Skip to main content

Secure Workstation for Special Applications

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Abstract

The paper presents the recently started project which aims to develop a secure environment for processing of restricted information. The solution being developed by the consortium employs virtualization to allow data from different security domains to be processed on the same physical machine. The system can host Windows and Linux systems as secured guest operating systems. The proposed implementation offers advanced user authentication techniques and cryptographic protection. The project is expected to reach technology demonstrator phase in late 2012.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Goldberg, R.P., Popek, G.J.: Formal Requirements for Virtualizable Third Generation Architectures. Communication of the ACM 17(7) (1974)

    Google Scholar 

  2. Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium’s Ability to Support a Secure Virtual Machine Monitor. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17 (2000)

    Google Scholar 

  3. VMWare, Virtualization Overview

    Google Scholar 

  4. Oracle VM VirtualBox – User Manual, http://www.virtualbox.org/manual/UserManual.html

  5. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Wareld, A.: Xen and the Art of Virtualization. University of Cambridge Computer Laboratory, CGF Brussels (2004)

    Google Scholar 

  6. Warnke, R., Ritzau, T.: QEMU, Kernel-based Virtual Machine (KVM) & libvirt (2010), http://qemu-buch.de

  7. Frankel, D.S.: Model Driven Architecture: Applying MDA to Enterprise Computing. John Wiley & Sons, Chichester (2003)

    Google Scholar 

  8. Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Bell, D.D., La Padula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation. ESDTR-75-306. ESD/AFSC, Bedford, MA, Hanscom AFB (1974), http://csrc.nist.gov/publications/history/bell76.pdf

  10. Bell, D.E.: Looking Back at the Bell-La Padula Model, Reston, VA, 20191 (2005)

    Google Scholar 

  11. Li, N., Mitchell, J.C.: RT: A Role-Based Trust Management Framework. In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), pp. 201–212 (2003)

    Google Scholar 

  12. King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing Malware with Virtual Machines. In: IEEE Symp. on Security and Privacy (the Oakland Conference) (2006)

    Google Scholar 

  13. Ferrie, P.: Attacks on Virtual Machine Emulators. In: Association of Anti Virus Asia Researchers Conference, Auckland, New Zealand (2006)

    Google Scholar 

  14. Rutkowska, J.: Subverting Vista Kernel for Fun and Profit. In: SyScan 2006, Singapore (2006)

    Google Scholar 

  15. NSA High Assurance Platform, http://www.nsa.gov/ia/programs/h_a_p/index.shtml

  16. NetTop, http://www.nsa.gov/research/tech_transfer/fact_sheets/nettop.shtml

  17. HP NetTop, http://h71028.www7.hp.com/enterprise/downloads/HP_NetTop_Whitepaper2.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kozakiewicz, A., Felkner, A., Furtak, J., Zieliński, Z., Brudka, M., Małowidzki, M. (2011). Secure Workstation for Special Applications. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics