Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes ....Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in novel policy based secure and trusted system models and new techniques for malicious attacks detection, which will help to achieve secure Internet applications and large scale systems in Grid computing and e-Science.Read moreRead less