top - download
⟦4cafe530e⟧ Wang Wps File
Length: 3187 (0xc73)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN35.01«
Derivation
└─⟦61f87be83⟧ Bits:30006024 8" Wang WCS floppy, CR 0420A
└─ ⟦this⟧ »~ORPHAN35.01«
WangText
otected against tampening or by passing by other software components. These rewuirements
have much influence upon the development cycle of the software. In addition the security
software must take full advantage of available hardware protection feaure.
A number of different levels of ambitions must
be defined for the rigidness of security verification,
ranging from formal specification of the security
policy and automated verfication that the system
design in consistent with the policy to an informal
description and verification of the security properties
of the system.
The project will develop standards and description
tools for design and implementation of the secrity
software and investigate the feasibility of formal
specification.
d) H̲a̲r̲d̲w̲a̲r̲e̲ ̲S̲u̲p̲p̲o̲r̲t̲ ̲f̲o̲r̲ ̲S̲e̲c̲u̲r̲e̲ ̲S̲y̲s̲t̲e̲m̲
There are two separate areas of the hardware architecture
which are of particular importance for support
of security:
- Hardware reiability.
The hardware must have extensive mechanisms
for detection of hardware malfunctions, such
that no errors can occur without detection.
- Protection mechanisms.
The hardware must offer extensive facilities
for small protection domais and for fast domain
swithching. It will thereby be possible to
structure the security software into small,
verifiable modules, which can only interfere
with each other and with the rest of the software
via the information channels specified in th4̲5̲3̲7̲A̲…00…ESPRIT
- WORKPLAN 1984 …00…pan …00…FE
…00…EJ SLETTES …00…2̲7̲…00…0̲1̲…00…8̲4̲…00…1̲1̲…00…5̲6̲…00…
̲ ̲ ̲2̲…00…0̲8̲…00… ̲ ̲7̲0̲0̲3̲…00…20…00…02…00…84…00…15…00…20…00… …00…00…00… 12…00…1̲7̲…00…0̲2̲…00…8̲4̲…00…0̲8̲…00…3̲1̲…00…05…00…03…00…84…00…14…00…16…00…0420A…00…
6…00… ̲ ̲ ̲2̲…00…26…00… 172…00… ̲ ̲8̲1̲48…00……14……00……00……00……13……02……00……10……00……01……10…F'…10……11……00…`*̲J̲…15……05……00……00……00……00……00……00……00…8
1…00……86…1 …02… …02… …02… …02…
ESPRIT - WORKPLAN 1984 SYS/840130
SW TECHNOLOGY/ADV. INFO. PROC. Page
#
S̲u̲b̲j̲e̲c̲t̲ ̲A̲r̲e̲a̲:̲ ̲ ̲A̲d̲v̲a̲n̲c̲e̲d̲ ̲I̲n̲f̲o̲r̲m̲a̲t̲i̲o̲n̲ ̲P̲r̲o̲c̲e̲s̲s̲i̲n̲g̲
TOPIC: A̲r̲t̲i̲f̲i̲c̲i̲a̲l̲ ̲I̲n̲t̲e̲l̲l̲i̲g̲e̲n̲c̲e̲ ̲w̲i̲t̲h̲i̲n̲ ̲A̲i̲r̲ ̲T̲r̲a̲f̲f̲i̲c̲ ̲C̲o̲n̲t̲r̲o̲l̲
The importance of efficient Air Traffic Control procedures is
wel established in society today. Many of these procedures are
dependant on human resources, but could be automated in order
to releave the human role for supervision and emergency interceptions.
S̲y̲s̲t̲e̲m̲ ̲D̲e̲s̲c̲r̲i̲p̲t̲i̲o̲n̲
The use of reporting of flight scedules leading to update of
a data base and followed by a scheduling of all events could
be automated and implemented on highly reliable systems using
dublication or redundancy techniques. This type of information
could be automatically compared toradar output information in
order to alarm on any discrepancies between planned data and
actual data for a management by exception concept.
An Air Traffic Control system which uses AI could be coupled
directly with the radio communication system ad give verbal
directions to the airplane crew in or before emergency situations.
The result of a calculated collision course could be to send
an order directly to the autopilot on the airplane, in order
to provide fast and adequate reaction to any