Making information flow explicit in HiStar Citation

نویسندگان

  • Nickolai Zeldovich
  • Silas Boyd-Wickizer
  • Eddie Kohler
  • David Mazières
چکیده

HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify precise data security policies without unduly limiting the structure of applications. HiStar’s security features make it possible to implement a Unix-like environment with acceptable performance almost entirely in an untrusted user-level library. The system has no notion of superuser and no fully trusted code other than the kernel. HiStar’s features permit several novel applications, including an entirely untrusted login process, separation of data between virtual private networks, and privacypreserving, untrusted virus scanners.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research Interests Research Projects

2005–present HiStar: a secure operating system [2]. Led the HiStar project on designing and developing a new operating system that allows applications to minimize the amount of trusted code. HiStar allows applications to specify precise data security policies by specifying how different information can flow through the system. As a result, small amounts of trusted code can reason about the secu...

متن کامل

Hardware Enforcement of Application Security Policies Using Tagged Memory

Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and enforced in an OS kernel, providing a strong assurance of security. This paper shows that enforce...

متن کامل

Energy Management in Mobile Devices with the Cinder Operating System Citation

We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control – isolation, delegation, and subdivision – and show how usin...

متن کامل

مروری بر تحلیل استنادی و گزارش استنادی مجله‌ها و کاربرد آن در انتخاب نشریات لاتین

Nowadays, English publications are considered as one of the significant and essential resources in university libraries. Enhancement of the price of publications along with the increase in number of published journals has made it difficult for libraries to provide all the information needed by researchers. Therefore, the necessity of a criterion for selecting superior journals is increasingly f...

متن کامل

Drawing Co-Citation Networks of Corona Virus Studies

Background and Aim: The purpose of the present study is to map the coronavirus domain citation network to better understand this domain based on all other citation networks.  Materials and Methods: The present study is applied in terms of purpose, and is descriptive scientometrics in terms of type, which has been done with the all-citation method. In this study, all scientific publications on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006