Authentication in Ethos
نویسندگان
چکیده
Authentication primitives should be simple, general, and robust against attack. We describe the authentication mechanisms of Ethos, an experimental, clean-slate operating system that has been designed for security. We reexamine and redesign software layering for authentication, and evaluate the resulting security properties. In Ethos, integrated network security and simplified local authentication shrink application code size and prevent application-based authentication failures, making systems more robust against attack.
منابع مشابه
Simple-to-use, Secure-by-design Networking in Ethos
We describe networking in Ethos, a clean-slate operating system we designed to meet the security requirements which arise on the Internet. Through careful layering, Ethos makes network encryption, authentication, and authorization protections compulsory. This means that application developers can neither avoid nor incorrectly use them, and system administrators need not audit their use. We show...
متن کاملPoster: Rethinking Operating System Interfaces to Support Robust Applications
In current systems, application developers must provide substantial security-critical code—including code to handle authentication—in their applications. The result is that application flaws often undermine system security. We are building Ethos, an Operating System (OS) that leverages the kernel’s complete mediation property to guarantee more security protections—including network encryption a...
متن کاملTo Have an Ethos Transplant, as It Were: Iranian Organizations in Washington DC in Early 21st Century
Based on eighteen months of ethnographic fieldwork from 2004 to 2006 among a range of Iranian organizations in Washington, D.C., this article argues that the studied organizations were engaged, without being always necessarily aware of it or formulating it as such, in what we may call an “ethos transplant:” a transformation of “Iranian character” and political culture to make it more susceptibl...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملLogos and Ethos: The Civil Religion in the Political Philosophy of Jean-Jacques Rousseau
This article explores the concept of civil religion from the perspective of Jean-Jacques Rousseau. It starts with a discussion of the essence of sovereignty as the implementation of general will, which, the author explains, is manifested in the obedience of the laws. The article then discusses the way in which, in Rousseau’s view, institutional mechanisms work and thereupon explores how he envi...
متن کامل