Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Design and Implementation of Security OS: A Case Study

In: Computing and Informatics, vol. 27, no. 6
S. Kim - H. Son - S. Han

Details:

Year, pages: 2008, 931 - 951
Keywords:
Security OS, security kernel, access control, cryptographic file system, PAM
About article:
The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel level, such as a reference monitor and a cryptographic file system, has been increasingly emphasized as the weaknesses and limitation of mechanisms at the user level have been revealed. However, when a system has only a reference monitor, the system is vulnerable to a low-level detour or a physical attack. In addition, when a system has only a cryptographic file system, the file system has a difficulty in protecting itself. To address these problems, we designed and developed a security OS with a reference monitor, a cryptographic file system, authentication limitation, and session limitation. Here we describe the model, its implementation, and its overheads.
How to cite:
ISO 690:
Kim, S., Son, H., Han, S. 2008. Design and Implementation of Security OS: A Case Study. In Computing and Informatics, vol. 27, no.6, pp. 931-951. 1335-9150.

APA:
Kim, S., Son, H., Han, S. (2008). Design and Implementation of Security OS: A Case Study. Computing and Informatics, 27(6), 931-951. 1335-9150.