翻訳と辞書
Words near each other
・ Multiplication sign
・ Multiplication table
・ Multiplication theorem
・ Multiplicative
・ Multiplicative calculus
・ Multiplicative cascade
・ Multiple frequency-shift keying
・ Multiple fruit
・ Multiple gamma function
・ Multiple granularity locking
・ Multiple gunshot suicide
・ Multiple hamartoma syndrome
・ Multiple hearth furnace
・ Multiple histories
・ Multiple homing
Multiple Independent Levels of Security
・ Multiple independently targetable reentry vehicle
・ Multiple Indicator Cluster Surveys
・ Multiple inert gas elimination technique
・ Multiple inheritance
・ Multiple inositol-polyphosphate phosphatase
・ Multiple integral
・ Multiple Integrated Laser Engagement System
・ Multiple isomorphous replacement
・ Multiple kernel learning
・ Multiple Kill Vehicle
・ Multiple listing service
・ Multiple Loci VNTR Analysis
・ Multiple major sports championship seasons
・ Multiple Maniacs


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Multiple Independent Levels of Security : ウィキペディア英語版
Multiple Independent Levels of Security
Multiple Independent Levels of Security/Safety (MILS) is a high-assurance security architecture based on the concepts of separation and controlled information flow; implemented by separation mechanisms that support both untrusted and trustworthy components; ensuring that the total security solution is non-bypassable, evaluatable, always invoked and tamperproof.
A MILS solution allows for independent evaluation of security components and trusted composition. MILS builds on the older Bell and La Padula theories on secure systems that represent the foundational theories of the DoD Orange Book.
A MILS system employs one or more separation mechanisms (e.g., Separation kernel, Partitioning Communication System, physical separation) to maintain assured data and process separation. A MILS system supports enforcement of one or more application/system specific security policies by authorizing information flow only between components in the same security domain or through trustworthy security monitors (e.g., access control guards, downgraders, crypto devices, etc.).
Properties:
* ''Non-bypassable'': a component can not use another communication path, including lower level mechanisms to bypass the security monitor.
* ''Evaluatable'': any trusted component can be evaluated to the level of assurance required of that component. This means the components are modular, well designed, well specified, well implemented, small, low complexity, etc.
* ''Always-invoked'': each and every access/message is checked by the appropriate security monitors (i.e., a security monitor will not just check on a first access and then pass all subsequent accesses/messages through).
* ''Tamperproof'': the system controls "modify" rights to the security monitor code, configuration and data; preventing unauthorized changes.
A convenient acronym for these characteristics is NEAT.
'Trustworthy' means that the component have been certified to satisfy well defined security policies to a level of assurance commensurate with the level of risk for that component (e.g., we can have single level access control guards evaluated at CC EAL4; separation mechanisms evaluated at ''High Robustness''; two-level separation guards at EAL 5; and TYPE I crypto all in the same MILS system).
'Untrusted' means that we have no confidence that the system meets its specification with respect to the security policy.
The following companies have MILS separation kernel products:
* Green Hills Software
* LynuxWorks
* SYSGO
* Wind River Systems
* Bertin Technologies
* OK Labs〔http://wiki.ok-labs.com/DevelopOKLinuxApp?highlight=%28oklinux%29〕〔http://ssrg.nicta.com.au/projects/seL4/〕
== See also ==

* Multiple Levels of Security

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Multiple Independent Levels of Security」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.