Small TCBs of Policy-controlled Operating Systems
Seiten
2014
TU Ilmenau Universitätsbibliothek (Verlag)
978-3-86360-090-7 (ISBN)
TU Ilmenau Universitätsbibliothek (Verlag)
978-3-86360-090-7 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Policy-controlled operating systems provide a policy decision and enforcement environment to protect and enforce their security policies. The trusted computing base (TCB) of these systems are large and complex, and their functional perimeter can hardly be precisely identified. As a result, a TCB's correctness and tamper-proofness are hard to ensure in its implementation.
This dissertation develops a TCB engineering method for policy-controlled operating systems that tailors the policy decision and enforcement environment to support only those policies that are actually present in a TCB. A TCB's functional perimeter is identified by exploiting causal dependencies between policies and TCB functions, which results in causal TCBs that contain exactly those functions that are necessary to establish, enforce, and protect their policies. The precise identification of a TCB's functional perimeter allows for implementing a TCB in a safe environment that indeed can be isolated from untrusted system components. Thereby, causal TCB engineering sets the course for implementations whose size and complexity pave the way for analyzing and verifying a TCB's correctness and tamper-proofness.
This dissertation develops a TCB engineering method for policy-controlled operating systems that tailors the policy decision and enforcement environment to support only those policies that are actually present in a TCB. A TCB's functional perimeter is identified by exploiting causal dependencies between policies and TCB functions, which results in causal TCBs that contain exactly those functions that are necessary to establish, enforce, and protect their policies. The precise identification of a TCB's functional perimeter allows for implementing a TCB in a safe environment that indeed can be isolated from untrusted system components. Thereby, causal TCB engineering sets the course for implementations whose size and complexity pave the way for analyzing and verifying a TCB's correctness and tamper-proofness.
| Sprache | englisch |
|---|---|
| Maße | 148 x 210 mm |
| Gewicht | 450 g |
| Einbandart | Paperback |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Betriebssystem • Betriebssystem / Laufzeitsystem / Trusted Computing / Implementierung / Leistungsbewertung • Implementierung • Laufzeitsystem • Leistungsbewertung • trusted computing |
| ISBN-10 | 3-86360-090-8 / 3863600908 |
| ISBN-13 | 978-3-86360-090-7 / 9783863600907 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95