메뉴 건너뛰기




Volumn 42, Issue 1, 2008, Pages 32-39

The Caernarvon secure embedded operating system

Author keywords

Common criteria evaluation; Embedded systems; Mandatory access controls; Mobile phones; Operating systems; PDAs; Smart cards

Indexed keywords

COMMON CRITERIA; COMMON CRITERIA EVALUATION; MANDATORY ACCESS CONTROL; MANDATORY ACCESS CONTROLS; OPERATING SYSTEMS;

EID: 67249144231     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1341312.1341320     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 35248817849 scopus 로고    scopus 로고
    • The EM side-channel(s)
    • Cryptographic Hardware and Embedded Systems - CHES 2002, Springer Verlag, pages Redwood Shores, CA, 13-15 August
    • D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science, Vol.2523, Springer Verlag, pages 29-45, Redwood Shores, CA, 13-15 August 2002.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.R.3    Rohatgi, P.4
  • 5
    • 0003400255 scopus 로고
    • ESD-TR-76-372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, Apr.
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. ESD-TR-76-372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, Apr. 1977.
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K.J.1
  • 7
    • 79551634584 scopus 로고    scopus 로고
    • Homeland Security Presidential Directive HSPD-12, The White House, Washington, DC, 27 August
    • G. W. Bush. Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12, The White House, Washington, DC, 27 August 2004. URL: http://csrc.nist.gov/ policies/Presidential-Directive-Hspd-12.html.
    • (2004) Policy for a Common Identification Standard for Federal Employees and Contractors
    • Bush, G.W.1
  • 8
    • 84869635960 scopus 로고    scopus 로고
    • Security Analysis of IKE's Signature-Based Key-Exchange Protocol
    • Advances in Cryptology - Crypto 2002, pages 143-161, Santa Barbara, CA, Springer Verlag
    • R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology - Crypto 2002, pages 143-161, Santa Barbara, CA, 2002. Lecture Notes in Computer Science, Vol.2045, Springer Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2045
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 77952273935 scopus 로고    scopus 로고
    • Method, apparatus and system for resistence to side channel attacks on random number generators
    • United States Patent Application No. US 2006/0104443A1, Filed 12 November
    • S. N. Chari, V. V. Diluoffo, P. A. Karger, E. R. Palmer, T. Rabin, J. R. Rao, P. Rohatgi, H. Scherzer, M. Steiner, and D. C. Toll. Method, apparatus and system for resistence to side channel attacks on random number generators. United States Patent Application No. US 2006/0104443A1, Filed 12 November 2004.
    • (2004)
    • Chari, S.N.1    Diluoffo, V.V.2    Karger, P.A.3    Palmer, E.R.4    Rabin, T.5    Rao, J.R.6    Rohatgi, P.7    Scherzer, H.8    Steiner, M.9    Toll, D.C.10
  • 11
  • 12
    • 0003765587 scopus 로고    scopus 로고
    • Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-1003, August
    • Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3. Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-1003, August 2005. URL: http://www.commoncriteriaportal.org/public/expert/index.php? menu=2.
    • (2005) Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3
  • 14
    • 60749089448 scopus 로고
    • The structure of the THE multiprogramming system
    • May
    • E. W. Dijkstra. The structure of the THE multiprogramming system. Communications of the ACM, 11(5):341-346, May 1968.
    • (1968) Communications of the ACM , vol.11 , Issue.5 , pp. 341-346
    • Dijkstra, E.W.1
  • 15
    • 21644455797 scopus 로고    scopus 로고
    • AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 Sept.
    • Functionality classes and evaluation methodology for physical random number generators. AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 Sept. 2001. URL: http://www.bsi.bund.de/zertifiz/zert/interpr/ais31e.pdf.
    • (2001) Functionality Classes and Evaluation Methodology for Physical Random Number Generators
  • 17
    • 0003765598 scopus 로고
    • Version 1.2, Commission of the European Communities, Brussels, Belgium, June
    • Information technology security evaluation criteria (ITSEC). Version 1.2, Commission of the European Communities, Brussels, Belgium, June 1991. URL: http://www.ssi.gouv.fr/site documents/ITSEC/ITSEC-uk.pdf.
    • (1991) Information Technology Security Evaluation Criteria (ITSEC)
  • 20
    • 77952286492 scopus 로고    scopus 로고
    • RC 21673 (97655), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February
    • P. A. Karger. Multi-Organizational Mandatory Access Controls for Commercial Applications. RC 21673 (97655), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February 2000. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home.
    • (2000) Multi-Organizational Mandatory Access Controls for Commercial Applications
    • Karger, P.A.1
  • 22
    • 0000474763 scopus 로고    scopus 로고
    • Differential Power Analysis: Leaking Secrets
    • Proceedings of Crypto '99, Springer Verlag, Santa Barbara, CA, August
    • P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking Secrets. In Proceedings of Crypto '99, Lecture Notes in Computer Science, Vol.1666, Springer Verlag, pages 143-161, Santa Barbara, CA, August 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 143-161
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 23
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffe-Hellman and its Use in the IKE Protocols
    • Advances in Cryptology - CRYPTO 2003 Proceesings Santa Barbara, CA, 17-21 August Springer Verlag
    • H. Krawczyk. SIGMA: the 'SIGn-and-MAc' Approach to Authenticated Diffe-Hellman and its Use in the IKE Protocols. In Advances in Cryptology - CRYPTO 2003 Proceesings, pages 399-424, Santa Barbara, CA, 17-21 August 2003. Lecture Notes in Computer Science, Vol.2729, Springer Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 399-424
    • Krawczyk, H.1
  • 25
    • 84944051800 scopus 로고    scopus 로고
    • Verification of a formal security model for multiapplicative smart cards
    • 6th European Symposium on Research in Computer Security (ESORICS 2000), Springer Verlag, Toulouse, France
    • G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll. Verification of a formal security model for multiapplicative smart cards. In 6th European Symposium on Research in Computer Security (ESORICS 2000), Lecture Notes in Computer Science, Vol.1895, Springer Verlag, pages 17-36, Toulouse, France, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 17-36
    • Schellhorn, G.1    Reif, W.2    Schairer, A.3    Karger, P.4    Austel, V.5    Toll, D.6
  • 26
    • 0142157011 scopus 로고    scopus 로고
    • Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
    • 8th European Symposium on Research in Computer Security (ESORICS 2003), Gjøvik, Norway, 13-15 October Springer Verlag
    • H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Rabin, and D. C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. In 8th European Symposium on Research in Computer Security (ESORICS 2003), pages 181-200, Gjøvik, Norway, 13-15 October 2003. Lecture Notes in Computer Science, Vol.2808, Springer Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2808 , pp. 181-200
    • Scherzer, H.1    Canetti, R.2    Karger, P.A.3    Krawczyk, H.4    Rabin, T.5    Toll, D.C.6
  • 27
    • 77952276178 scopus 로고
    • ESD-TR-75-169, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, May
    • W. L. Schiller. The design and specification of a security kernel for the PDP-11/45. ESD-TR-75-169, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, May 1975. URL: http://csrc.nist.gov/ publications/history/schi75.pdf.
    • (1975) The Design and Specification of a Security Kernel for the PDP-11/45
    • Schiller, W.L.1
  • 28
    • 77952249782 scopus 로고
    • ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Dec.
    • J. Whitmore, A. Bensoussan, P. Green, D. Hunt, A. Kobziar, and J. Stern. Design for Multics security enhancements. ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Dec. 1973. URL: http://csrc.nist.gov/publications/history/whit74.pdf.
    • (1973) Design for Multics Security Enhancements
    • Whitmore, J.1    Bensoussan, A.2    Green, P.3    Hunt, D.4    Kobziar, A.5    Stern, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.