Proceedings of the 2006 Conference on Pattern Languages of Programs 2006
DOI: 10.1145/1415472.1415484
|View full text |Cite
|
Sign up to set email alerts
|

Even more patterns for secure operating systems

Abstract: An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Many of the reported attacks to Internetbased systems have occurred through the OS (kernel and utilities). The security of individual execution time actions such as process creation, memory protection, and the general architecture of the OS are very important and we have previously presented patterns for these functions. We present here patterns for the representa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 2 publications
0
8
0
1
Order By: Relevance
“…This book had 46 security patterns from the domain of enterprise security and risk management, identification and authentication, access control, accounting, firewall architecture, and secure internet application. This book aggregates many previous works on security patterns, including the first catalog of security patterns [40], Markus Schumacher [32] and Eduardo Fernandez's [6,10] work on security patterns, etc. Steel et al [33] described 23 security patterns for J2EE based applications, Web services and identity management in their book.…”
Section: Security Pattern Sourcesmentioning
confidence: 95%
“…This book had 46 security patterns from the domain of enterprise security and risk management, identification and authentication, access control, accounting, firewall architecture, and secure internet application. This book aggregates many previous works on security patterns, including the first catalog of security patterns [40], Markus Schumacher [32] and Eduardo Fernandez's [6,10] work on security patterns, etc. Steel et al [33] described 23 security patterns for J2EE based applications, Web services and identity management in their book.…”
Section: Security Pattern Sourcesmentioning
confidence: 95%
“…To protect the SUI process from other processes and to allow some applications additional privileges, the Secure Process [17] pattern is used to isolate processes and assign authorization rights. Some applications have special dedicated meaning and hence have additional privileges.…”
Section: H Related Patternsmentioning
confidence: 99%
“…The first type is useful when we want to correlate patterns at different abstraction levels or we want to understand or explain a complete system. The second type is better when we are working at a specific level, e.g., designing an operating system [3,4].…”
Section: Use Of Abstract Patternsmentioning
confidence: 99%
“…These patterns should specify only the fundamental characteristics of the mechanism or service, not specific software aspects. Most works on security patterns [7,8] emphasize concrete patterns that solve security problems at given architectural levels or units, e.g., secure VAS in operating systems [3]. In fact, we have not seen any work where this abstraction level is explicitly considered.…”
Section: Introductionmentioning
confidence: 99%