Use of Trusted Software Modules for Emergency-Integrity Display
Levin, Timothy E.
Nguyen, Thuy N.
Clark, Paul C.
Irvine, Cynthia E.
Shifflett, P. David J.
Vidas, Timothy M.
MetadataShow full item record
This report provides summary of the interface, mechanisms and semantics for high integrity display of information in a secure computer system, based on the use of a high assurance separation kernel and trusted software modules in both the application domain and the trusted software domain.
NPS Report NumberNPS-CS-08-012
Showing items related by title, author, creator and subject.
Levin, Timothy E.; Dinolt, George W. (Monterey, California. Naval Postgraduate School, 2002-05); NPS-CS-02-003Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it ...
Bartram, Scott A. (Monterey, California. Naval Postgraduate School, 2000-06);The existence of Trojan horses, viruses, and other malicious software has motivated the computer security industry to invent mechanisms that protect against malicious software. One such mechanism is called the Trusted Path. ...
BryerJoyner, Susan.; Heller, Scott D. (Monterey, California. Naval Postgraduate School, 1999-03);To reduce the cost and complexity of the current DoD information infrastructure, a Multilevel Secure (MLS) network solution eliminating hardware redundancies is required. Implementing a high assurance MLS LAN requires the ...