Skip to main content

Object-Oriented Security in the Trusted Mach™ Operating System

  • Chapter
Security for Object-Oriented Systems

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

  • 40 Accesses

Abstract

Object-oriented (OO) design and implementation are ideally suited to the development of secure operating systems. Although an OO programming language cannot provide any subject-to-object access protection or security by its own virtue, the use of OO techniques in secure systems yields substantial benefits in meeting the assurance and security policy control objectives of the Trusted Computer System Evaluation Criteria (TCSEC.)

The Trusted Mach (TMachTM) secure operating system is designed to meet the requirements of the TCSEC B3 level of trust, and the Information Technology Security Evaluation Criteria (ITSEC) E5, F-B3 rating. The fundamental features of the TMach architecture and design are its message-oriented client/server model, and heavy usage of layering, modularity, abstraction and data hiding. Thus, the choice of an object-oriented language for the implementation of the TMach system, was a natural consequence of its design requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Computer Security Center, Department of Defense Trusted Computer System Evaluation Criteria DoD 5200.28-STD, December 1985.

    Google Scholar 

  2. Information Technology Evaluation Criteria, Harmonized Criteria for France - Germany - the Netherlands - the United Kingdom Draft June, 1991.

    Google Scholar 

  3. Gligor VD, Chandersekaran CS, Jiang WD et al., A New Security Testing Method and Its Application to the Secure Xenix Kernel, IEEE Trans. Software Engg 1987, SE-13, No. 2, pp 169–183.

    Article  Google Scholar 

  4. Gupta S, Gligor VD, Towards a Theory of Penetration-Resistant Systems and its Applications, Journal of Computer Security 1992, Vol 1 No 2, pp 133–158.

    Google Scholar 

  5. Harrold MJ, McGregor JD, Fitzpatrick KJ, Incremental Testing of Object-Oriented Class Structures, Proc. of Fourteenth Intl. Conf. on Software Engg May 11–15, 1992 - Melbourne, Australia, pp 68–80.

    Google Scholar 

  6. Stroustrup B, The C++ Programming Language Second Edition, Addison-wEsley Publishing Company, 1991.

    Google Scholar 

  7. Tajalli H, Badger L, Graham J, The Trusted Mach Object-Oriented Operating System, Proc. of NATO Workshop on Object Oriented Modeling of Distributed Systems 1992 - Quebec City, Canada.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Gupta, S. (1994). Object-Oriented Security in the Trusted Mach™ Operating System. In: Thuraisingham, B., Sandhu, R., Ting, T.C. (eds) Security for Object-Oriented Systems. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3858-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3858-7_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19877-2

  • Online ISBN: 978-1-4471-3858-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics