Information Technology Reference
In-Depth Information
Secure Hybrid Operating System
“Linux over Fenix”
Dmitry P. Zegzhda and Alex M. Vovk
Information Security Centre of Saint-Petersburg Polytechnical University,
P.O. Box 290, K-273, Saint-Petersburg, 195251
dmitry@ssl.stu.neva.ru
Abstract. The article discusses an approach to the construction of secure data
processing systems based on the hybrid operating system technology, making it
possible to use several different operating systems simultaneously on the same
computer and arrange for an interaction between those. The Fenix secure
operating system developed at the Software Security Laboratory(SSL) of the St.
Petersburg State Polytechnical University (SPSPU) is proposed to be used as a
host operating system, while the popular Linux OS — as a guest operating
system, to ensure compatibility with commonly used applications.
1 The Problem of Integration Between the Facilities of
Information Protection and Processing
In the course of their development information technologies infiltrate the areas where
the most crucial demand to information processing is that of security. In order to
entrust the information system with processing of confidential information whose
protection is vital for the security of the country, a guarantee that the security features
will function properly should be provided. And the only way of guaranteeing this is to
make use of proprietary security features developed in-house, because it is only in this
case that the full In this situation a problem emerges on the borderline between the
information technologies and security features, both undergoing continuous
development — the problem of integration between the domestically produced
facilities for information protection and the imported facilities for information
processing. This problem is of special importance for the software because the latter
is developing at a very high rate — the operating systems serving as the environment
for applications to function in, change every couple of years.
In this situation a problem emerges on the borderline between the information
technologies and security features, both undergoing continuous development — the
problem of integration between the domestically produced facilities for information
protection and the imported facilities for information processing. This problem is of
special importance for the software because the latter is developing at a very high
rate — the operating systems serving as the environment for applications to function
in, change every couple of years.
In order to deal with this problem the following contradictory requirements should
be met:
 
Search WWH ::




Custom Search