1983
DOI: 10.1109/mc.1983.1654439
|View full text |Cite
|
Sign up to set email alerts
|

Security Kernel Design and Implementation: An Introduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

1995
1995
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(25 citation statements)
references
References 8 publications
0
25
0
Order By: Relevance
“…A security kernel [2] is a fail-controlled subsystem trusted to execute a few functions correctly, albeit immersed in an environment subjected to malicious faults. In the past, security kernels have mainly been used as intrusion prevention devices, by supporting the mediation/protection of all system interactions, and/or all accesses to system resources.…”
Section: Introductionmentioning
confidence: 99%
“…A security kernel [2] is a fail-controlled subsystem trusted to execute a few functions correctly, albeit immersed in an environment subjected to malicious faults. In the past, security kernels have mainly been used as intrusion prevention devices, by supporting the mediation/protection of all system interactions, and/or all accesses to system resources.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is inherently incapable of enforcing security [31]. Some operating systems over the years deploy mandatory access control (MAC) for controlling, even malicious, programs, but mandatory access control systems that aim to enforce strong integrity guarantees [4,12,23,30,53] have not seen broad use, and the application of MAC enforcement to conventional systems [41,43] has been hampered by complexity and enforcement of informal goals, such as least privilege [51]. Solworth argues for improved testing effectiveness and reduced complexity in operating systems [56], which we agree are insufficient in current MAC systems.…”
Section: System Configurationmentioning
confidence: 99%
“…[2] The label space may support confidentiality and integrity policies as well as non-hierarchical categories, [26] A security kernel usually provides a hardware-supported ring abstraction [43][44] and can host trusted subjects. [39] The rings can separate applications within a process.…”
Section: Security Kernelmentioning
confidence: 99%