Abstract
The article discusses an approach to the construction of secure data processing systems based on the hybrid operating system technology, making it possible to use several different operating systems simultaneously on the same computer and arrange for an interaction between those. The Fenix secure operating system developed at the Software Security Laboratory(SSL) of the St. Petersburg State Polytechnical University (SPSPU) is proposed to be used as a host operating system, while the popular Linux OS — as a guest operating system, to ensure compatibility with commonly used applications.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zegzhda, D.P., Stepanov, P.G., Otavin, A.D.: Fenix Secure Operating System: Principles, Models and Architecture. In: Proceeding of International Workshop on Mathematical Methods, Models and Architectures for Network Security Systems. Information Assurance in Computer Networks, pp. 207–218. Springer, Heidelberg (2001)
Goldberg, R.: Architectural Principles for Virtual Computer Systems. PhD thesis, Harvard University (1972)
Goldberg, R.: Survey of virtual machine research. IEEE Computer Magazine 7, 34–45 (1974)
Bugnion, E., Devine, S., Rosenblum, M.: Disco: running commodity operating systems on scalable multiprocessors. In: Proc. 16th ACM Symp. Operating Sys. Principles (October 1997)
Sugerman, J., Venkitachalam, G., Lim, B.: Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In: Proc. 2001 Ann. USENIX Tech. Conf., Boston, MA, USA (June 2001)
Waldspurger, C.A.: Memory resource management in VMware ESX Server. In: Proc. 2002 Symp. Operating Sys. Design and Implementation (December 2002)
Chen, P.M., Noble, B.D.: When virtual is better than real. In: Proc. 2001 Workshop on Hot Topics in Operating Sys. (HotOS-VIII), Schloss Elmau, Germany (May 2001)
Engler, D., Kaashoek, M., O’Toole, J.: Exokernel: Anoperating system architecture for application-level resource managment. In: Proc. 15th ACM Symp. on Operating Sys. Principles (December 1995)
Grizzard, J., Dodson, E., Conti, G., Levine, J., Owen, H.: Towards a trusted immutable kernel extension (TIKE) for selfhealing systems: a virtual machine approach. In: Proc. 5th IEEE Information Assurance Workshop, June 2004, pp. 444–446 (2004)
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a Virtual Machine-Based Platform for Trusted Computing. In: Proceedings of the nineteenth ACM Symposium on Operating Systems Principles, pp. 193–206. ACM Press, New York (2003)
Trusted Computing Platform Alliance. TCPA main specification v. 1.1b, http://www.trustedcomputing.org/
Carroll, A., Juarez, M., Polk, J., Leininger, T.: Microsoft Palladium: A business overview (August 2002), http://www.microsoft.com/PressPass/features/2002/jul02/0724palladiumwp.asp
Microsoft next-generation secure computing base—technical FAQ (February 2003), http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/%news/NGSCB.asp
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zegzhda, D.P., Vovk, A.M. (2005). Secure Hybrid Operating System “Linux over Fenix”. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_21
Download citation
DOI: https://doi.org/10.1007/11560326_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)