PALM HARBOR, Fla. – Many military systems host multiple applications, and those applications can be at varying security levels. To represent trusted computing, however, an application must not be able to see the contents of another application’s data (confidentiality), change the data of another application (integrity), or cause another application or its data to become inaccessible for a period of time (availability) -- even when the separate applications are at the same security level, says Richard Jaenicke for Military and Aerospace Electronics.
Continue reading original article
The Intelligent Aerospace take:
March 28, 2019-Jaenicke notes that open system standards dictate that systems engineers should implement security at several levels and one good solution is to use secure communications middleware. Jaenicke's deep dive into mil/aero trusted computing software is well worth a read.
Related: Optimizing cyber security and trusted computing on today’s connected military and commercial aircraft
Related: Annapolis Micro Systems outfits embedded computing boards with SV Microwave high-speed SOSA-aligned connectors
Related: Small-form-factor embedded computing systems for artificial intelligence (AI) offered by Aitech
Jamie Whitney, Associate Editor
Ready to make a purchase? Search the Intelligent Aerospace Buyer's Guide for companies, new products, press releases, and videos