Connecting trusted computing software securely using open-systems standards
PALM HARBOR, Fla. – Many military systems host multiple applications, and those applications can be at varying security levels. To represent trusted computing, however, an application must not be able to see the contents of another application’s data (confidentiality), change the data of another application (integrity), or cause another application or its data to become inaccessible for a period of time (availability) -- even when the separate applications are at the same security level, says Richard Jaenicke for Military and Aerospace Electronics.
The Intelligent Aerospace take:
March 28, 2019-Jaenicke notes that open system standards dictate that systems engineers should implement security at several levels and one good solution is to use secure communications middleware. Jaenicke's deep dive into mil/aero trusted computing software is well worth a read.
Jamie Whitney, Associate Editor
Ready to make a purchase? Search the Intelligent Aerospace Buyer's Guide for companies, new products, press releases, and videos