The MILS architecture for high-assurance embedded systems

نویسندگان

  • Jim Alves-Foss
  • Paul W. Oman
  • Carol Taylor
  • Scott Harrison
چکیده

High-assurance systems require a level of rigor, in both design and analysis, not typical of conventional systems. This paper provides an overview of the Multiple Independent Levels of Security and Safety (MILS) approach to high-assurance system design for security and safety critical embedded systems. MILS enables the development of a system using manageable units, each of which can be analyzed separately, avoiding costly analysis required of more conventional designs. MILS is particularly well suited to embedded systems that must provide guaranteed safety or security properties.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Evaluation and Certification Scheme for MILS

Over the past decade there has been steady activity and progress associated with MILS, a modular or “compositional” approach to the design and assurance of dependable systems [BDRS08, AFHOT06, VBC+05]. The idea is that the assured properties of MILS components have a form that allows the assurance of a MILS system to be based largely on that of its components [Rus08]. A coalition of vendors, go...

متن کامل

Separation and Integration in MILS (The MILS Constitution)

We describe the MILS approach to design, construction, integration, and evaluation of secure systems. The crucial feature of the MILS approach is that it separates the problems of enforcing security policy from those of securely sharing resources. MILS design proceeds in two steps: first, we develop a logical security policy architecture in which the system is deconstructed into interacting com...

متن کامل

A Formal Model for MILS Integration

The central artifact in a MILS system is its policy architecture. This identifies the logical components of the system and their channels for communications, and specifies which components are trusted. The components of the policy architecture are logically separate but may share physical resources under the control of trusted resource-sharing components, such as separation kernels or partition...

متن کامل

Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems

One fundamental key to successful implementation of secure high assurance computer systems is the design and implementation of security policies. For systems enforcing multiple concurrent policies, the design and implementation is a challenging and difficult task. To simplify this task, we present an Inter-Enclave Multi-Policy (IEMP) paradigm for information access of the Multiple Independent L...

متن کامل

Policy-Based Security for Wireless Components in High Assurance Computer Systems

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJES

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2006