KernelSec: An Authorization Model in the Operating System Kernel
نویسندگان
چکیده
An authorization system is at the core of the mechanisms that provide system security. It is responsible for allowing or denying user actions (like request to read or write a file, to connect to a website or kill a process). Despite considerable research in authorization systems, widely deployed authorization systems struggle to cope with today’s security needs. Some of the challenges facing today’s computer systems are
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملReconstructing Trust Management
We present a trust management kernel that clearly separates authorization and structured distributed naming. Given an access request and supporting credentials, the kernel determines whether the request is authorized. We prove soundness and completeness of the authorization system without names and prove that naming is orthogonal to authorization in a precise sense. The orthogonality theorem gi...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملKernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
In modern operating system kernels level security is not present and a well-known approach to protecting systems from malicious activity is through the deployment of Mandatory Access Control (MAC). Existing MAC solutions belongs to authorization mechanism however authorization mechanism along is not sufficient for achieving system assurance. Today’s modern computing era operating system Kernel ...
متن کاملA Lightweight Method for Building Reliable Operating Systems Despite Unreliable Device Drivers
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy driver can wipe out kernel tables and bring the system crashing to a halt. We have greatly mitigated this problem by reducing the kernel to an absolute minimum and running each driver as a separate, unprivileged process in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006