Mobility

Policy-Based Security for Wireless Components in High Assurance Computer Systems

Download Now Free registration required

Executive Summary

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. The authors' research explains how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) architecture for high assurance computer system design of security and safety-critical multi-enclave systems to provide a framework for supporting the enforcement of diverse security multi-policies.

  • Format: PDF
  • Size: 115.48 KB