Journal of Computer Science

Policy-Based Security for Wireless Components in High Assurance Computer Systems

Luay A. Wahsheh and Jim Alves-Foss

DOI : 10.3844/jcssp.2007.726.735

Journal of Computer Science

Volume 3, Issue 9

Pages 726-735

Abstract

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) architecture for high assurance computer system design of security and safety-critical multi-enclave systems to provide a framework for supporting the enforcement of diverse security multi-policies. The established wireless inter-enclave multi-policy paradigm manages multiple wireless security policies within heterogeneous systems. Applying the policy refinement rules presented in this work for a security enforcement procedure of an application system will reduce the proof effort for secure components.

Copyright

© 2007 Luay A. Wahsheh and Jim Alves-Foss. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.