As part of the general goal of providing secure computer systems, the design of verifiably secure operating systems is one of the most important tasks. This paper addresses the problem by defining security in terms of a model and proposing a set of principles which we feel should be satisfied in a secure operating system. Informally, an operating system is secure if its users completely control the use of all information which they introduce. Four key partitions are identified: user interface functions, user invoked services, background services, and the security kernel. Principles are then defined to insure that interface functions provide a safe initial environment for executing user programs, user called services are confined, b...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
The predominant general classes of problems that impact secure operating systems for NSI or Military...
This paper describes the development of a formal specification of a secure operating system architec...
National Security Agency Although public awareness of the need for security in computing systems is ...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted har...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Certain security choices done on the operating system level can mitigate harm done by an malicious a...
Host compromise is a serious security problem for operating systems. Most previous solutions based o...
A confined program is one which is unable to leak information to an unauthorized party or modify una...
Prepared for: USAECOM CONTRACT AABO3-73-C-1454 SRI Project 2581 This report summarizes work to date ...
For over 30 years, system software has been bound by com-patibility with legacy applications. The sy...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
The predominant general classes of problems that impact secure operating systems for NSI or Military...
This paper describes the development of a formal specification of a secure operating system architec...
National Security Agency Although public awareness of the need for security in computing systems is ...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
It is widely believed that security and usability are two antagonistic goals in system design. This ...
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted har...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Certain security choices done on the operating system level can mitigate harm done by an malicious a...
Host compromise is a serious security problem for operating systems. Most previous solutions based o...
A confined program is one which is unable to leak information to an unauthorized party or modify una...
Prepared for: USAECOM CONTRACT AABO3-73-C-1454 SRI Project 2581 This report summarizes work to date ...
For over 30 years, system software has been bound by com-patibility with legacy applications. The sy...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
The predominant general classes of problems that impact secure operating systems for NSI or Military...
This paper describes the development of a formal specification of a secure operating system architec...