Abstract
Trusted computer systems are becoming increasingly important in private sectors such as banking and insurance, but those currently available are inconvenient in private sectors because they were developed for use by government agencies and the military. This paper describes how a trusted system can be made from an ordinary OS for daily use and a secure OS monitoring that OS. This configuration is implemented by using the multi-OS control technique. Analysis of an example system confirms the feasibility of the proposed method and even implies that a trusted system can be implemented by having two ordinary OSs that monitor each other.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Deborah Russell, G.T. GangemiSr.: Computer Security Basics, O’Reilly & Associates, Inc., 1991.
Department of Defense Trusted Computer System Evaluation Criteria, Dept. of Defense, National Computer Security Center, DOD 5200.28-STD, 1985.
Trusted Network Interpretation of the TCSEC, National Computer Security Center, 1987.
ISO/IEC 15408 Information Technology-Security Technology-Evaluation Criteria for IT security, 1999.
T. Arai, T. Sekiguchi, M. Satoh, T. Inoue, T. Nakamura, H. Iwao: DARMA: Using Different OSs Concurrently based on Nano-Kernel Technology, Proc. 59th-Annual Convention of Information Processing Society of Japan, 1999.
Evaluated Product List, http://www.radium.ncsc.mil/tpep/epl/historical.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoshiura, H., Miyazaki, K., Itoh, S., Takaragi, K., Sasaki, R. (2002). A Multi-OS Approach to Trusted Computer Systems. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_17
Download citation
DOI: https://doi.org/10.1007/3-540-45807-7_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44263-9
Online ISBN: 978-3-540-45807-4
eBook Packages: Springer Book Archive