Page 85 - DCAP516_COMPUTER_SECURITY
P. 85
Unit 7: Designing Trusted Operating System
6. Digital Equipment Corporation (Ultrix) Notes
7. Gemini Computers (GEMSOS)
8. Harris Corporation (SVR3, SVR4)
9. Hewlett-Packard (HP/UX)
10. Honeywell (Multics)
11. IBM (OS/390, AIX)
12. SCO (SCO Unix)
13. Secure Computing Corporation (LOCK, Mach, BSD)
14. SecureWare (Apple A/UX, HP/UX, SCO)
15. Sequent (Dynix/ptx)
16. Silicon Graphics (IRIX)
17. Sun Microsystems (SunOS, Solaris)
18. Trusted Information Systems (Xenix, Mach)
19. BAE Systems (XTS Unix)
7.5.1 Trust in What?
1. Process: OS processes must be absent of security flaws and malicious segments
2. Product: It must be evaluated, approved product.
3. Software: The software must be Part trusted to enforce security policy
4. Computing base
5. HW/SW/firmware enforcing unified policy.
6. System
7. Trusted to process sensitive information
7.5.2 Features of Trusted OS
There are many unique features which distinguish an Trusted OS from an Ordinary OS. These
have been listed below:
1. User identification and authentication
2. Mandatory access controls
3. Discretionary access controls
4. Object reuse protection
5. Complete mediation
6. Trusted paths
7. Audits
8. Audit log reduction
9. Intrusion detection
LOVELY PROFESSIONAL UNIVERSITY 79