Making information flow explicit in HiStar Citation
نویسندگان
چکیده
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify precise data security policies without unduly limiting the structure of applications. HiStar’s security features make it possible to implement a Unix-like environment with acceptable performance almost entirely in an untrusted user-level library. The system has no notion of superuser and no fully trusted code other than the kernel. HiStar’s features permit several novel applications, including an entirely untrusted login process, separation of data between virtual private networks, and privacypreserving, untrusted virus scanners.
منابع مشابه
Research Interests Research Projects
2005–present HiStar: a secure operating system [2]. Led the HiStar project on designing and developing a new operating system that allows applications to minimize the amount of trusted code. HiStar allows applications to specify precise data security policies by specifying how different information can flow through the system. As a result, small amounts of trusted code can reason about the secu...
متن کاملHardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and enforced in an OS kernel, providing a strong assurance of security. This paper shows that enforce...
متن کاملEnergy Management in Mobile Devices with the Cinder Operating System Citation
We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control – isolation, delegation, and subdivision – and show how usin...
متن کاملمروری بر تحلیل استنادی و گزارش استنادی مجلهها و کاربرد آن در انتخاب نشریات لاتین
Nowadays, English publications are considered as one of the significant and essential resources in university libraries. Enhancement of the price of publications along with the increase in number of published journals has made it difficult for libraries to provide all the information needed by researchers. Therefore, the necessity of a criterion for selecting superior journals is increasingly f...
متن کاملDrawing Co-Citation Networks of Corona Virus Studies
Background and Aim: The purpose of the present study is to map the coronavirus domain citation network to better understand this domain based on all other citation networks. Materials and Methods: The present study is applied in terms of purpose, and is descriptive scientometrics in terms of type, which has been done with the all-citation method. In this study, all scientific publications on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006