{"title":"定义实时嵌入式系统的安全架构[演示]","authors":"T. Reinhart, C. Boettcher, G. Gándara","doi":"10.21236/ada465687","DOIUrl":null,"url":null,"abstract":"Abstract : Providing information assurance (IA) for embedded aerospace platforms in a network centric battlespace presents new challenges for information-intensive system development and deployment. This paper will discuss ongoing research being conducted by Raytheon under two Air Force programs. As part of this research, Raytheon is assessing the vulnerability of mission-critical platforms to information warfare attacks on the infrastructure required to achieve interoperability and information sharing. This paper discusses Air Force missions, the technologies that are likely to be used to achieve interoperability, ongoing research in IA that can be leveraged, any IA vulnerabilities that are not yet being addressed, and approaches to mitigating those vulnerabilities. Recommendations for promising future research directions are described.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Defining a Security Architecture for Real-Time Embedded Systems [Presentation]\",\"authors\":\"T. Reinhart, C. Boettcher, G. Gándara\",\"doi\":\"10.21236/ada465687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract : Providing information assurance (IA) for embedded aerospace platforms in a network centric battlespace presents new challenges for information-intensive system development and deployment. This paper will discuss ongoing research being conducted by Raytheon under two Air Force programs. As part of this research, Raytheon is assessing the vulnerability of mission-critical platforms to information warfare attacks on the infrastructure required to achieve interoperability and information sharing. This paper discusses Air Force missions, the technologies that are likely to be used to achieve interoperability, ongoing research in IA that can be leveraged, any IA vulnerabilities that are not yet being addressed, and approaches to mitigating those vulnerabilities. Recommendations for promising future research directions are described.\",\"PeriodicalId\":333539,\"journal\":{\"name\":\"Command and Control Research Program\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Command and Control Research Program\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21236/ada465687\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Command and Control Research Program","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21236/ada465687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defining a Security Architecture for Real-Time Embedded Systems [Presentation]
Abstract : Providing information assurance (IA) for embedded aerospace platforms in a network centric battlespace presents new challenges for information-intensive system development and deployment. This paper will discuss ongoing research being conducted by Raytheon under two Air Force programs. As part of this research, Raytheon is assessing the vulnerability of mission-critical platforms to information warfare attacks on the infrastructure required to achieve interoperability and information sharing. This paper discusses Air Force missions, the technologies that are likely to be used to achieve interoperability, ongoing research in IA that can be leveraged, any IA vulnerabilities that are not yet being addressed, and approaches to mitigating those vulnerabilities. Recommendations for promising future research directions are described.