E. Fernández, Tami Sorgente, Maria Mercedes Larrondo-Petrie
{"title":"Even more patterns for secure operating systems","authors":"E. Fernández, Tami Sorgente, Maria Mercedes Larrondo-Petrie","doi":"10.1145/1415472.1415484","DOIUrl":null,"url":null,"abstract":"An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Many of the reported attacks to Internetbased systems have occurred through the OS (kernel and utilities). The security of individual execution time actions such as process creation, memory protection, and the general architecture of the OS are very important and we have previously presented patterns for these functions. We present here patterns for the representation of processes and threads, emphasizing their security aspects. Another pattern considers the selection of virtual address space structure. We finally present a pattern to control the power of administrators, a common source of security problems.","PeriodicalId":341958,"journal":{"name":"Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1415472.1415484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23
Abstract
An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Many of the reported attacks to Internetbased systems have occurred through the OS (kernel and utilities). The security of individual execution time actions such as process creation, memory protection, and the general architecture of the OS are very important and we have previously presented patterns for these functions. We present here patterns for the representation of processes and threads, emphasizing their security aspects. Another pattern considers the selection of virtual address space structure. We finally present a pattern to control the power of administrators, a common source of security problems.