• DocumentCode
    2344005
  • Title

    Access meditation in a message passing kernel

  • Author

    Branstad, Martha ; Tajalli, Homayoon ; Mayer, Frank ; Dalva, David

  • Author_Institution
    Trusted Inf. Syst. Inc., Glenwood, MD, USA
  • fYear
    1989
  • fDate
    1-3 May 1989
  • Firstpage
    66
  • Lastpage
    72
  • Abstract
    The authors describe how mandatory and discretionary access mediation are performed in the trusted mach (TMach) kernel, a system that uses message passing as its primary means of communication both between tasks and with the kernel. As a consequence, control of interprocess communication in the TMach kernel is a central concern whereas controlled sharing of segments is the central focus in trusted systems with more traditional architectures. The TMach kernel is not a complete trusted system. It is a reference monitor of basic system abstractions, providing a small, well-controlled base on which the rest of a trusted computing base and operating system can be constructed. The TMach kernel provides simple and elegant mandatory access control for port access rights. The TMach kernel´s MAC (mandatory access control) mechanisms clearly control the flow of information according to a mandatory security policy based on a Bell and La Padula model. DAC (discretionary access control) mechanisms are provided in the TMach kernel to implement TCSEC (trusted computer system evaluation criteria) requirements and to support DAC in servers to be built on the kernel
  • Keywords
    operating systems (computers); security of data; Bell and La Padula model; DAC; MAC; TCSEC; TMach kernel; basic system abstractions; between tasks; controlled sharing; discretionary access control; discretionary access mediation; information flow; interprocess communication; mandatory access control; mandatory access meditation; mandatory security policy; message passing kernel; operating system; port access rights; reference monitor; segments; servers; trusted computer system evaluation criteria; trusted computing base; trusted mach kernel; trusted systems; Access control; Centralized control; Communication system control; Computer architecture; Control systems; Kernel; Mediation; Message passing; Monitoring; Operating systems;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on
  • Conference_Location
    Oakland, CA
  • Print_ISBN
    0-8186-1939-2
  • Type

    conf

  • DOI
    10.1109/SECPRI.1989.36278
  • Filename
    36278