代寫DSCI 525、Python/c++程序設計代做

            時間:2024-03-23  來源:  作者: 我要糾錯



            DSCI 525 Semester Project
            Spring 2024
            Completion of the semester project is to be an independent, individual effort for each student.
            Communication with fellow students for this assignment, attempting to benefit from work of another
            student, past or present and similar behavior that defeats the intent of an assignment is unacceptable to the
            University. Such behavior will be treated as a violation of USC academic integrity standards, which are
            summarized in the on-line tutorial available at
            http://www.usc.edu/libraries/about/reference/tutorials/academic_integrity/index.php
            Nature of the assignment
            The purpose of this project is to compare and contrast two trusted system requirement models and two
            implementations.
            The first requirement model is the Trusted Network Interpretation (TNI). The implementation case study
            of TNI is the Gemini Trusted Network Processor (GTNP). The TNI requirements and GTNP
            implementation represent a reference monitor concept-based approach that is referred to as a traditional
            security kernel (SK). The second requirement model is the Separation Kernel Protection Profile. The
            implementation case study of SKPP is the Green Hills Software (GHS) INTEGRITY-178B (I-178B). The
            SKPP requirements and I-178B implementation represent a variation of the reference monitor concept
            instituted in a separation kernel.
            In not less than 10 and no more than 20 pages prepare a report in PDF format with a font size 12, single
            column, single spaced. There are no other specific requirements related to the formatting of your report.
            Figures, tables, and the like are not included in the 20-page maximum page count. There is no penalty for
            exceeding the limit, however text beyond the 20-page limit will not be considered in grading. Submit the
            report in electronic form on USC D2L.
            Description of the semester project
            Based on information you gather and review, you are to report your research and analysis on the following
            topics:
            1. How SKPP evaluation requirements [4] line up against the TCSEC/TNI security kernel evaluation
            requirements. This project should focus on the requirements for TNI Mandatory Only
            Components (M-Components), as codified in TNI Sections 4.1.1 (Policy) and A.3.1 (M-Comp).
            The associated 25 RVM evaluation factors are detailed in extracts from the TNI (which includes
            TCSEC requirements outlined in [1]). Given the constrained length of the project report, this
            analysis should be brief and concise conclusions for each of the 25 RVM evaluation factors,
            referring to the factors by name without wasting space repeating the text of the requirements.
            Be specific, include concrete references to the parts of the reviewed documents to support your
            arguments.
            2. Relative strengths and weaknesses of design and development techniques in separation kernel and
            specifically INTEGRITY-178B product as compared and contrasted to those in the GEMSOS
            security kernel, including a comparison of the respective kernel APIs and hardware requirements.
            Note that you should be informed by the GEMSOS Final Evaluation Report (FER) [2], Green Hills
            Software INTEGRITY-178B Separation Kernel Security Target document [5], and Common
            Criteria Evaluation and Validation Scheme Validation Report [3].
            3. Finally, based on all the above you are to provide final conclusions on the suitability of these two
            products for deployment in the face of a witted adversary intent to violate the allocated policies.
            In your report you should particularly concentrate on the problem of subversion and how it is addressed
            in both cases.
            References (available on Piazza in Resources)
            Your analysis is to be based on a thorough review and understanding of reference material from the
            published literature that includes, but is not limited to the following:
            [1] An extract from the Trusted Network Interpretation (TNI) of the “Security Requirements for a Class
            A1 M-Component”. (A1M)
            [2] Final Evaluation Report, Gemini Computers, Incorporated, Gemini Trusted Network Processor,
            National Computer Security Center, 28 June 1995. (FER)
            [3] Common Criteria Evaluation and Validation Scheme Validation Report “Green Hills Software INICR750-0402-GH01_Rel INTEGRITY-178B Separation Kernel”, version 0.5, 31 January 2011.
            (Integrity-178B-VR)
            [4] U.S. Government Protection Profile for Separation Kernels in Environments Requiring High
            Robustness (SKPP), Version 1.03, 29 June 2007. (SKPP)
            [5] Green Hills Software INTEGRITY-178B Separation Kernel Security Target, Version 4.2, May 31,
            2010. (Integrity-178B-ST)
            Grading
            The total of 100 points for the project will be allocated as follows:
            1. [50 points] Systematic comparison between these security requirements models and
            implementations, using the TNI evaluation factors as the vehicle for comparison.
            2. [20 points] Discussion of how subversion is addressed in both cases.
            3. [20 points] Discussion of the relative strengths and weaknesses of these two design and
            implementation techniques.
            4. [10 points] Conclusions - a per-factor consensus on the compatibility between the requirement
            models and their respective implementations.
            請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

            標簽:

            掃一掃在手機打開當前頁
          1. 上一篇:代做CSMBD21、代寫Java, C/C++, Python編程
          2. 下一篇:FIT5216代做、代寫Java/c++程序設計
          3. 無相關信息
            昆明生活資訊

            昆明圖文信息
            蝴蝶泉(4A)-大理旅游
            蝴蝶泉(4A)-大理旅游
            油炸竹蟲
            油炸竹蟲
            酸筍煮魚(雞)
            酸筍煮魚(雞)
            竹筒飯
            竹筒飯
            香茅草烤魚
            香茅草烤魚
            檸檬烤魚
            檸檬烤魚
            昆明西山國家級風景名勝區
            昆明西山國家級風景名勝區
            昆明旅游索道攻略
            昆明旅游索道攻略
          4. 福建中專招生網 NBA直播 短信驗證碼平臺 幣安官網下載 WPS下載

            關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

            Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
            ICP備06013414號-3 公安備 42010502001045

            主站蜘蛛池模板: 国内精品视频一区二区三区八戒| 精品国产AⅤ一区二区三区4区 | 99精品国产一区二区三区不卡| 亚洲中文字幕一区精品自拍| 午夜无码一区二区三区在线观看| 久久久久人妻精品一区蜜桃| 亚洲一区二区三区免费| 无码一区二区三区在线观看| 国产在线一区二区杨幂| 亚洲AV无码一区二区三区鸳鸯影院 | 精品无码成人片一区二区| 亚洲国产精品第一区二区| 日本道免费精品一区二区| 亚洲AV无码国产一区二区三区| 国产一区二区三区影院| 在线欧美精品一区二区三区 | 国产成人精品无码一区二区 | 国产激情精品一区二区三区| 日韩一区二区三区电影在线观看| 色一情一乱一区二区三区啪啪高| 久久精品国产第一区二区三区| 久久伊人精品一区二区三区 | 亚洲国产一区二区三区| 一区二区三区在线观看视频| 亚洲一区二区三区在线播放| 国产一区二区三区高清视频| 国产伦理一区二区| 日韩欧国产精品一区综合无码| 亚洲一区二区女搞男| 久久伊人精品一区二区三区 | 日韩经典精品无码一区| 日本精品一区二区久久久| 国产伦精品一区二区三区视频金莲 | 日本一区二区不卡在线| 天堂资源中文最新版在线一区| 男女久久久国产一区二区三区| 加勒比无码一区二区三区| 精品一区二区AV天堂| 中文字幕一区二区三区在线不卡| 人妻AV一区二区三区精品| 无码少妇一区二区浪潮免费|