Language based system
In a language-based system ( operating system ), both the kernel and the programs were programmed in a high-level language such as Java .
protection
In a language-based protection system, the kernel only allows the execution of code that has been generated by a compiler classified as trustworthy . The code must also be written in a language that is considered to be trustworthy. Such a language could then, for example, be implemented in such a way that it makes it impossible for a programmer to use it for something that contradicts the defined security rules of the system (see also managed code ) .
Examples
literature
- A Sabelfeld, AC Myers: Language-based information-flow security . In: IEEE Journal on Selected Areas in Communications, 2003, Volume 21, Issue 1, pp. 5-19.
- V Haldar, D Chandra, M Franz: Semantic remote attestation - a virtual machine directed approach to trusted computing (PDF; 108 kB). USENIX Virtual Machine Research and Technology Symposium, 2004.
- Giacobazzi, Mastroeni: Abstract non-interference: parameterizing non-interference by abstract interpretation . Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2004, pp. 186-197, doi: 10.1145 / 964001.964017 .
- Algis Rudys, Dan S. Wallach: Termination in language-based systems . In: ACM Transactions on Information and System Security (TISSEC), Volume 5, Issue 2, May 2002, pp. 138-168, doi: 10.1145 / 505586.505589 .
Individual evidence
- ↑ Michael Golm, Meik Felser, Christian Wawerish, Jürgen Kleinöder: JX - A flexible operating system (diagram) . University of Erlangen. Retrieved April 21, 2007.
- ^ F. Schneider, G. Morrissett, R. Harper: A Language-Based Approach to Security . (PDF; 175 kB) In: Informatics: 10 Years Back, 10 Years Ahead . 2000