Structuring Trust in A Large General Purpose Operating System
This paper describes the approach taken in ICL to ameliorate the problem of evaluating the security of a large operating system in which the number of Trusted Computing Base and Trusted Process code procedures is large enough to make exhaustive detailed scrutinisation more than exhausting. The approach is applicable to any structured large general purpose system that enables a convent ial TCB/ Trusted Process architecture to be implemented, though it is described in the paper with particular refer once to ICL’s W E operating system.
KeywordsUser Authentication Trust Computing Mandatory Policy Security Responsibility Accidental Leakage
Unable to display preview. Download preview PDF.
- 1.VME/B.A Model for the Realisation of a Total System Concept, ICL Technical Journal, Vol. 2 Issue 2, 1980, BC Vferboys.Google Scholar
- VME Security Option Product Overview, ICL Internal Document.Google Scholar
- 3.Trusted Computer System Evalution Criteria, DoD CSC, Fort Meade, Md, August 1983.Google Scholar
- 4.Security in a Large General Purpose Operating Systems ICL’’s Approach in VME, ICL Technical Journal Vol. 3 Issue 1, 1982.Google Scholar
- 5.CADES - Software Engineering in Practice, ICL Technical Journal Vol. 2 Issue 1, 1980.Google Scholar
- 6.Secure Computer Systems Unified Exposition and Multics Interpretation, ESD-TR-75-306, Mitre Corporation report MTR-2997, January 1976, DE Bell and LJ LaPadula.Google Scholar