Computer Security - Operating System Security Models - Lec I
Computer Security - Operating System Security Models - Lec I
The structure
of a large
x86 system.
◼ Algorithm Goals:
◼ All systems
◼ Fairness - giving each process a fair share of the CPU
◼ Balance - keeping all parts of the system busy
◼ Batch systems
◼ Throughput - maximize jobs per hour
◼ Turnaround time - minimize time between submission and termination
◼ CPU utilization - keep the CPU busy all the time
◼ Interactive systems
◼ Response time - respond to requests quickly
◼ Proportionality - meet users’ expectations
◼ Real-time systems
◼ Meeting deadlines - avoid losing data
◼ Predictability - avoid quality degradation in multimedia systems
◼ Examples: Linux, BSDs (FreeBSD, OpenBSD, NetBSD), Solaris, OS-9, AIX, HP-
UX, DOS, Microsoft Windows (95,98,Me), OpenVMS
◼ Most operating systems such as all Windows, Linux, and Macintosh and most
flavors of Unix are based on DAC models.
Prepared by: Kushan Sharma
Mandatory Access Control (MAC)
◼ The system specifies which subjects can access specific data objects.
◼ Admins creates a set of levels and each user is linked with a specific level.
◼ Users can access all the resources that are not greater than his level.
◼ MAC model is based on security labels. Subjects are given a security clearance
(secret, top secret, confidential, etc.), and data objects are given a security
classification (secret, top secret, confidential, etc.).
◼ When the system is making an access control decision, it tries to match the
clearance of the subject with the classification of the object.
◼ Usually used in environments where confidentiality is of utmost importance.
◼ Formally, the policy restricts access according to the following two properties:
◼ (Chinese Wall) Simple Security Rule: A subject S can read on object O only if
◼ O is in the same DS as an object already accessed by S, OR
◼ O belongs to a CI from which S has not yet accessed any information
◼ (Chinese Wall) *-property: A subject S can write an object O only if
◼ S can read O according to the simple security rule, AND
◼ All objects that S can read are in the same DS as O.
◼ A system that can provide all these facilities is called a trustworthy system.