DocumentCode :
3388212
Title :
The trusted path between SMITE and the user
Author :
Wiseman, S. ; Terry, P. ; Wood, Alan ; Harrold, Clare
Author_Institution :
R. Signals & Radar Establ., Malvern, UK
fYear :
1988
fDate :
18-21 Apr 1988
Firstpage :
146
Lastpage :
155
Abstract :
If signaling channels can only be driven by a trusted path, they cannot be exploited by trojan horses in untrusted software. To this end, the SMITE secure computer system provides a general-purpose trusted path, based on a screen editor, which would act as the users´ normal interface to the system. The feasibility of the approach relies on the use of a sympathetic computer architecture, which supports a fine grain of protection. The authors describe the trusted path and the user interface of the SMITE system. They discuss the formal specification of the display functions. They examine the use of SMITE for high-assurance applications
Keywords :
operating systems (computers); security of data; specification languages; user interfaces; SMITE; fine grain; formal specification; high-assurance applications; protection; screen editor; secure computer system; signaling channels; sympathetic computer architecture; trojan horses; trusted path; untrusted software; user interface; Application software; Computer architecture; Computer security; Data security; Hardware; Information security; Invasive software; Monitoring; Protection; Software maintenance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1988. Proceedings., 1988 IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-0850-1
Type :
conf
DOI :
10.1109/SECPRI.1988.8107
Filename :
8107
Link To Document :
بازگشت