Title :
The trusted path between SMITE and the user
Author :
Wiseman, S. ; Terry, P. ; Wood, Alan ; Harrold, Clare
Author_Institution :
R. Signals & Radar Establ., Malvern, UK
Abstract :
If signaling channels can only be driven by a trusted path, they cannot be exploited by trojan horses in untrusted software. To this end, the SMITE secure computer system provides a general-purpose trusted path, based on a screen editor, which would act as the users´ normal interface to the system. The feasibility of the approach relies on the use of a sympathetic computer architecture, which supports a fine grain of protection. The authors describe the trusted path and the user interface of the SMITE system. They discuss the formal specification of the display functions. They examine the use of SMITE for high-assurance applications
Keywords :
operating systems (computers); security of data; specification languages; user interfaces; SMITE; fine grain; formal specification; high-assurance applications; protection; screen editor; secure computer system; signaling channels; sympathetic computer architecture; trojan horses; trusted path; untrusted software; user interface; Application software; Computer architecture; Computer security; Data security; Hardware; Information security; Invasive software; Monitoring; Protection; Software maintenance;
Conference_Titel :
Security and Privacy, 1988. Proceedings., 1988 IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-0850-1
DOI :
10.1109/SECPRI.1988.8107