Policy-Based Security for Wireless Components in High Assurance Computer Systems
Abstract
To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) architecture for high assurance computer system design of security and safety-critical multi-enclave systems to provide a framework for supporting the enforcement of diverse security multi-policies. The established wireless inter-enclave multi-policy paradigm manages multiple wireless security policies within heterogeneous systems. Applying the policy refinement rules presented in this work for a security enforcement procedure of an application system will reduce the proof effort for secure components.
DOI: https://doi.org/10.3844/jcssp.2007.726.735
Copyright: © 2007 Luay A. Wahsheh and Jim Alves-Foss. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,816 Views
- 2,511 Downloads
- 1 Citations
Download
Keywords
- High assurance architecture
- policy refinement
- security policy
- wireless