期刊文献+

基于MILS架构的安全中间件研究 被引量:1

Research on the Security Middleware Based MILS Architecture
原文传递
导出
摘要 针对新一代作战飞机中的高可靠性和信息安全处理需求,引入访问控制安全中间件和数据传输安全中间件,建立高安全机载操作系统通信架构,阻止资源的非法访问,保证网络间信息传输的安全性,实现模块内和模块间的安全通信。 In order to meet the requirements of high reliability and information security for the new generation of avion,the access control security middleware and data transmission security middleware are introduced to implement high security and safety missile-born operating system communication architecture and prevent unauthorized resource access and guarantee the security transfer of information in the network,so as to realize the security communications of intra-module and inter-modules security.
出处 《电子技术(上海)》 2013年第7期16-19,共4页 Electronic Technology
基金 航空科学基金(2012ZC31006)
关键词 MILS 中间件 安全通信 通信架构 MILS middleware security communication communication architecture
  • 相关文献

参考文献3

  • 1杨霞,古和亦,汪强,桑楠,熊光泽.Hades高可信架构中分区间信息流控制的研究[J].电子科技大学学报,2012,41(1):74-79. 被引量:2
  • 2Zhu W Z, Lee C. Design for security operating system[C]//Proceedings of 2009 3rd Asia Intemational Conference on Modelling and Simulation, 2009: 667-670.
  • 3Hamed O, Ryan H K. A Framework for integrating network and operating system security policies[C] //Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery. 2009: 53-62.

二级参考文献10

  • 1毛鞯锋.四级安全操作系统sEcos的研究与实现[D].浙江:浙江大学,2006.
  • 2KNIGHT J C. Safety critical systems: challenges and directions[C]//Tthe 24th International Conference on Software Engineering. Orlando: Julian Krugrnan, 2002: 547-550.
  • 3THOMAS P A, ARGER J K. Multi-level security requirements for hypervisors[C]//Processing of IEEEE ACSAC. Tucson: IEEE Press, 2004: 129-134.
  • 4YANG Xia, ZHAO Xiang-yu, LEI Jian, et al. A trusted architecture for ESCS with MLS[C]//The Fitth International Conference on Embedded Sottware and Systems (ICESS 2008). Chengdu: IEEE Press, 2008: 44-49.
  • 5IBM Inc. Certification report for processor resource/system manager (PR/SM) for the IBM eServer zSeries 900[J/OL] [2003-12-18]. http://www.commoncciteriaportal. org/files/epfiles/0178b.pdf.
  • 6MADNICK S E, DONOVAN J J. Application and analysis of the virtual machine approach to information system security[C]// Proceedings of the ACM SIDGARCHSIDGOPS Workshop on Virtual Computer Systems. New York : ACM, 1973: 210-224.
  • 7KEVIN G W. Safety kernel enforcement of software safety policies[D]. Virginia: University of Virginia, 1995.
  • 8SAILER T J R, VALDEZ E, CACERES R, et al. Building a mac-based security architecture for the Xen open-source hypervisor[C]//Proceedings of the 21st Annual Computer Security Applications Conference. Washington: 1EEE Press, 2005: 140-148.
  • 9KARGER P A Z, BONIN M E, MASO D W N, et al. A retrospective on the VAX VMM security kemel[J]. IEEE Transactions on Sottware Engineering, 1991, 17(11): 1147- 1165.
  • 10杨仕平,桑楠,熊光泽.安全关键软件的防危性测评技术研究[J].计算机学报,2004,27(4):442-450. 被引量:18

共引文献1

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部