Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification

This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and inter-object communications. The
objective of this portion of the work is to provide an understanding of the software
architectural underpinnings on which the rest of the book is based.

Following on from this, the remainder of the book contains an analysis of security policies
and kernel design that are used to support the security side of the architecture. The goal of
this part of the book is to provide an awareness and understanding of various security models
and policies, and how they may be applied towards the protection of cryptographic
information and data. The security kernel design presented here uses a novel design that
bases its security policy on a collection of filter rules enforcing a cryptographic modulespecific
security policy. Since the enforcement mechanism (the kernel) is completely
independent of the policy database (the filter rules), it is possible to change the behaviour of
the architecture by updating the policy database without having to make any changes to the
kernel itself. This clear separation of policy and mechanism contrasts with current
cryptographic security architecture approaches which, if they enforce controls at all, hardcode
them into the implementation, making it difficult to either change the controls to meet
application-specific requirements or to assess and verify them.

To provide assurance of the correctness of the implementation, this thesis presents a
design and implementation process that has been selected to allow the implementation to be
verified in a manner that can reassure an outsider that it does indeed function as required. In
addition to producing verification evidence that is understandable to the average user, the
verification process for an implementation needs to be fully automated and capable of being
taken down to the level of running code, an approach that is currently impossible with
traditional methods. The approach presented here makes it possible to perform verification at
this level, something that had previously been classed as “beyond A1” (that is, not achievable
using any known technology).
(HTML tags aren't allowed.)

CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802
CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802

Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better—namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job or more money and a...

Imaging of Soft Tissue Tumors
Imaging of Soft Tissue Tumors

Based on a vast number of cases seen at the Armed Forces Institute of Pathology and the Mayo Clinic, this volume is a comprehensive reference on the radiologic evaluation of soft tissue tumors. The book covers the entire spectrum of soft tissue pathologies, with over 1,400 images showing common and atypical appearances. The authors...

Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...

Mathematics for Business, Science, and Technology
Mathematics for Business, Science, and Technology
This text is targeted at high school seniors who plan to enter business, science, and technology related fields, and working professionals seeking to enhance their knowledge on various math topics including probability and optimization methods. This book begins with the basic mathematical operations and ends with advanced and yet practical...
50 Model Rocket Projects for the Evil Genius
50 Model Rocket Projects for the Evil Genius

The fun, hands-on way to learn about rocket science

Yes, as a matter of fact, is IS rocket science! And because this book is written for the popular Evil Genius format, it means you can learn about this fascinating and growing hobby while having run creating 50 great projects. You will find a detailed list of...

Debian 7: System Administration Best Practices
Debian 7: System Administration Best Practices

Learn the best ways to install and administer a Debian Linux distribution


  • An in-depth look at Debian administration subjects
  • Discover what distinguishes Debian from other Linux distributions
  • Learn how to install, maintain, and administer Debian Linux


©2019 LearnIT (support@pdfchm.net) - Privacy Policy