Conference paper Open Access

Non-Interfering Composed Evaluation

Furgel, Igor; Saftig, Viola; Wagner, Tobias; Müller, Kevin; Schwarz, Reinhard; Blomberg, Axel Söding-Freiherr


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.47979</identifier>
  <creators>
    <creator>
      <creatorName>Furgel, Igor</creatorName>
      <givenName>Igor</givenName>
      <familyName>Furgel</familyName>
      <affiliation>T-Systems International GmbH</affiliation>
    </creator>
    <creator>
      <creatorName>Saftig, Viola</creatorName>
      <givenName>Viola</givenName>
      <familyName>Saftig</familyName>
      <affiliation>T-Systems International GmbH</affiliation>
    </creator>
    <creator>
      <creatorName>Wagner, Tobias</creatorName>
      <givenName>Tobias</givenName>
      <familyName>Wagner</familyName>
      <affiliation>T-Systems International GmbH</affiliation>
    </creator>
    <creator>
      <creatorName>Müller, Kevin</creatorName>
      <givenName>Kevin</givenName>
      <familyName>Müller</familyName>
      <affiliation>Airbus Group Innovations</affiliation>
    </creator>
    <creator>
      <creatorName>Schwarz, Reinhard</creatorName>
      <givenName>Reinhard</givenName>
      <familyName>Schwarz</familyName>
      <affiliation>Fraunhofer IESE</affiliation>
    </creator>
    <creator>
      <creatorName>Blomberg, Axel Söding-Freiherr</creatorName>
      <givenName>Axel Söding-Freiherr</givenName>
      <familyName>Blomberg</familyName>
      <affiliation>OpenSynergy</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Non-Interfering Composed Evaluation</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2016</publicationYear>
  <subjects>
    <subject>security composition</subject>
    <subject>security evaluation and certification</subject>
    <subject>Non- Interference</subject>
    <subject>Separation kernel</subject>
    <subject>MILS (Multiple Independent Levels of Security)</subject>
    <subject>Virtualization</subject>
    <subject>Hypervisor</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2016-01-19</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/47979</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/mils</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;In this document an extension of the concept for the evaluation of a Composed TOE is presented. This approach, namely the Non-Interfering Composed TOE, is based on the traceable property of the non-interference of two certified TOEs.&lt;/p&gt;</description>
  </descriptions>
</resource>
67
25
views
downloads
All versions This version
Views 6767
Downloads 2525
Data volume 11.7 MB11.7 MB
Unique views 6767
Unique downloads 2222

Share

Cite as