Strong Boundaries —
The Reference Monitor —
Salter & Schroeder’s Eight Principles —
Modern Enhancements to Security —
Fault Tolerance by Design: High Availability Framework —
Security with Adaptive Partitioning —
Common Critera ISO/IEC 15408 Certification
[+]
Strong Boundaries
Virtually every embedded system today is connected, either physically or wirelessly, to the outside world. This network connectivity allows users to perform remote monitoring and control, and enables systems to download new software features ...
The Reference Monitor
James Anderson established the core principles of computer security in his Computer Security Technology Planning Study, published in 1972. Two years later, Jerome Saltzer and Michael Schroeder expanded upon these principles in The Protection of Information in ...
Salter & Schroeder’s Eight Principles
In 1974 Salter and Schroeder expanded upon Anderson’s three principles with eight of their own. The first principle, economy of mechanism, complements Anderson’s notion of a small, verifi-able kernel. An OS kernel must ...
Modern Enhancements to Security
Since Anderson, Saltzer, and Schroeder presented their seminal papers on secure systems, the security community has devised a few enhancements, including accountability, priority of subjects and priority of operations, self-tests, and fault ...
Fault Tolerance by Design: High Availability Framework
To simplify the goal of achieving fault tolerance, developers can use a high availability (HA) framework, such as the one supported by the QNX Neutrino RTOS. Properly designed, an HA framework provides easy-to-use tools that allow programmers to implement ...
Security with Adaptive Partitioning
A key technique for designing security into a system is to clearly partition system components that are likely to be compromised. This is particularly true for systems open to external access through a network connection, USB file system, or ...
Common Critera ISO/IEC 15408 Certification
The principles defined by Anderson, Salter, and Schroeder continue to form the basis of modern security standards and policies, including the Common Criteria, an international standard (ISO/IEC 15408) for the development of security specifications. Upon successful ...