skip to main content
article

A policy flexible architecture for secure operating system

Published: 01 July 2005 Publication History

Abstract

As the fundamental software to guarantee information security, operating system is desired to support various security policies flexibly and to control the propagation and revocation of access rights efficiently. This paper presents a design and implementation of Policy Flexible Architecture (PFA) for secure operating system to achieve the coordination, extensibility, consistency and dynamic configuration of security policies. Through a thorough analysis of all related facilities, PFA classifies policy constructions into several levels according to their effects on security status; PFA emphasizes on centralized management of security policy as well as on centralized maintainability of security attributes; for the first time PFA gives revocation rules to specify how and when to revoke permissions. PFA has been applied to our Secure Enhanced Linux Operating System, and the experiment shows that the system holds at least three advantages. First, it helps users to choose intended security policies flexibly. Besides it supports users to add new security policies according to specific security requirements easily. Finally it sets permission revocations immediately and gets no significant performance penalty.

References

[1]
D. Mazieres, M. Kaashoek. Secure Applications Need Flexible Operating Systems. The 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), pp. 56--61, 1997.]]
[2]
R. Spencer, The Flask Security Architecture: System Support for Diverse Security Policies. The 8th USENIX Security Symposium, 1999.]]
[3]
M. D. Abrams, L. LaPadula, et.al. Generalized Framework for Access Control: An Informal Description. Proc. of the 13th National Computer Security Conference, pp. 135--143, Oct. 1990.]]
[4]
A. Ott, The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension. Proc. of the 8th International Linux Congress, November, 2001.]]
[5]
R. S. Sandhu, Role-Based Access Control Models. IEEE Computer 29(2): 38--47, IEEE Press, 1996.]]
[6]
N. Damianou, The Ponder Policy Specification Language. Proc. Policy 2001: Workshop on Policies for Distributed Systems and Networks, Bristol, UK, pp. 29--31, Jan. 2001.]]
[7]
C. Ribeiro. SPL: An access control language for security policies with complex constraints. Proc. Of Network and Distributed System Security Symposium, 2001.]]
[8]
America Department of Defense, Trusted Computer System Evaluation Criteria, CSC-STD-001-83, Aug 1983.]]
[9]
K. M. Walker, Confining Root Programs with Domain and Type Enforcement. The 6th USENIX Security Symposium, August 1996]]
[10]
L. LaPadula, A Rule-Set Approach to Formal Modeling of a Trusted Computer System. Computing Systems Journal, Vol 7, No 1, pp. 113--167, 1994.]]
[11]
P. Bonatti, A modular approach to composing access control policies. Proc. of the 7th ACM Conference on Computer and Communications Security, 2000.]]
[12]
P. A. Karger, New Methods for Immediate Revocation. Proc. of the 1989 IEEE Symposium on Security and Privacy, pp. 48--55, May 1989.]]
[13]
M. Bernaschi, Operating system enhancements to prevent the misuse of system calls. Proc. of the 7th ACM Conference on Computer and Communications Security, pp. 174--183, 2000.]]
[14]
P. Loscocco, S. Smalley, Integrating Flexible Support for Security Policies into the Linux Operating System. Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX'01), pp. 29--42, June 2001.]]
[15]
J. Fassino, J. B. Stefani, J. L. Lawall, G. Muller, Think: A Software Framework for Component-based Operating System Kernels, Proc. of the General Track: 2002 USENIX Annual Technical Conference, p. 73--86, June 10-15, 2002]]
[16]
C. Rippert: Protection in flexible operating system architectures, ACM SIGOPS Operating Systems Review, Volume 37, 2003]]

Cited By

View all
  • (2008)A component-based policy-neutral architecture for kernel-level access controlannals of telecommunications - annales des télécommunications10.1007/s12243-008-0071-064:1-2(121-146)Online publication date: 20-Nov-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 39, Issue 3
July 2005
93 pages
ISSN:0163-5980
DOI:10.1145/1075395
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2005
Published in SIGOPS Volume 39, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2008)A component-based policy-neutral architecture for kernel-level access controlannals of telecommunications - annales des télécommunications10.1007/s12243-008-0071-064:1-2(121-146)Online publication date: 20-Nov-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media