EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1715 Sep 2015 - 13:43ThomasMisa 
1615 Sep 2015 - 13:42ThomasMisa 
1515 Sep 2015 - 13:37ThomasMisa 
1415 Sep 2015 - 13:35ThomasMisa 
1315 Sep 2015 - 13:21ThomasMisa 
1222 Jul 2014 - 15:31ThomasMisa 
1122 Jul 2014 - 15:28ThomasMisa 
1022 Jul 2014 - 15:22ThomasMisaAttached file Screen_shot_2014-07-22_at_3.19.50_PM.png 
922 Jul 2014 - 15:00ThomasMisa 
822 Jul 2014 - 10:34ThomasMisa 
earlier first

Render style:     Context:


 History: r17 | r9 < r8 < r7 < r6
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Systems>SystemsSCOMP (revision 7)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

S/COMP

 

Secure Communications Processor (Scomp) was a system, including hardware and a security kernel, developed at Honeywell in order to implement the Multics multilevel security requirements. Honeywell originally intended to develop a security kernel and an emulator that would run an operating system in a virtual environment, but the system performance cost was sufficient to warrant developing an operating system with its own applications for the Scomp architecture. As a result, the Scomp security kernel controlled access to system resources, requiring that an application submit a hardware descriptor to the security kernel in order to request access to secured hardware resources. The kernel then permitted or denied that application access to hardware depending upon established permissions for each process.(1)(2) Scomp received TCSEC A1 certification in 1984, and evolved into subsequent secure systems, such as XTS-200, XTS- 400, and the STOP series.(3)

Notes

1 : Lester J. Fraim, "Scomp: A Solution to the Multilevel Security Problem," Computer (July 1983), 26-34.

2 : Trent Jaeger, Operating System Security, (Morgan & Claypool, 2008), 77-80.

3 : lock BAE Systems Information Technology, LLC, Common Criteria Evaluation and Validation Report Scheme. XTS-44/STOP 6.1.E. CCEVS-VR-05-0094, Gaithersburg, MD (National Institute of Standards and Technology, March 1, 2005), 5. (Login required)


Edit | WYSIWYG | Attach |  PDF |  History: r17 | r9 < r8 < r7 < r6 |  Backlinks |  Raw View | More topic actions...
Topic revision: r7 - 03 Oct 2013 - 16:03:56 - norqu036
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback