Information Technology Reference
In-Depth Information
In the secure hybrid Linux over Fenix OS multiple permissions which subject S
has in regard to resource R can be written down as follows: P = AC(S, R, Op) = AC F
(S F , R F ,Op F ) Λ AC F (S L , R F ,Op L ) Λ AC L (S L , R L ,Op L ) Λ AC F (S F , R F ,Op F ) Λ AC L (S F ,
R F ,Op F ). As the access to the resources can take place only through resource
containers CR, a necessary condition for the access of subjects S to resources R is
CR R for the given type of resources R.
8 Using the Hybrid Secure Linux over Fenix OS
The hybrid secure Linux over Fenix OS can be employed as a platform for
workstations and servers with several isolated environments for processing
information of different confidentiality levels or gateways connecting information
systems of different confidentiality levels.
As an example, let us discuss how the hybrid Linux over Fenix system can be used
to solve the problem of setting up a workstation to process information of different
confidentiality levels and arrange for its connection to Internet(Fig. 5). Several
isolated from one another Linux VMs can be run on behalf of different users.
2
1
3
Fenix common process
Fenix common process
Fenix common process
Linux network applications
Linux network applications
Linux network applications
FTP-server
WWW-
server
File manager
Text Editor
FTP-client
WEB-
browser
Adapted Linux Kernel
Linux network protocols
stack
Adapted Linux Kernel
Gateway for Fenix
Resources Access
Adapted Linux Kernel
Linux network protocols
stack
Linux Virtual Machine
Linux Virtual Machine
Linux Virtual Machine
Fenix Internal Virtual Network
Fenix Resources
Fenix Internal Virtual Network
Fenix Security
Mechanisms
Gateway for real network
access
Gateway for real network
access
Local
Network
Internet
Fig. 5. A Workstation Based on the Hybrid Secure Linux over Fenix OS for Processing
Confidential Information and Work with the Local Area Network and the Internet
Search WWH ::




Custom Search