Research Article Open Access

Policy-Based Security for Wireless Components in High Assurance Computer Systems

Luay A. Wahsheh and Jim Alves-Foss

Abstract

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) architecture for high assurance computer system design of security and safety-critical multi-enclave systems to provide a framework for supporting the enforcement of diverse security multi-policies. The established wireless inter-enclave multi-policy paradigm manages multiple wireless security policies within heterogeneous systems. Applying the policy refinement rules presented in this work for a security enforcement procedure of an application system will reduce the proof effort for secure components.

Journal of Computer Science
Volume 3 No. 9, 2007, 726-735

DOI: https://doi.org/10.3844/jcssp.2007.726.735

Submitted On: 26 June 2007 Published On: 30 September 2007

How to Cite: Wahsheh, L. A. & Alves-Foss, J. (2007). Policy-Based Security for Wireless Components in High Assurance Computer Systems. Journal of Computer Science, 3(9), 726-735. https://doi.org/10.3844/jcssp.2007.726.735

  • 3,792 Views
  • 2,496 Downloads
  • 1 Citations

Download

Keywords

  • High assurance architecture
  • policy refinement
  • security policy
  • wireless