Download presentation
Presentation is loading. Please wait.
Published byWilla Tucker Modified over 9 years ago
1
A Multi-OS Approach to Trusted Computer System Yoshiura H., Miyazaki K., Itoh S., Takaragi K., Sasaki R. Security Protocols. 9th International Workshop. Revised Papers (Lecture Notes in Computer Science Vol.2467). Springer-Verlag. 2002, pp. 107-14. Berlin, Germany Systems Development Laboratory Hitachi Ltd., Yokohama, Japan Presentation By: Akhil Mehra
2
Systems Objectives Build a trusted system that utilizes the security features of a Trusted OS to secure a User OS without compromising the User OS’s usability. Goals of the Proposed System Convenient User friendly OS Latest Technology User is able to take advantage of latest applications that run on ordinary OS Cost Effective Audience – Private Sector ( Banking, Insurance)
3
Appreciation Isolates Security related tasks from normal user related tasks Ability to independently design and develop the User OS and the Administrative OS The User OS can be easily modified without affecting the systems ability to enforce security. Security features can be easily added without affecting the User OS.
4
Critical Comment Security Boundary/Perimeter of the proposed system is unclear. Will the system monitor all processes in the User OS? Concerned with the security of each individual process. Limit access between process. Will the system monitor the User OS as a whole? Only concerned with data that flows in and out of the Operating System. Operating System treated as one big process to be monitored.
5
Critical Comment Continued The Basic Idea: “The user’s daily application programs run on the user OS, and the monitoring process assuring the security of the user OS runs on the monitoring OS.”
6
Critical Comment Continued Example System- File Management Process when accessed activates MOC File Management Process has to be modified to activate the MOC In my opinion can only be done for OS related process.
7
Question In the proposed system would it be enough to monitor user operating system as a whole (one big process) or does one need to monitor a number of applications running on inside the user OS?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.