TY - GEN
T1 - Enforcement of integrated security policy in trusted operating systems
AU - Kim, Hyung Chan
AU - Ramakrishna, R. S.
AU - Shin, Wook
AU - Sakurai, Kouichi
PY - 2007
Y1 - 2007
N2 - The main focus of Trusted Operating System (TOS) research these days is on the enhanced access control of reference monitors which, in turn, control the individual operations on a given access instance. However, many real-life runtime attacks involve behavioral semantics. It is desirable, therefore, to enforce an integrated security policy that includes both behavioral security and access control policies. We have proposed an extended reference monitor to support both access and behavior controls. This results in a sequence of operations which is also of concern in security enforcement. This paper presents the design of the extended reference monitor for integrated policy enforcement and describes its implementation in Linux operating systems.
AB - The main focus of Trusted Operating System (TOS) research these days is on the enhanced access control of reference monitors which, in turn, control the individual operations on a given access instance. However, many real-life runtime attacks involve behavioral semantics. It is desirable, therefore, to enforce an integrated security policy that includes both behavioral security and access control policies. We have proposed an extended reference monitor to support both access and behavior controls. This results in a sequence of operations which is also of concern in security enforcement. This paper presents the design of the extended reference monitor for integrated policy enforcement and describes its implementation in Linux operating systems.
UR - http://www.scopus.com/inward/record.url?scp=38149127130&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38149127130&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-75651-4_15
DO - 10.1007/978-3-540-75651-4_15
M3 - Conference contribution
AN - SCOPUS:38149127130
SN - 9783540756507
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 214
EP - 229
BT - Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings
PB - Springer Verlag
T2 - 2nd International Workshop on Security, IWSEC 2007
Y2 - 29 October 2007 through 31 October 2007
ER -