Breaking News
Design How-To

MILS architecture simplifies design of high assurance systems – Part 1

Page 1 / 3 Next >
More Related Links
View Comments: Newest First | Oldest First | Threaded View
User Rank
re: MILS architecture simplifies design of high assurance systems – Part 1
EREBUS0   8/18/2011 8:00:19 PM
Hi Paul, I agree, multilevel security will only work if you maintain rigid partitions. I also think that data encryption should be a normal process. The data owner should encrypt the data being sent to the server and the server should establish who other than the owner can have access. Whenever the data is used or accessed withing the server, it is never decrypted except by owner designated processes, which should already possess the acess code. With this approach, anyone who manages to download the data must still have the decrypt key before the data can be used. No one can just tap the line for the data, because all they will see is encrypted data. Most of these issues should be transparent to the owner once their account is established and anyone trying to crack the server can immediately generate alerts if they try to access anything for which they have not been give access to. Thanks

August Cartoon Caption Winner!
August Cartoon Caption Winner!
"All the King's horses and all the KIng's men gave up on Humpty, so they handed the problem off to Engineering."
Top Comments of the Week
Like Us on Facebook Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.