His areas of interest and research include Interoperability Management Theory, interculture, cultural security, comparative transfer analyses (of human exchange dynamics), the quantum leadership domain, the hierarchy of knowledge, the problems and advantages of locality, the Enterprise Security Kernel
, and the sustainability of cultures, among others.
The Americans have developed a "security kernel" technology for solving their problem, but we need not be concerned--they recently discontinued work on this technology.
However, it will trace the outlines of the computer security problem and show how the security kernel approach meets the requirements for a workable solution--although recent termination has nipped in the bud very promising work toward a solution.
Recent logically rigorous work has resulted in a security kernel technology.
The security kernel approach, which is subject to such methodical technical analysis, will also be discussed.
A major step toward solution was the introduction in 1972 of the security kernel (17) technology, which provided a scientific foundation for demonstrably effective internal security controls.
Of the software in the system, only the security kernel ...
A security kernel is a small set of computer program instructions and associated hardware that controls all access by users (viz., through their programs) to information.
Security kernel design is derived directly from a precise specification (viz., a mathematical model) of its function.
The chief distinguishing characteristic (from whence its name) of the security kernel concept is that a kernel represents a distinct internal security perimeter.
In the security community, efforts focused on properties of multilevel security kernels
and supposedly small trusted computing bases have had some success in formalizing requirements and encouraging improved system architectures.