[Proceedings 1988] Fourth Aerospace Computer Security Applications
DOI: 10.1109/acsac.1988.113334
|View full text |Cite
|
Sign up to set email alerts
|

Security issues of the Trusted Mach system

Abstract: Trusted Mach (TMach) is a message-passing, serveroriented system being targeted at the B3 level of the Trusted Computer System Evaluation Criteria (TCSEC). Its architecture differs from the security kemel plus layers structure that was established for trusted systems by Multics. This paper examines security issues associated with its dependence upon capability-like mechanisms and TMach's use of servers.A brief rationale for its compliance with TCSEC architectural requirements is presented. Why the structure of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Several projects that used Mach as the base for a secure operating system were inspired by that architecture. These included Trusted Mach (TMach) [36,35,196], Distributed Trusted Mach (DTMach) [282,96], the Distributed Trusted Operating System (DTOS) [313,213], and the Flask system [191,295]. TMach was built by Trusted Information Systems (TIS) and implemented multilevel security (MLS) servers for files, memory, etc.…”
Section: Microkernel Eramentioning
confidence: 99%
See 2 more Smart Citations
“…Several projects that used Mach as the base for a secure operating system were inspired by that architecture. These included Trusted Mach (TMach) [36,35,196], Distributed Trusted Mach (DTMach) [282,96], the Distributed Trusted Operating System (DTOS) [313,213], and the Flask system [191,295]. TMach was built by Trusted Information Systems (TIS) and implemented multilevel security (MLS) servers for files, memory, etc.…”
Section: Microkernel Eramentioning
confidence: 99%
“…The DTE approach aims to confine UNIX processes to protect the trusted computing base from other root processes. Strictly speaking, DTE UNIX runs as a server on a TMach system [35,15]. However, we consider DTE to be a retrofit of UNIX because the reference monitor is added to the UNIX server (OSF/1), not to TMach.…”
Section: Domain and Type Enforcementmentioning
confidence: 99%
See 1 more Smart Citation