Learn More
The purpose of this protection profile (PP) is to define the security functional requirements and the security assurance requirements for a Partitioning Kernel target of evaluation (TOE). A Partitioning Kernel is that portion of an operating system that is responsible for enforcing data isolation and information flow control among memory partitions.
Modern network processors support high levels of parallelism in packet processing by supporting multiple threads that execute on a micro-engine. Threads switch context upon encountering long latency memory accesses and this way the parallelism and memory access can be overlapped. Context switches in the typical network processor architectures such as the(More)
EXECUTIVE SUMMARY This report presents results for the Rockwell Collins Inc. sponsored project on generating test data from requirements/speciications, which started January 1, 1998. The purpose of this project is to improve our ability to test software that needs to be highly reliable by developing formal techniques for generating test cases from formal(More)
BACKGROUND Comparison of complete genomes of Bacteria and Archaea shows that gene content varies considerably and that genomes evolve quite rapidly via gene duplication and deletion and horizontal gene transfer. We analyze a diverse set of 92 Bacteria and 79 Archaea in order to investigate the processes governing the origin and evolution of families of(More)
The National Defense Industrial Association and its affiliate, the Association for Enterprise Integration thank the members of the Net-Centric Industry Forum for their efforts in providing inputs to the review process. The following companies played a role in this review. Executive Summary The purpose of the NCOW Reference Model is to describe the DoD(More)
In developing many safety-critical, embedded systems, rework to fix software defects detected late in the test phase is the largest single cause of cost overrun and schedule delay. Typically, these defects involve the interactions among no more than 6 variables, suggesting that 6-way combinatorial tests could detect them much earlier. NIST developed an(More)
Understanding and analyzing information flow is crucial in the evaluation of security critical software systems. Data Flow Logic (DFL) is a domain specific language under development at Rockwell Collins for use in specifying and verifying dynamic information flow properties of such systems. The language employs C source code annotations to enable concise,(More)
Figure 5 The propagation of the effects of a fault, from its activation to create an error in the system state, to propagation to a failure in a provided service, to causing a fault in a user system.. Safety is an important property of many kinds of product systems and services. Achieving acceptable levels of safety in a product depends on many people(More)
Figure 1 Security and safety processes viewed as specialist domains contributing to core systems engineering (SE), management and operations processes .. Figure 3 The propagation of the effects of a fault, from its activation to create an error in the system state, to propagation to a failure in a provided service, to causing a fault in a user system [13].(More)
  • 1