Trusted Computing Exemplar Project
Irvine, Cynthia E.
Levin, Timothy E.Nguyen, Thuy D.
Dinolt, George W.
Center for Information Systems Security Studies and Research (CISR)
MetadataShow full item record
The science and discipline of trusted computing has been neglected for well over a decade. We lack the availability of high assurance trusted systems, developers who can create these systems, as well as public domain worked examples upon which new projects could be modeled. To address this need, CISR has initiated a Trusted Computing Exemplar Project, which will provide an openly distributed worked example of how high assurance trusted computing components can be built.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Levin, Timothy E.; Dinolt, George W. (Monterey, California. Naval Postgraduate School, 2002-05); NPS-CS-02-003Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it ...
Bartram, Scott A. (Monterey, California. Naval Postgraduate School, 2000-06);The existence of Trojan horses, viruses, and other malicious software has motivated the computer security industry to invent mechanisms that protect against malicious software. One such mechanism is called the Trusted Path. ...
BryerJoyner, Susan; Heller, Scott D. (Monterey, California. Naval Postgraduate School, 1999-03);To reduce the cost and complexity of the current DoD information infrastructure, a Multilevel Secure (MLS) network solution eliminating hardware redundancies is required. Implementing a high assurance MLS LAN requires the ...