|
For more information please send your detailed contact information to: info@aesec.com
|
|
The following links having the ACM diamond icon will redirect your browser to the Association for Computing Machinery digital library to retrieve an authorized personal use copy of the linked paper.
Links without the ACM icon are links to documents for direct download.
GEMSOS MLS Product Concepts
Recent Publications
-
- Using Proven Reference Monitor Patterns for Security Evaluation
- A Multi-Level Secure File Sharing Server and its Application to a Multi-Level Secure Cloud
Mark R. Heckman, Roger R. Schell, Edwards E. Reed
In Proc. MILCOM 2015, October 26-28, 2015, Tampa, Fl.
- Towards Formal Evaluation of a High-Assurance Guard
Mark R. Heckman, Roger R. Schell, Edwards E. Reed
In Proc. 6th Layered Assurance Workshop (LAW) 2012
December 3-4, 2012, Orlando, FL., pp. 25-31. ( Entire proceedings available)
- A High-Assurance Virtual Guard Architecture
Mark R. Heckman, Roger R. Schell, Edwards E. Reed
In Proc. MILCOM 2012, October 29-November 1, 2012, Orlando, Fl.
-
- Composing a High-Assurance Infrastructure Out of TCB Components
Mark R. Heckman, Roger R. Schell, Edwards E. Reed
Presented at the Layered Assurance Workshop (LAW) 2011.
December 2011, Orlando, FL.
Recent Presentations
Rochester Institute of Technology ESL Global Cybersecurity Institute
Presented: December 1, 2023, Rochester, NY.
Abstract:
Powerful Security Kernel Cyber-Defense Reset
Established cyber defense approaches - penetrate and patch (a game we can never win) — have failed. They have not, do not, and indeed cannot provide verifiable security for critical infrastructure, IoT (both of which require strong integrity protections) and classic controlled sharing applications (Mandatory Access Control — MAC — secrecy domains) for Cloud, appliance, and e-commerce/web services environments.
But that is just the latest chapter in the decades long search for trusted computing solutions. Having come to a fork in the road, industry — and government — took the path that brought us here. It is time to double back and see what has already been shown to work, and reconsider Reference Monitor technology and the Security Kernel system-level commercial products that implement it.
This presentation will begin with a very brief review of cyber security history by someone who was there at the beginning and who has seen multiple successful system deployments run in highly contested networked, global environments — without ever needing a security patch. The "secret sauce" — applying model-based engineering design to the system-wide security problem — is reproducible, effective, and sorely needed for critical infrastructure, consumer appliances, and multi-tenant cloud/time-sharing systems.
Classic Publications
© Aesec Corporation 2003-2017 |
|
|