Trusted OS
TOS Resource CenterHomeContactSite Map
Overview
General Topics
Historical Museum
Evaluations
Resources
Related Web Sites
TOS Library
Conferences and Events
Courses and Education
Products
Trusted OS Products
Other MLS Products
Service Providers
 
Welcome
 
The Latest News
Article One 
Article Two 
Article Three 
Article Four 
News Archive 
Upcoming Events

To the Trusted Operating System web site, an Internet-based resource center created to deliver information on OS technology and related products, and provide access to knowledgeable consultants, vendors and other members of the TOS community. This is an open site, and your comments and ideas are welcome. If you have information, papers, or products that you would like on this site, please use our Contact section.


What are Trusted Operating Systems?

An operating system must have certain characteristics to be considered trusted:

  • It must be able to implement a mandatory access policy, which means that a user cannot give away information that is under his control. Controls must be imposed on all system resources (including processes, filesystems, networking, and IPC).
  • It must use a least privelege model, which means that it grants fine-grained controls over priveleged operations to users and processes on a "need-to-know" basis. There is no superuser account.
  • It must include assurance by being independently validated. An OS with an impressive set of features is completely worthless if there is no evidence that it works as advertised.


Why use a Trusted OS?

The fastest growing market for trusted operating systems is Internet-based commerce. Businesses on the web constantly face challenges to their security. Only the operating system, which can impose limits on all software, can effectively control certain threats, such as compromise of priveleged applications. A trusted operating system does not replace other security mechanisms; it strengthens them. Elaborate encryption and authentication systems are absolutely worthless if a hacker can bypass them and directly access confidential files. Only a trusted operating system can ensure that security policies are completely enforced.

 
Copyright © 2000 Trusted OS Resource Center Trusted OS Resource Center All Rights Reserved
Last Modified November 28, 2000