Secure Applications Need Flexible Operating Systems
نویسندگان
چکیده
As information exchange over wide area networks becomes an increasingly essential component of new applications, firewalls will no longer provide an adequate defense against malicious attackers. Individual workstations will need to provide strong enough security to contain malicious processes and prevent the domino effect of a pierced firewall. Some of the most commonly found security holes today result from the fact that simple operations can be surprisingly difficult to implement correctly on top of a traditional POSIX-like interface. We claim that by combining hierarchically-named capabilities, a novel generalization of the Unix user and group ID concept, with the low-level system calls of an exokernel operating system, we can achieve a system call interface flexible enough to avoid much of the complexity that often leads to security holes in discretionary access control operating systems like Unix.
منابع مشابه
Towards Secure Web
The Web is now the dominant platform for delivering interactive applications to hundreds of millions of users. Correspondingly, web browsers have become the de facto operating system for hosting these web-based applications (web apps). Unfortunately, web apps, browsers, and operating systems have all become popular targets for web-based attacks, intensifying the need for secure web browsing sys...
متن کاملA secure , field upgradeable operating system architecture for Blackfin Microprocessors a
Analog Devices’ Blackfin processors implement a very flexible instruction set architecture geared for both control and signal processing applications. With dual MACs, a Memory Management Unit (MMU), and a control friendly instruction set, this is truly a flexible microprocessor. In particular, the inclusion of an MMU in a low cost, high performance processor with automotive peripherals has lead...
متن کاملMULTI-OBJECTIVE ROUTING AND SCHEDULING IN FLEXIBLE MANUFACTURING SYSTEMS UNDER UNCERTAINTY
The efficiency of transportation system management plays an important role in the planning and operation efficiency of flexible manufacturing systems. Automated Guided Vehicles (AGV) are part of diversified and advanced techniques in the field of material transportation which have many applications today and act as an intermediary between operating and storage equipment and are routed and contr...
متن کاملThe Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Although public awareness of the need for secu rity in computing systems is growing rapidly, current efforts to provide security are unlikely to succeed. Current security efforts suffer from the flawed assumption that adequate security can be provided in applications with the existing security mechanisms of mainstream operating systems. In reality, the need for secure operating systems is grow...
متن کاملKSOS-Computer network applications
The need for multilevel security in computer systems has become well known. In the military, lacking such systems makes costs higher than they should be because of the need either to replicate facilities or perform "color changes" (shutting down and purging systems between uses at varying levels) in order to deny less-cleared users access to highly-classified information, and desirable function...
متن کامل