Conference paper Open Access

Partitioning in Safety and Security: Mapping to MILS Core Partitioning Mechanisms

Blasum, Holger


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.47974</identifier>
  <creators>
    <creator>
      <creatorName>Blasum, Holger</creatorName>
      <givenName>Holger</givenName>
      <familyName>Blasum</familyName>
      <affiliation>SYSGO AG</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Partitioning In Safety And Security: Mapping To Mils Core Partitioning Mechanisms</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2015</publicationYear>
  <subjects>
    <subject>MILS</subject>
    <subject>safety</subject>
    <subject>security</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2015-01-20</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/47974</alternateIdentifier>
  </alternateIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;While safety and security at a high-level are white-board concepts, once it comes to implementation in a MILS core (separation kernel + minimal set of additional hardware and software needed for the separation of partitions), sometimes the concrete realization depends on what is doable. Several use cases of partitioning are mapped to partitioning mechanisms implementing the partitioning. The main idea is that&lt;br&gt;
this paper takes "safety" + "something" and calls it "security". The main result is that different use cases of safety and security can be compared, and one can precisely talk about differences. If one is aware of differences, one can strive for and maintain strong notions of safety and security.&lt;/p&gt;</description>
  </descriptions>
</resource>
5
3
views
downloads
All versions This version
Views 55
Downloads 33
Data volume 1.1 MB1.1 MB
Unique views 55
Unique downloads 22

Share

Cite as