SecureCore software architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide
Shifflett, David J.
Clark, Paul C.
Irvine, Cynthia E.
Nguyen, Thuy D.
Vidas, Timothy M.
Levin, Timothy E.
MetadataShow full item record
A mobile computing device has more inherent risk than desktops or most other stationary computing devices. Such mobile devices are typically carried outside of a controlled physical environment, and they must communicate over an insecure medium. The risk is even greater if the data being stored, processed and transmitted by the mobile device is classified. The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible. A building block for the SecureCore project is a Least Privilege Separation Kernel (LPSK). The LPSK together with extension modules provides the security base. Integration of extension modules with the LPSK is described, including coding techniques, and compile and link directions.
NPS Report NumberNPS-CS-07-022
Showing items related by title, author, creator and subject.
Tufekcioglu, Refik (Monterey, California. Naval Postgraduate School, 2000-03);This thesis study covers wired and wireless mobile computing environments, introduces the components of the mobile environment, discusses the constraints of mobility, and contains a taxonomy of the current techniques/ ...
George, Johnu; Chen, Chien-An; Stoleru, Radu; Xie, Geoffrey (2016);The new generations of mobile devices have high processing power and storage, but they lag behind in terms of software systems for big data storage and processing. Hadoop is a scalable platform that provides distributed ...
Brachfeld, Lawrence J. (Monterey, California: Naval Postgraduate School, 1999-09);Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control ...