DocumentCode :
3264068
Title :
Trustable computing in next-generation avionic architectures
Author :
Bondi, James O.
Author_Institution :
Texas Instruments, Plano, TX, USA
fYear :
1992
fDate :
30 Nov-4 Dec 1992
Firstpage :
10
Lastpage :
19
Abstract :
In tomorrow´s ´brilliant´ weapons, next-generation avionic computers will need to orchestrate the actions of many subsystems while further maintaining the security of sensitive data, the integrity of key data and of system behavior, and often other key properties. Maintenance of these properties will help ensure that system execution is trustable, conforming to both prescribed policies and expected behavior. The essential properties of security and integrity are introduced, and other properties (like virus resistance) that should complement them in future avionic computing are cited. Traditional security maintenance as derived from simple controls that constrain application accesses in a rather rigid way are reviewed. It is illustrated how, to add integrity maintenance capability, such controls can be enhanced to support customizable application execution constraint. Mechanisms for supporting security and integrity in next-generation avionic architectures are recommended
Keywords :
DP management; aerospace computing; data integrity; military systems; security of data; software reliability; application accesses; brilliant weapons; customizable application execution constraint; integrity; next-generation avionic architectures; security; security maintenance; sensitive data; virus resistance; Aerospace electronics; Bonding; Computer architecture; Computer security; Data security; Information security; Military computing; Missiles; Protection; Weapons;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1992. Proceedings., Eighth Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-3115-5
Type :
conf
DOI :
10.1109/CSAC.1992.228238
Filename :
228238
Link To Document :
بازگشت