Hierarchical Approach to Computer System Integrity

نویسندگان

  • John J. Donovan
  • Stuart E. Madnick
چکیده

and possibly error-prone or malicious users are to coexist on the same computer system. In this paper, we show that a hierarchically structured operating system, such as produced by a virtual machine system, that combines a virtual machine monitor with several independent operating systems (V M M ~ O S) , provides substantially better software security than a conventional two-level multiprogramming operating system approach. This added protection is derived from redundant security using independent mechanisms that are inherent in the design of most V M M I O S systems. Such a system can be obtained by exploiting existing software resources. Computer systems have taken on essential roles in many organizations. As such, concern for system integrity has become increasingly important. At the same time, economies of scale and centralization of operation often make it desirable to merge many separate applications onto a single computer system. In this paper, we explore operating system software approaches to improving system integrity in a shared facility. Operating system integrity may be said to exist when an operating system functions correctly under all circumstances. It is helpful to further divide the concept of integrity into two related concepts: security and reliability. By security, we mean the ability of the operating system to maintain control over the system resources and thereby prevent users from accidentally or maliciously modifying or accessing unauthorized information. By reliability we mean the ability of the operating system to continue to supply useful service in spite of all abnormal software (and most abnormal hardware) conditions-whether accidental or malicious. That is, we expect the operating system to be able to prevent " crashes. " Unlike hardware, which can have manufacturing defects, physically age, wear out, and change properties over time, software is

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Hierarchical Functional Concepts for Knowledge Transfer among Reinforcement Learning Agents

This article introduces the notions of functional space and concept as a way of knowledge representation and abstraction for Reinforcement Learning agents. These definitions are used as a tool of knowledge transfer among agents. The agents are assumed to be heterogeneous; they have different state spaces but share a same dynamic, reward and action space. In other words, the agents are assumed t...

متن کامل

A Hierarchical SLAM/GPS/INS Sensor Fusion with WLFP for Flying Robo-SAR's Navigation

In this paper, we present the results of a hierarchical SLAM/GPS/INS/WLFP sensor fusion to be used in navigation system devices. Due to low quality of the inertial sensors, even a short-term GPS failure can lower the integrated navigation performance significantly. In addition, in GPS denied environments, most navigation systems need a separate assisting resource, in order to increase the avail...

متن کامل

Bridging the semantic gap for software effort estimation by hierarchical feature selection techniques

Software project management is one of the significant activates in the software development process. Software Development Effort Estimation (SDEE) is a challenging task in the software project management. SDEE is an old activity in computer industry from 1940s and has been reviewed several times. A SDEE model is appropriate if it provides the accuracy and confidence simultaneously before softwa...

متن کامل

DIAGNOSIS OF BREAST LESIONS USING THE LOCAL CHAN-VESE MODEL, HIERARCHICAL FUZZY PARTITIONING AND FUZZY DECISION TREE INDUCTION

Breast cancer is one of the leading causes of death among women. Mammography remains today the best technology to detect breast cancer, early and efficiently, to distinguish between benign and malignant diseases. Several techniques in image processing and analysis have been developed to address this problem. In this paper, we propose a new solution to the problem of computer aided detection and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IBM Systems Journal

دوره 14  شماره 

صفحات  -

تاریخ انتشار 1975