Paper
3 May 2018 Security tag computation and propagation in OSFA
Patrick Jungwirth, Phil Chan, Eric Imsand, Hameed Badawy
Author Affiliations +
Abstract
We will review Saltzer and Schroeder’s security principles of (1) complete mediation; (2) least privilege; and (3) privilege separation. We will also briefly review security tag (or label) propagation. In security tag propagation, a set of rules are used to compute the security attributes of each computation. For example, C = A + B, where A is trusted and B is not trusted. The result C is labeled not trusted. We do not want to use the untrusted result, C, to control any shared computer resource. Using an untrusted result to control (or manage) a shared resource would leave a cybersecurity vulnerability. We illustrate how security tag (or label) propagation can be implemented in the two level security tag architecture in the OS Friendly Microprocessor Architecture. We describe the benefits of using two level security tags for security tag computations.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Patrick Jungwirth, Phil Chan, Eric Imsand, and Hameed Badawy "Security tag computation and propagation in OSFA", Proc. SPIE 10630, Cyber Sensing 2018, 1063004 (3 May 2018); https://doi.org/10.1117/12.2302991
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Information security

Operating systems

Computing systems

Defense and security

Information operations

Network security

RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 14 2015)
Security in MANETs using reputation-adjusted routing
Proceedings of SPIE (April 13 2009)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top