Share Email Print
cover

Proceedings Paper • new

Security tag computation and propagation in OSFA
Author(s): Patrick Jungwirth; Phil Chan; Eric Imsand; Hameed Badawy
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

We will review Saltzer and Schroeder’s security principles of (1) complete mediation; (2) least privilege; and (3) privilege separation. We will also briefly review security tag (or label) propagation. In security tag propagation, a set of rules are used to compute the security attributes of each computation. For example, C = A + B, where A is trusted and B is not trusted. The result C is labeled not trusted. We do not want to use the untrusted result, C, to control any shared computer resource. Using an untrusted result to control (or manage) a shared resource would leave a cybersecurity vulnerability. We illustrate how security tag (or label) propagation can be implemented in the two level security tag architecture in the OS Friendly Microprocessor Architecture. We describe the benefits of using two level security tags for security tag computations.

Paper Details

Date Published: 3 May 2018
PDF: 15 pages
Proc. SPIE 10630, Cyber Sensing 2018, 1063004 (3 May 2018); doi: 10.1117/12.2302991
Show Author Affiliations
Patrick Jungwirth, U.S. Army Research Lab. (United States)
Phil Chan, U.S. Army Research Lab. (United States)
Eric Imsand, The Univ. of Alabama in Huntsville (United States)
Hameed Badawy, New Mexico State Univ. (United States)


Published in SPIE Proceedings Vol. 10630:
Cyber Sensing 2018
Igor V. Ternovskiy; Peter Chin, Editor(s)

© SPIE. Terms of Use
Back to Top