A High-performance Hardware-based High-assurance Trusted Windowing System
نویسنده
چکیده
TRW's Trusted X Window System prototype established that it is possible to build a high assurance windowing system, given a trusted operating system as a base. This paper describes an extension of that architecture that uses custom designed hardware to provide a high-performance, low-cost windowing system while retaining the highassurance character of the original design.
منابع مشابه
A High Assurance Window
This paper describes the architecture of a prototype multilevel secure windowing system based on the X Window System. The prototype, known as TX, is designed to meet the class B3 architectural requirements of the Trusted Computer System Evaluation Criteria (TCSEC). The architecture and prototype described here demonstrate that high assurance windowing technology is feasible. The TX architecture...
متن کاملClient-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect by providing roots of trust upon which secure applications can be developed. These technologies offer a particularly attractive platform for securit...
متن کاملAssurance Considerations for a Highly Robust TOE
The U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness (SKPP) is undergoing evaluation. During its authoring process, new extended functional and assurance requirements were introduced to resolve assurance issues associated with TOE hardware, trusted initialization and trusted recovery. For high robustness, domain separation and self-protection a...
متن کاملTrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware
With scalability, fault tolerance, ease of programming, and flexibility, MapReduce has gained many attractions for large-scale data processing. However, despite its merits, MapReduce does not focus on the problem of data privacy, especially when processing sensitive data, such as personal data, on untrusted infrastructure. In this paper, we investigate a scenario based on the Trusted Cells para...
متن کاملSecure Proactive Recovery – a Hardware Based Mission Assurance Scheme
Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to faulttolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system security by staging an attac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996