Abstract
I would like to talk about an idea, not results. Firstly I clarify the problems with previous trusted computer systems. Information security requires security of application system and security of platform, including hardware and operating system. Trusted computer systems or TCSs have been studied and used by the military since the early 1970s, but the requirement for TCSs increases because of computerisation in government, growth of economic commerce and passing of electronic signature laws. TCSs are now needed not only for the military but also for public and private sector, as in banking, insurance and digital content delivery. Public and private sector TCSs need not only to be secure but also to be easy to use for non-professional users, as they have to be used for security critical tasks as well as daily tasks. They also have to be cost effective. In meeting these new requirements, TCSs have two problems: they are hard to use and inconvenient for daily tasks, and they are much more expensive than ordinary systems. So I will propose a multi-OS approach to trusted computer systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoshiura, H. (2002). A Multi-OS Approach to Trusted Computer Systems. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_18
Download citation
DOI: https://doi.org/10.1007/3-540-45807-7_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44263-9
Online ISBN: 978-3-540-45807-4
eBook Packages: Springer Book Archive