Design, Verification and Implementation of MILS systems

نویسندگان

  • Julien DELANGE
  • Laurent PAUTET
  • Fabrice KORDON
چکیده

Safety-critical systems are used in many domains (military, avionics, aerospace, etc.) and handle critical data in hostile environements. These systems must protect data so that only allowed entities can read or write information. However, due to their increased number of functionalities, safety-critical systems design becomes more complex ; this increases difficulties in the design and the verification of security functions. The Multiple Independent Levels of Security (MILS) approach introduces rules and guidelines for the design of secure systems. It isolates data according to their security levels, reducing system complexity to ease development. However, there is no approach addressing the whole development of MILS systems from highlevel specification to the final implementation. This paper presents our approach for the design of MILS architectures. We describe security concerns using a modeling language, verify security requirements and automatically implement the system using code generation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design, implementation and verification of MILS systems

Safety-critical systems are used in many domains (military, avionics, aerospace, etc.) and handle critical data in hostile environements. To prevent data access by unauthorized subjects, they must protect and isolate information so that only allowed entities can read or write information. However, due to their increased number of functionalities, safety-critical systems design becomes more comp...

متن کامل

Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems

One fundamental key to successful implementation of secure high assurance computer systems is the design and implementation of security policies. For systems enforcing multiple concurrent policies, the design and implementation is a challenging and difficult task. To simplify this task, we present an Inter-Enclave Multi-Policy (IEMP) paradigm for information access of the Multiple Independent L...

متن کامل

The MILS architecture for high-assurance embedded systems

High-assurance systems require a level of rigor, in both design and analysis, not typical of conventional systems. This paper provides an overview of the Multiple Independent Levels of Security and Safety (MILS) approach to high-assurance system design for security and safety critical embedded systems. MILS enables the development of a system using manageable units, each of which can be analyze...

متن کامل

Safety Verification of Real Time Systems Serving Periodic Devices

In real-time systems response to a request from a controlled object must be correct and timely. Any late response to a request from such a device might lead to a catastrophy. The possibility of a task overrun, i.e., missing the deadline for completing a requested task, must be checked and removed during the design of such systems. Safe design of real-time systems running periodic tasks under th...

متن کامل

Separation and Integration in MILS (The MILS Constitution)

We describe the MILS approach to design, construction, integration, and evaluation of secure systems. The crucial feature of the MILS approach is that it separates the problems of enforcing security policy from those of securely sharing resources. MILS design proceeds in two steps: first, we develop a logical security policy architecture in which the system is deconstructed into interacting com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010