Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

The importance of high assurance computers for command, control, communications, and intelligence systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Shockley, W.R. ; Gemini Comput. Inc., Carmel, CA, USA ; Schell, R.R. ; Thompson, M.F.

The authors discuss the available alternatives for building multilevel secure automated command, control, communications, and intelligence systems (CCCI systems). It is concluded that the only way to have a high degree of confidence that the anticipated threat can be countered is to base a CCCI system on a TCB (trusted computer base) having a security kernel (i.e., on a Class B3 or A1 TCB rather than Class B2 TCB). The recommended approach is to provide the required operating system services as a nonsecurity-critical extension to a commercially available Class B3 TCB, making it possible to use technology that is available, affordable, and immediately usable. It is concluded that the desired extensions are practical within the constraints of a CCI system development project and could be implemented using standard software engineering techniques without impacting the highly-assured security characteristics of the system enforced by the underlying security kernel

Published in:

Aerospace Computer Security Applications Conference, 1988., Fourth

Date of Conference:

12-16 Dec 1988