Title :
Integrating cryptography in the trusted computing base
Author :
Roe, Michael ; Casey, Tom
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Abstract :
Secure distributed systems are not easily constructed, as they combine mechanisms based on very different theories of security (encryption and reference monitors). The authors show how these mechanisms may be integrated via the Unix STREAMS mechanism Examples are given of how this architecture can support existing security protocols and it is shown why it is consistent with the Bell-LaPadula and Biba information-flow models
Keywords :
Unix; cryptography; data integrity; distributed processing; protocols; Bell-LaPadula; Biba information-flow models; Unix STREAMS mechanism; distributed systems; encryption; existing security protocols; reference monitors; trusted computing base; Communication system security; Computer architecture; Computer security; Cryptography; Data security; Distributed computing; Information security; Kernel; Laboratories; Protection;
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2105-2
DOI :
10.1109/CSAC.1990.143750