A Trusted Computing Base for Embedded Systems

作者: John Rushby

DOI:

关键词:

摘要: The structure of many secure systems has been based on the idea a security kernel—an operating system nucleus that performs all trusted functions. diculty with this approach is kernel tends to be rather large, complex, and unstructured. This paper proposes an alternative for embedded systems. comprises three layers. At bottom Domain Separation Mechanism which responsible maintaining isolated “domains” (also known as “processes” or “virtual machines”) providing controlled channels their intercommunication. other resources (for example, devices more

参考文章(12)
Derek Barnes, The Provision of Security for User Data on Packet Switched Networks. ieee symposium on security and privacy. pp. 121- 126 ,(1983)
J. M. Rushby, Proof of separability: A verification technique for a class of a security kernels Proceedings of the 5th Colloquium on International Symposium on Programming. pp. 352- 367 ,(1982) , 10.1007/3-540-11494-7_23
David R. Cheriton, The Thoth system : multi-process structuring and portability North Holland. ,(1982)
Rushby, Randell, A Distributed Secure System IEEE Computer. ,vol. 16, pp. 55- 67 ,(1983) , 10.1109/MC.1983.1654443
P. Wegner, Capital-Intensive Software Technology IEEE Software. ,vol. 1, pp. 7- 10 ,(1984) , 10.1109/MS.1984.234384
Bret A. Hartman, A Gypsy-Based Kernel ieee symposium on security and privacy. pp. 219- 219 ,(1984) , 10.1109/SP.1984.10004
Thomas A Berson, Richard J. Feiertag, R. Kenneth Bauer, Processor-per-Domain Guard Architecture ieee symposium on security and privacy. pp. 120- 120 ,(1983) , 10.1109/SP.1983.10006
Gregory R. Andrews, Fred B. Schneider, Concepts and Notations for Concurrent Programming ACM Computing Surveys. ,vol. 15, pp. 3- 43 ,(1983) , 10.1145/356901.356903
J. M. Rushby, Design and verification of secure systems ACM SIGOPS Operating Systems Review. ,vol. 15, pp. 12- 21 ,(1981) , 10.1145/1067627.806586
Stanley R. Ames, Jr., Security Kernels: A Solution or a Problem? ieee symposium on security and privacy. pp. 141- 141 ,(1981) , 10.1109/SP.1981.10016