A Java Operating System as the Foundation of a Secure Network Operating System
نویسندگان
چکیده
Errors in the design and implementation of operating system kernels and system programs lead to security problems that very often cause a complete breakdown of all security mechanisms of the system. We present the architecture of the JX operating system, which avoids two categories of these errors. First, there are implementation errors, such as buffer overflows, dangling pointers, and memory leaks, caused by the use of unsafe languages. We eliminate these errors by using Java—a typesafe language with automatic memory management—for the implementation of the complete operating system. Second, there are architectural errors caused by complex system architectures, poorly understood interdependencies between system components, and minimal modularization. JX addresses these errors by following well-known principles, such as least-privilege and separation-of-privilege, and by using a minimal security kernel, which, for example, excludes the filesystem. Java security problems, such as the huge trusted class library and reliance on stack inspection are avoided. Code of different trustworthiness or code that belongs to different principals is separated into isolated domains. These domains represent independent virtual machines. Sharing of information or resources between domains can be completely controlled by the security kernel.
منابع مشابه
Evaluating the potential of cascading failure occurrence due to line outage in power systems by information theory method and radial base functions
In power systems, a connected topology is created to increase reliability and economic performance. Increasing dimensions of power systems on the one hand and the need to continuously monitor power systems for secure operation on the other challenge the evaluation of power system security. In such conditions, due to economic conditions and considering the fast growth of consumers in a power sys...
متن کاملUPFC Siting and Sizing in Power Network Using Two Different Evolutionary Algorithm
In emerging electric power systems, increased transactions often lead to the situations where the system no longer remains in secure operating region. The flexible Ac transmission system (FACTS) controllers can play an important role in the power system security enhancement. However, due to high capital investment, it is necessary to locate these controllers optimally in the power system. FACTS...
متن کاملRisk Analysis of Operating Room Using the Fuzzy Bayesian Network Model
To enhance Patient’s safety, we need effective methods for risk management. This work aims to propose an integrated approach to risk management for a hospital system. To improve patient’s safety, we should develop flexible methods where different aspects of risk and type of information are taken into consideration. This paper proposes a fuzzy Bayesian network to model and analyze risk in the op...
متن کاملDistributed Systems Security
A distributed system is a set of autonomous units connected through some network. The most used distribution architectures are CORBA, DCOM, and RMI. CORBA is an architectural standard for interoperability of systems using different operating systems and languages. DCOM is Microsoft's distribution architecture for COM components. It only allows interoperation of Microsoft's systems. RMI (Remote ...
متن کاملPower Differential based Wide Area Protection
Current differential based wide area protection (WAP) has recently been proposed as a technique to increase the reliability of protection systems. It increases system stability and can prevent large contingencies such as cascading outages and blackouts. This paper describes how power differential protection (PDP) can be used within a WAP and shows that the algorithm operates correctly for a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002