Design and Implementation of Security OS: A Case Study

Authors

  • Seong Ki Kim
  • Hae Sung Son
  • Sang Yong Han

Abstract

The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel level, such as a reference monitor and a cryptographic file system, has been increasingly emphasized as the weaknesses and limitation of mechanisms at the user level have been revealed. However, when a system has only a reference monitor, the system is vulnerable to a low-level detour or a physical attack. In addition, when a system has only a cryptographic file system, the file system has a difficulty in protecting itself. To address these problems, we designed and developed a security OS with a reference monitor, a cryptographic file system, authentication limitation, and session limitation. Here we describe the model, its implementation, and its overheads.

Downloads

Download data is not yet available.

Downloads

Published

2012-01-26

How to Cite

Kim, S. K., Son, H. S., & Han, S. Y. (2012). Design and Implementation of Security OS: A Case Study. Computing and Informatics, 27(6), 931–951. Retrieved from http://147.213.75.17/ojs/index.php/cai/article/view/21