Multiple Independent Levels of Security

Results: 12



#Item
1Computer security / Computer architecture / Computing / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Lynx Software Technologies / Kernel / Lockheed Martin / MLS / Guard / Protection ring

PDF Document

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:42
2United States Department of Defense / Certification and Accreditation / Multiple Independent Levels of Security / System Security Authorization Agreement / National Security Agency / Department of Defense Information Technology Security Certification and Accreditation Process / Accreditation / Multiple single-level / Computer security / Quality assurance / Multilevel security

The Challenge of Multilevel Security Rick Smith, Ph.D., CISSP http://www.cryptosmith.com/ October 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
3Computing / VxWorks / Multilevel security / Multiple Independent Levels of Security / Operating system / AdaCore / Virtual machine / Hyper-V / Board support package / System software / Software / Real-time operating systems

WIND RIVER VXWORKS MILS PLATFORM 3.0, MULTI-CORE EDITION TABLE OF CONTENTS Run-Time Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Separation K

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:14
4Virtual machines / Real-time operating systems / Embedded operating systems / VxWorks / Multiple Independent Levels of Security / Multilevel security / Embedded systems / Wind River Systems / Simics / System software / Software / Computing

WIND RIVER VXWORKS MILS PLATFORM The world’s most critical defense, networking, and industrial infrastructure requires high assurance of security along with protection from intentional threats and inadvertent errors. I

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:12
5Virtual machines / Real-time operating systems / VxWorks / Multiple Independent Levels of Security / Embedded systems / Multilevel security / Simics / Operating system / Board support package / System software / Software / Computing

WIND RIVER VXWORKS MILS PLATFORM[removed]TABLE OF CONTENTS Run-Time Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Separation Kernel . . . . .

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:14
6Computer network security / Multiple Independent Levels of Security / Security / Malware / Vulnerability / Separation kernel / IPsec / Integrity / Virtual private network / Computer security / Computing / Cyberwarfare

SN-052-Multilevel-Prospekt_0413_V4.indd

Add to Reading List

Source URL: www.secunet.com

Language: English - Date: 2013-07-16 06:35:47
7Real-time operating systems / Trusted computing base / Embedded operating systems / Microkernel / L4 microkernel family / Evaluation / Multiple Independent Levels of Security / Multilevel security / Kernel / Computer architecture / Computer security / Computing

Trustworthy Embedded Systems http://www.ertos.nicta.com.au/ Trustworthy Embedded Systems ERTOS-2 Project Plan 2009–2013 [removed]

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:09:39
8Cyberwarfare / Crime prevention / National security / Multiple Independent Levels of Security / AUTOSAR / Denial-of-service attack / Vulnerability / Security engineering / Embedded system / Security / Computer network security / Computer security

Future Cars: Necessity for an Adaptive and Distributed Multiple Independent Levels of Security Architecture Alexander Camek Christian Buckl

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2013-05-15 08:23:16
9Crime prevention / National security / Evaluation / XTS-400 / Mandatory access control / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Linux kernel / Computer security / Security / Computing

Microsoft Word - DISTPG.doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-09-28 10:43:57
10Computing / Multiple Independent Levels of Security / Software engineering / Kernel / Middleware / Objective Interface Systems / Common Object Request Broker Architecture / Operating system / Systems science / Systems engineering / CORBA / Partitioning Communication System

Microsoft PowerPoint - PCS_Tutorial_for_SBC_2004.ppt

Add to Reading List

Source URL: www.omg.org

Language: English - Date: 2009-05-28 13:23:05
UPDATE