Chapter 5. Designing Trusted Operating Systems

In this chapter:

  • What makes an operating system “secure”? Or “trustworthy”?

  • How are trusted systems designed, and which of those design principles carry over naturally to other program development tasks?

  • How do we develop “assurance” of the correctness of a trusted operating system?

Operating systems are the prime providers of security in computing systems. They support many programming capabilities, permit multiprogramming and sharing of resources, and enforce restrictions on program and user behavior. Because they have such power, operating systems are also targets for attack, because breaking through the defenses of an operating system gives access to the secrets of computing systems.

In Chapter ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.