • 16
    • 0020273088 scopus 로고
    • Proof of separability: a verification technique for a class of security kernels
    • Lecture Notes in Computer Science, Torino, Italy
    • Rushby, J. (1982) ‘Proof of separability: a verification technique for a class of security kernels’, Proc. International Symposium on Programming, Lecture Notes in Computer Science, Torino, Italy, Vol. 137, pp.352–367.
    • (1982) Proc. International Symposium on Programming , vol.137 , pp. 352-367
    • Rushby, J.1
  • 17
    • 0020779556 scopus 로고
    • A distributed secure system
    • Rushby, J. and Randell, B. (1983) ‘A distributed secure system’, IEEE Computer, Vol. 16, No. 7, pp.55–67.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Saltzer, J. and Schroeder, M. (1975) ‘The protection of information in computer systems’, Proceedings of the IEEE, September, Vol. 63, No. 9, pp.1278–1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 19
    • 0026851778 scopus 로고
    • BLACKER: Security for the DDN examples of A1 security engineering trades
    • Oakland, CA
    • Weissman, C. (1992) ‘BLACKER: Security for the DDN examples of A1 security engineering trades’, Proc. IEEE Symposium on Research in Security and PrivacyOakland, CA, pp.286–292.
    • (1992) Proc. IEEE Symposium on Research in Security and Privacy , pp. 286-292
    • Weissman, C.1
  • 21
    • 84949687910 scopus 로고    scopus 로고
    • Software considerations in airborne systems and equipment certification (RTCA DO-178b), RTCA Std., December 1992
    • Software considerations in airborne systems and equipment certification (RTCA DO-178b), RTCA Std., December 1992.
  • 22
    • 84949687911 scopus 로고    scopus 로고
    • Requirements specification for Avionics Computer Resource (ACR) (RTCA DO-255), RTCA Std., June 2000
    • Requirements specification for Avionics Computer Resource (ACR) (RTCA DO-255), RTCA Std., June 2000.
  • 23
    • 84949687912 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation, Version 2.1, common criteria project sponsoring organisation std., August 1999
    • Common criteria for information technology security evaluation, Version 2.1, common criteria project sponsoring organisation std., August 1999.
  • 24
    • 84949687913 scopus 로고    scopus 로고
    • Avionic application software standard interface (Draft 3 of Supplement 1) (Specification ARINC 653), ARINC Std., 2003
    • Avionic application software standard interface (Draft 3 of Supplement 1) (Specification ARINC 653), ARINC Std., 2003.
  • 25
    • 84949687914 scopus 로고    scopus 로고
    • Department of defense trusted computer system evaluation criteria, department of defense computer security center std. DoD 5200.28-STD, December 1985
    • Department of defense trusted computer system evaluation criteria, department of defense computer security center std. DoD 5200.28-STD, December 1985.
  • 26
    • 84949687915 scopus 로고    scopus 로고
    • The partitioning kernel protection profile, the open group, June 2003, draft under review
    • The partitioning kernel protection profile, the open group, June 2003, draft under review.
  • 27
    • 84949687916 scopus 로고    scopus 로고
    • In general, MILS inter-partition communication may occur through any verified communication channel offered through the kernel
    • In general, MILS inter-partition communication may occur through any verified communication channel offered through the kernel.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.