<samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
<ul id="e4iaa"></ul>
<blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>

      代寫(xiě)DSCI 525、Python/c++程序設(shè)計(jì)代做

      時(shí)間:2024-03-23  來(lái)源:  作者: 我要糾錯(cuò)



      DSCI 525 Semester Project
      Spring 2024
      Completion of the semester project is to be an independent, individual effort for each student.
      Communication with fellow students for this assignment, attempting to benefit from work of another
      student, past or present and similar behavior that defeats the intent of an assignment is unacceptable to the
      University. Such behavior will be treated as a violation of USC academic integrity standards, which are
      summarized in the on-line tutorial available at
      http://www.usc.edu/libraries/about/reference/tutorials/academic_integrity/index.php
      Nature of the assignment
      The purpose of this project is to compare and contrast two trusted system requirement models and two
      implementations.
      The first requirement model is the Trusted Network Interpretation (TNI). The implementation case study
      of TNI is the Gemini Trusted Network Processor (GTNP). The TNI requirements and GTNP
      implementation represent a reference monitor concept-based approach that is referred to as a traditional
      security kernel (SK). The second requirement model is the Separation Kernel Protection Profile. The
      implementation case study of SKPP is the Green Hills Software (GHS) INTEGRITY-178B (I-178B). The
      SKPP requirements and I-178B implementation represent a variation of the reference monitor concept
      instituted in a separation kernel.
      In not less than 10 and no more than 20 pages prepare a report in PDF format with a font size 12, single
      column, single spaced. There are no other specific requirements related to the formatting of your report.
      Figures, tables, and the like are not included in the 20-page maximum page count. There is no penalty for
      exceeding the limit, however text beyond the 20-page limit will not be considered in grading. Submit the
      report in electronic form on USC D2L.
      Description of the semester project
      Based on information you gather and review, you are to report your research and analysis on the following
      topics:
      1. How SKPP evaluation requirements [4] line up against the TCSEC/TNI security kernel evaluation
      requirements. This project should focus on the requirements for TNI Mandatory Only
      Components (M-Components), as codified in TNI Sections 4.1.1 (Policy) and A.3.1 (M-Comp).
      The associated 25 RVM evaluation factors are detailed in extracts from the TNI (which includes
      TCSEC requirements outlined in [1]). Given the constrained length of the project report, this
      analysis should be brief and concise conclusions for each of the 25 RVM evaluation factors,
      referring to the factors by name without wasting space repeating the text of the requirements.
      Be specific, include concrete references to the parts of the reviewed documents to support your
      arguments.
      2. Relative strengths and weaknesses of design and development techniques in separation kernel and
      specifically INTEGRITY-178B product as compared and contrasted to those in the GEMSOS
      security kernel, including a comparison of the respective kernel APIs and hardware requirements.
      Note that you should be informed by the GEMSOS Final Evaluation Report (FER) [2], Green Hills
      Software INTEGRITY-178B Separation Kernel Security Target document [5], and Common
      Criteria Evaluation and Validation Scheme Validation Report [3].
      3. Finally, based on all the above you are to provide final conclusions on the suitability of these two
      products for deployment in the face of a witted adversary intent to violate the allocated policies.
      In your report you should particularly concentrate on the problem of subversion and how it is addressed
      in both cases.
      References (available on Piazza in Resources)
      Your analysis is to be based on a thorough review and understanding of reference material from the
      published literature that includes, but is not limited to the following:
      [1] An extract from the Trusted Network Interpretation (TNI) of the “Security Requirements for a Class
      A1 M-Component”. (A1M)
      [2] Final Evaluation Report, Gemini Computers, Incorporated, Gemini Trusted Network Processor,
      National Computer Security Center, 28 June 1995. (FER)
      [3] Common Criteria Evaluation and Validation Scheme Validation Report “Green Hills Software INICR750-0402-GH01_Rel INTEGRITY-178B Separation Kernel”, version 0.5, 31 January 2011.
      (Integrity-178B-VR)
      [4] U.S. Government Protection Profile for Separation Kernels in Environments Requiring High
      Robustness (SKPP), Version 1.03, 29 June 2007. (SKPP)
      [5] Green Hills Software INTEGRITY-178B Separation Kernel Security Target, Version 4.2, May 31,
      2010. (Integrity-178B-ST)
      Grading
      The total of 100 points for the project will be allocated as follows:
      1. [50 points] Systematic comparison between these security requirements models and
      implementations, using the TNI evaluation factors as the vehicle for comparison.
      2. [20 points] Discussion of how subversion is addressed in both cases.
      3. [20 points] Discussion of the relative strengths and weaknesses of these two design and
      implementation techniques.
      4. [10 points] Conclusions - a per-factor consensus on the compatibility between the requirement
      models and their respective implementations.
      請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

      標(biāo)簽:

      掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
    • 上一篇:代做CSMBD21、代寫(xiě)Java, C/C++, Python編程
    • 下一篇:FIT5216代做、代寫(xiě)Java/c++程序設(shè)計(jì)
    • 無(wú)相關(guān)信息
      昆明生活資訊

      昆明圖文信息
      蝴蝶泉(4A)-大理旅游
      蝴蝶泉(4A)-大理旅游
      油炸竹蟲(chóng)
      油炸竹蟲(chóng)
      酸筍煮魚(yú)(雞)
      酸筍煮魚(yú)(雞)
      竹筒飯
      竹筒飯
      香茅草烤魚(yú)
      香茅草烤魚(yú)
      檸檬烤魚(yú)
      檸檬烤魚(yú)
      昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
      昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
      昆明旅游索道攻略
      昆明旅游索道攻略
    • 福建中專(zhuān)招生網(wǎng) NBA直播 短信驗(yàn)證碼平臺(tái) WPS下載

      關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

      Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
      ICP備06013414號(hào)-3 公安備 42010502001045

      主站蜘蛛池模板: 久久午夜夜伦鲁鲁片免费无码影视 | 日韩精品人妻系列无码专区免费| 无码色偷偷亚洲国内自拍| 无码高潮少妇毛多水多水免费| 国产亚洲?V无码?V男人的天堂 | 无码人妻久久一区二区三区免费丨| 无码人妻精品一区二区蜜桃百度| 色窝窝无码一区二区三区色欲| 日韩精品无码人成视频手机| 亚洲一区无码中文字幕乱码| 免费a级毛片无码av| 久久久久精品国产亚洲AV无码| 宅男在线国产精品无码| 亚洲性无码一区二区三区| 中文字幕乱偷无码av先锋蜜桃| 无码人妻视频一区二区三区| 久久精品中文字幕无码| 国产av无码久久精品| 亚洲乱亚洲乱妇无码| 亚洲AV无码成人精品区在线观看 | 亚洲国产精品无码久久久久久曰 | 亚洲AV无码一区二区三区在线观看| 日韩精品久久无码人妻中文字幕| 国模无码人体一区二区| 亚洲av日韩av无码黑人| 国产网红无码精品视频| 日韩精品中文字幕无码一区| 13小箩利洗澡无码视频网站免费| 国产成人无码网站| 无码人妻aⅴ一区二区三区有奶水 亚洲AV无码专区在线厂 | 亚洲级αV无码毛片久久精品| 亚洲?V无码成人精品区日韩 | 乱人伦人妻中文字幕无码| 好了av第四综合无码久久| 精品日韩亚洲AV无码| 久久精品亚洲AV久久久无码| 少妇精品无码一区二区三区| 人妻无码αv中文字幕久久| 久久AV无码精品人妻糸列| 免费无码精品黄AV电影| 亚洲大尺度无码无码专线一区 |