next up previous
Next: DARPA/NSA/DISA Joint Technology Office: Up: Challenges in Operating System Previous: Challenges in Operating System

Introduction

This literature survey is motivated by the number of issues that still exists in the area of operating system and network security. Although there are many well-known protocols and specifications, almost no system can be considered to be absolutely secure. Maybe the reason is that absolute security is not possible. Still, it is desirable to achieve the best possible security for every system. Because this area has so many different aspects, I picked three different papers about security. The first paper, "Research Challenges in Operating Systems" gives an broad overview of the topic. The second paper, "The DGSA: Unmet Information Security Challenges for Operating System Designers", describes a specific security architecture. Both papers were written for the American Department of Defense. Thus, the requirements for security are very high. The third paper, "Secure Public Internet Access Handler", is about an implemented system to protect public ports to a network in an university environment. Therefore, the requirements for security are completely different. In the following three sections, I explain the content of each paper, and section five concludes my survey.
next up previous
Next: DARPA/NSA/DISA Joint Technology Office: Up: Challenges in Operating System Previous: Challenges in Operating System
Tim Wellhausen
2000-01-20