Figure 7 - uploaded by Eduardo B. Fernández
Content may be subject to copyright.
Symbian OS Layered Architecture [Sym01] The UNIX operating system (Figure 8) is separated into 4 layers with clear interfaces between the system calls to the kernel and between the kernel and the hardware.

Symbian OS Layered Architecture [Sym01] The UNIX operating system (Figure 8) is separated into 4 layers with clear interfaces between the system calls to the kernel and between the kernel and the hardware.

Source publication
Article
Full-text available
An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Most of the reported attacks occur through the OS. The security of individual execution time actions such as process creation and memory protection is very important and we have previously presented pa...

Context in source publication

Context 1
... Symbian OS (Figure 7) uses a variation of the layered approach [Sym01]. ...

Citations

... b) Windows OS System Security: Security subsystem in Windows is made up of certain components that cannot grant access to a user without proper authentication and identification. Only security subsystem function offers the access control [12]. This can be implemented by giving different privileges and rights to the user. ...
... Utilities like "aescrypt" and "crypt" are used for securing file data. In these utilities as input password and file name is given to produce a file which will then encrypted [12]. Linux file system is a hierarchical tree that follows the Unix. ...
Article
Full-text available
Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities and attacks effectively. In this paper, our contribution is twofold. Firstly, we critically analyze the host vulnerabilities in modern desktop OSs. We group existing approaches and provide an easy and concise view of different security models adapted by most widely used OSs. The comparison of several OSs regarding structure, architecture, mode of working, and security models also form part of the paper. Secondly, we use the current usage statistics for Windows, Linux, and MAC OSs and predict their future. Our forecast will help the designers, developers and users of the different OSs to prepare for the upcoming years accordingly.
... We define here the security policies of the CIM as security patterns. All security patterns included in the PIM diagram are described in [29], except virtual machine monitor and security logger/auditor described in [35] and [17], respectively ( Figure 10). Instantiations of the same pattern P are denoted as P_1, P_2, and so on. ...
Article
In recent years, most organizations have suffered attacks against their information systems. For this reason, organizations should seek support from enterprise security architectures (ESAs) in order to secure their information assets. Security patterns can help when building complex ESAs, but they have some limitations that reduce their usability. In this paper, we define the metapattern of a new type of security pattern called Enterprise Security Pattern. This new metapattern provides a model-driven environment and combines all elements that must be considered when designing and building ESAs. We present here a precise meta-model and four diagrams to describe the metapattern of the enterprise security patterns. When avoiding a security problem, organizations could use enterprise security patterns to provide their designers with an optimal and proven security guideline and so standardize the design and building of the ESA for that problem. Enterprise security patterns could also facilitate the selection and tailoring of security policies, patterns, mechanisms, and technologies when a designer is building ESAs. To illustrate our ideas, we present an instance of this new type of pattern, showing how it can be used. Copyright © 2013 John Wiley & Sons, Ltd.
... • The Virtual Machine Monitor [Fer05a] provides isolation between different virtual machines that execute different operating systems. • Resource Assignment patterns can be used for assigning servers to users. ...
Conference Paper
Full-text available
Cloud Computing is a new computing structure that allows providers to deliver services on demand by means of virtualization. We are studying some security attacks in cloud computing by describing them in the form of misuse patterns. A misuse pattern describes how an information misuse is performed from the point of view of the attacker. It defines the environment where the attack is performed, how the attack is performed, countermeasures to stop it, and how to find forensic information to trace the attack once it happens. We are building a catalog of misuse patterns and we present here two of them: Resource Usage Monitoring (complete) and Malicious Virtual Machine Creation (partially). We discuss also the value of having such a catalog.
... Clearly, the security of operating systems is very critical since the OS supports the execution of all the applications as well as access to persistent data. We have presented several patterns for different aspects of the security of operating systems [1, 2, 3, 4, 5]. These are patterns intended for designers of such systems. ...
Article
Full-text available
An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Many of the reported attacks to Internetbased systems have occurred through the OS (kernel and utilities). The security of individual execution time actions such as process creation, memory protection, and the general architecture of the OS are very important and we have previously presented patterns for these functions. We present here patterns for the representation of processes and threads, emphasizing their security aspects. Another pattern considers the selection of virtual address space structure. We finally present a pattern to control the power of administrators, a common source of security problems.
Chapter
Full-text available
Cloud computing is a new computing model that allows providers to deliver services on demand by means of virtualization. One of the main concerns in cloud computing is security. In particular, the authors describe some attacks in the form of misuse patterns, where a misuse pattern describes how an attack is performed from the point of view of the attacker. Specially, they describe three misuse patterns: Resource Usage Monitoring Inference, Malicious Virtual Machine Creation, and Malicious Virtual Machine Migration Process.
Chapter
Patterns encapsulate experience and good practices that can be used for new designs. Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. A variety of security patterns has been developed for the construction of secure systems. We survey the security patterns developed by our group and a few other researchers. We apply these patterns through a secure system development method based on a hierarchical architecture whose layers define the scope of each security mechanism. We are building a catalog of security patterns that helps in defining the security mechanisms at each architectural level and at each development stage. In addition to their value for new system design, security patterns are useful to evaluate existing systems by analyzing if they include specific patterns or not. They are also useful to compare security standards and to verify that products comply with the standard. Finally, we have found security patterns very valuable for teaching security concepts and mechanisms.