Design and Implementation of Security OS: A Case Study
Abstract
The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel level, such as a reference monitor and a cryptographic file system, has been increasingly emphasized as the weaknesses and limitation of mechanisms at the user level have been revealed. However, when a system has only a reference monitor, the system is vulnerable to a low-level detour or a physical attack. In addition, when a system has only a cryptographic file system, the file system has a difficulty in protecting itself. To address these problems, we designed and developed a security OS with a reference monitor, a cryptographic file system, authentication limitation, and session limitation. Here we describe the model, its implementation, and its overheads.Downloads
Download data is not yet available.
Downloads
Published
2012-01-26
How to Cite
Kim, S. K., Son, H. S., & Han, S. Y. (2012). Design and Implementation of Security OS: A Case Study. Computing and Informatics, 27(6), 931–951. Retrieved from http://147.213.75.17/ojs/index.php/cai/article/view/21
Issue
Section
Articles