Implementing secure dependencies over a network by designing a distributed security subsystem
B D'ausbourg - Computer Security—ESORICS 94: Third European …, 1994 - Springer
It was recently argued that the presence of covert channels should no longer be taken for
granted in multilevel secure systems. Until today, multilevel security seems to have been an …
granted in multilevel secure systems. Until today, multilevel security seems to have been an …
[PDF][PDF] Security extensions to onera hla rti prototype
We present security extensions to the RTI prototype developed at ONERA (Office National
d'Etudes et de Recherches Aérospatiales). These extensions are aimed at guaranteeing …
d'Etudes et de Recherches Aérospatiales). These extensions are aimed at guaranteeing …
Design and implementation of a distributed interactive simulation security architecture
The paper describes the design and implementation of a security architecture for a HLA/RTI
prototype developed at ONERA/CERT. The major security objective is to protect the …
prototype developed at ONERA/CERT. The major security objective is to protect the …
Security function interactions
P Bieber - Proceedings of the 12th IEEE Computer Security …, 1999 - ieeexplore.ieee.org
We use a compositional framework to model security architectures involving heterogeneous
and distributed security functions. Our goal is to assist the ITSEC evaluation of suitability …
and distributed security functions. Our goal is to assist the ITSEC evaluation of suitability …
[PDF][PDF] ESCOLA TECNICA SUPERIOR D'ENGINYERIA DE TELECOMUNICACIÓ DE BARCELONA
JF Muñoz - researchgate.net
En capítulo 3 se ha propuesto una arquitectura que permite que diferentes aplicaciones
negocien servicios de seguridad para las comunicaciones entre terminales multimedia a …
negocien servicios de seguridad para las comunicaciones entre terminales multimedia a …
[LIBRO][B] Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA
J Forné Muñoz - 1997 - upcommons.upc.edu
El estudio de arquitecturas de seguridad para redes de transmisión de datos adquiere cada
día mayor importancia. Por otra parte, es un hecho constatado que el mundo de las …
día mayor importancia. Por otra parte, es un hecho constatado que el mundo de las …
Controlling causal dependencies over a secure network
B d'Ausbourg, C Calas - Journal of Computer Security, 1996 - content.iospress.com
It was recently argued that the presence of covert channels should no longer be taken for
granted in multilevel secure systems. Until today, multilevel security seems to have been an …
granted in multilevel secure systems. Until today, multilevel security seems to have been an …
[PDF][PDF] Security Function Interactions
O CERT - academia.edu
We use a compositional framework to model security architectures involving heterogeneous
and distributed security functions. Our goal is to assist the ITSEC evaluation of suitability …
and distributed security functions. Our goal is to assist the ITSEC evaluation of suitability …
ONERA-CERT
In this paper, we apply the B method to the formal development of authentication protocols.
Our approach consists in first providing a very abstract specification of authentication, and …
Our approach consists in first providing a very abstract specification of authentication, and …
[PDF][PDF] Validation modulaire d'une architecture de s ecurit er epartie
O CERT - Citeseer
Afin de valider l'e cacit e d'une architecture reposant sur une vari et e de fonctions de s ecurit
e, il convient de montrer la pertinence, la coh erence et l'incontournabilit e de ces fonctions …
e, il convient de montrer la pertinence, la coh erence et l'incontournabilit e de ces fonctions …