7 CONCLUSION
The separation kernel abstraction and the principle
of least privilege are significant tools for the
protection of critical system resources. In this paper,
we described a fusion of the separation abstraction
with the least privilege principle. In addition to the
inter-block flow control policy prescribed by the
traditional separation kernels, this approach supports
an orthogonal, finer-grained flow control policy by
extending the granularity of protected elements to
subjects and resources, as well as blocks, in a
partitioned system. We showed how least privilege
provides assurance that the effects of subjects’
activities may be minimized to their intended scope.
In summary, application of the principle of least
privilege, resource separation and controlled sharing
are synergistic security properties in a separation
kernel. Each subject is only given a minimum set of
logically separated resources necessary to perform
its assigned task, and the sharing of resources
between subjects is rigorously controlled by the
kernel. A separation kernel that correctly
implements these properties can meet the objective
to minimize and confine damage with a high level of
assurance.
ACKNOWLEDGEMENTS
We like to thank Michael McEvilley for his helpful
comments regarding the history of the principle of
least privilege.
REFERENCES
Alves-Foss, Jim and Taylor, Carol. An Analysis of the
GWV Security Policy. In Proc. of Fifth International
Workshop on the ACL2 Theorem Prover and its
Applications (ACL2-2004). November 2004.
Ames, B. Real-Time Software Goes Modular. Military &
Aerospace Electronics. Vol 14, No. 9. pp24-29. Sept.
2003.
Anderson, J.P. On the Feasibility of Connecting RECON
to an External Network. Tech. Report, James P.
Anderson Co.. March 1981.
Boebert, W. E. and R. Y. Kain. A Practical Alternative to
Hierarchical Integrity Policies. In Proc. of the
National Computer Security Conference. Vol. 8, Num.
18 1985.
Common Criteria Project Sponsoring Organizations
(CCPSO). Common Criteria for Information
Technology Security Evaluation. Version 3.0 Revision
2, CCIMB-2005-07-[001, 002, 003]. June 2005.
Department of Defense (DOD). Trusted Computer System
Evaluation Criteria. DoD 5200.28-STD, December
1985.
Irvine, C. E., Levin, T. E., Nguyen, T. D., and Dinolt, G.
W. The Trusted Computing Exemplar Project. Proc. of
the 2004 IEEE Systems, Man and Cybernetics
Information Assurance Workshop. West Point, NY,
June 2004. pp. 109-115.
Irvine, C. E., SecureCore Project. last accessed 8 April
2006. last modified 5 April 2006.
http://cisr.nps.edu/projects/securecore.html.
Kemmerer, R.A. A Practical Approach to Identifying
Storage and Timing Channels. In Proc. of the
1982 IEEE Symposium on Security and Privacy.
Oakland, CA. April 1982. pp. 66-73.
Lampson, B. Protection. In Proc. of 5th Princeton
Conference on Information Sciences. Princeton, NJ.
1971. Reprinted in Operating Systems Reviews, 8(1):
18-24, 1974.
Levin, T. E., Irvine, C. E., Nguyen, T. D.. A Note on High
Robustness Requirements for Separation Kernels. 6th
International Common Criteria Conference (ICCC
05). September 28-29, 2005.
Loscocco, P.A. Smalley, S.D. (2001). Meeting critical
security objectives with Security-Enhanced Linux. In
Proc. of the 2001 Ottawa Linux Symposium
Millen, J.K. Covert Channel Capacity. Proc of the IEEE
Symposium on Research in Security and Privacy.
Oakland, CA. pp. 60-66. April 1987.
National Security Agency (NSA). U.S. Government
Protection Profile for Separation Kernels in
Environments Requiring High Robustness. 1 July
2004. http://niap.nist.gov/pp/draft_pps/
pp_draft_skpp_hr_v0.621.html
Nguyen, T. D., Levin, T. E., and Irvine, C. E.. High
Robustness Requirements in a Common Criteria
Protection Profile. Proceedings of the Fourth IEEE
International Information Assurance Workshop. Royal
Holloway, UK. April 2006
Preparata, F. P., and Yeh, R.T.. Introduction to Discrete
Structures for Computer Science and Engineering.
Addison Wesley. Reading, MA. 1973.
Reed, D.P., and Kanodia, R.K.. Synchronization with
Eventcounts and Sequencers.
Communications of the
ACM.. 22(2):115-123. 1979.
Rushby. J.. Design And Verification Of Secure Systems.
Operating Systems Review. 15(5). 1981.
Saltzer, J. H., and Schroeder, M. D.. The Protection of
Information in Operating Systems. Proceedings of the
IEEE. 63(9):1278-1308. 1975.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
362