{"title":"Trusted system construction","authors":"C. O'Halloran","doi":"10.1109/CSFW.1999.779768","DOIUrl":null,"url":null,"abstract":"Any system constructed today is likely to be constructed from COTS components. Encapsulation of these components using software wrappers promises to enable trusted systems to be constructed. These systems are complex and it is difficult to impose security without compromising operational effectiveness. The key problem which this paper addresses is to analyse encapsulations of COTS components to demonstrate the system is both secure and usable. Any foundation must be able to deal with the conflicting requirements of operational effectiveness and security especially with respect to COTS components. The approach is illustrated using the X windowing system.","PeriodicalId":374159,"journal":{"name":"Proceedings of the 12th IEEE Computer Security Foundations Workshop","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE Computer Security Foundations Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1999.779768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Any system constructed today is likely to be constructed from COTS components. Encapsulation of these components using software wrappers promises to enable trusted systems to be constructed. These systems are complex and it is difficult to impose security without compromising operational effectiveness. The key problem which this paper addresses is to analyse encapsulations of COTS components to demonstrate the system is both secure and usable. Any foundation must be able to deal with the conflicting requirements of operational effectiveness and security especially with respect to COTS components. The approach is illustrated using the X windowing system.