Communications - Scientific Letters of the University of Zilina 2009, 11(3):5-10 | DOI: 10.26552/com.C.2009.3.5-10

A Security Model for an Operating System for Security-Critical Applications in Small Office and Home Environment

Jaroslav Janacek1
1 Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava, Slovakia

Personal computers are often used in small office and home environment for different purposes ranging from general web browsing and e mail processing to processing data that are sensitive regarding their confidentiality and/or integrity. Common operating systems do not provide sufficient protection. We present asecurity model combining the well known benefits of mandatory access control in classified information processing systems with the typical home and small office computer use. We use a simple two-dimensional data classification scheme and present a security model with provable properties that significantly reduces the risks of confidentiality and/or integrity protection violation.

Keywords: no keywords

Published: September 30, 2009  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Janacek, J. (2009). A Security Model for an Operating System for Security-Critical Applications in Small Office and Home Environment. Communications - Scientific Letters of the University of Zilina11(3), 5-10. doi: 10.26552/com.C.2009.3.5-10
Download citation

References

  1. BELL D. E., LA PADULA L. J.: Secure Computer System: Unified Exposition and Multics Interpretation, Technical report, 1976. Go to original source...
  2. TIPTON H. F., KRAUSE M. (editors): Information Security Management Handbook, 5th edition, CRC Press LLC, 2004, ISBN 0-8493-1997-8.

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.