DocumentCode :
3302494
Title :
Integrating cryptography in the trusted computing base
Author :
Roe, Michael ; Casey, Tom
Author_Institution :
Comput. Lab., Cambridge Univ., UK
fYear :
1990
fDate :
3-7 Dec 1990
Firstpage :
50
Lastpage :
56
Abstract :
Secure distributed systems are not easily constructed, as they combine mechanisms based on very different theories of security (encryption and reference monitors). The authors show how these mechanisms may be integrated via the Unix STREAMS mechanism Examples are given of how this architecture can support existing security protocols and it is shown why it is consistent with the Bell-LaPadula and Biba information-flow models
Keywords :
Unix; cryptography; data integrity; distributed processing; protocols; Bell-LaPadula; Biba information-flow models; Unix STREAMS mechanism; distributed systems; encryption; existing security protocols; reference monitors; trusted computing base; Communication system security; Computer architecture; Computer security; Cryptography; Data security; Distributed computing; Information security; Kernel; Laboratories; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2105-2
Type :
conf
DOI :
10.1109/CSAC.1990.143750
Filename :
143750
Link To Document :
بازگشت