Abstract
The paper presents the recently started project which aims to develop a secure environment for processing of restricted information. The solution being developed by the consortium employs virtualization to allow data from different security domains to be processed on the same physical machine. The system can host Windows and Linux systems as secured guest operating systems. The proposed implementation offers advanced user authentication techniques and cryptographic protection. The project is expected to reach technology demonstrator phase in late 2012.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Goldberg, R.P., Popek, G.J.: Formal Requirements for Virtualizable Third Generation Architectures. Communication of the ACM 17(7) (1974)
Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium’s Ability to Support a Secure Virtual Machine Monitor. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17 (2000)
VMWare, Virtualization Overview
Oracle VM VirtualBox – User Manual, http://www.virtualbox.org/manual/UserManual.html
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Wareld, A.: Xen and the Art of Virtualization. University of Cambridge Computer Laboratory, CGF Brussels (2004)
Warnke, R., Ritzau, T.: QEMU, Kernel-based Virtual Machine (KVM) & libvirt (2010), http://qemu-buch.de
Frankel, D.S.: Model Driven Architecture: Applying MDA to Enterprise Computing. John Wiley & Sons, Chichester (2003)
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)
Bell, D.D., La Padula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation. ESDTR-75-306. ESD/AFSC, Bedford, MA, Hanscom AFB (1974), http://csrc.nist.gov/publications/history/bell76.pdf
Bell, D.E.: Looking Back at the Bell-La Padula Model, Reston, VA, 20191 (2005)
Li, N., Mitchell, J.C.: RT: A Role-Based Trust Management Framework. In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), pp. 201–212 (2003)
King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing Malware with Virtual Machines. In: IEEE Symp. on Security and Privacy (the Oakland Conference) (2006)
Ferrie, P.: Attacks on Virtual Machine Emulators. In: Association of Anti Virus Asia Researchers Conference, Auckland, New Zealand (2006)
Rutkowska, J.: Subverting Vista Kernel for Fun and Profit. In: SyScan 2006, Singapore (2006)
NSA High Assurance Platform, http://www.nsa.gov/ia/programs/h_a_p/index.shtml
NetTop, http://www.nsa.gov/research/tech_transfer/fact_sheets/nettop.shtml
HP NetTop, http://h71028.www7.hp.com/enterprise/downloads/HP_NetTop_Whitepaper2.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kozakiewicz, A., Felkner, A., Furtak, J., Zieliński, Z., Brudka, M., Małowidzki, M. (2011). Secure Workstation for Special Applications. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)