首页> 外文期刊>Software >Design, implementation and verification of MILS systems
【24h】

Design, implementation and verification of MILS systems

机译:MILS系统的设计,实施和验证

获取原文
获取原文并翻译 | 示例
       

摘要

Safety-critical systems are used in many domains (military, avionics, aerospace, etc.) and handle critical data in hostile environments. To prevent data access by unauthorized subjects, they must protect and isolate information so that only allowed entities can read or write information. However, because of their increased number of functionalities, safety-critical systems design becomes more complex; this increases difficulties in the design and the verification of security functions and potential error in their implementation. The multiple independent levels of security (MILS) approach introduces rules and guidelines for the design of secure systems. It isolates data according to their security levels, reducing system complexity to ease development. However, there is no approach addressing the whole development of MILS systems from high-level specification (application components with their security levels) to the final implementation (code that executes application functions and provide security mechanisms). This paper presents a complete development approach for the design, verification and implementation of MILS architectures. It aims at providing a complete framework to build secure applications based on MILS guidelines. We describe security concerns using a modeling language, verify security requirements and automatically implement the system code generation techniques and a MILS-compliant operating system that provides security functions. Copyright © 2012 John Wiley & Sons, Ltd.
机译:关键安全系统被用于许多领域(军事,航空电子,航空航天等),并在敌对环境中处理关键数据。为了防止未经授权的主体访问数据,他们必须保护和隔离信息,以便只有允许的实体才能读取或写入信息。但是,由于功能数量的增加,对安全至关重要的系统设计变得更加复杂。这增加了设计和验证安全功能的难度,并增加了其实现中的潜在错误。多个独立的安全级别(MILS)方法引入了安全系统设计的规则和准则。它根据数据的安全级别隔离数据,从而降低系统复杂性以简化开发。但是,没有办法解决从高级规范(具有安全级别的应用程序组件)到最终实现(执行应用程序功能并提供安全机制的代码)整个MILS系统的问题。本文提出了一种用于MILS体系结构的设计,验证和实现的完整开发方法。它旨在提供一个完整的框架,用于根据MILS指南构建安全的应用程序。我们使用建模语言描述安全问题,验证安全要求并自动实施系统代码生成技术和提供安全功能的符合MILS的操作系统。版权所有©2012 John Wiley&Sons,Ltd.

著录项

  • 来源
    《Software》 |2012年第7期|p.799-816|共18页
  • 作者单位

    TELECOM ParisTech - LTCI UMR 5141, rue Barrault, F-75634 Paris CEDEX 13, France;

    TELECOM ParisTech - LTCI UMR 5141, 46 rue Barrault, F-75634 Paris CEDEX 13, France;

    LIP6, CNRS UMR 7606, Universite P. & M. Curie 4, place Jussieu, 75005 Paris, France;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    MILS; AADL; POK; code generation; ocarina;

    机译:MILS;AADL;POK;代码生成;陶器;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号