Pattern-oriented software architecture: a system of patterns
Pattern-oriented software architecture: a system of patterns
Protection in an information processing utility
Communications of the ACM
Security Control for COTS Components
Computer
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
(WCS)Operating System Concepts 7th Edition Flex Format
(WCS)Operating System Concepts 7th Edition Flex Format
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
Even more patterns for secure operating systems
Proceedings of the 2006 conference on Pattern languages of programs
Patterns for access control in distributed systems
Proceedings of the 14th Conference on Pattern Languages of Programs
Hi-index | 0.00 |
The controlled interaction of processes in a computing environment is fundamental for its security and reliability. Processes can be attacked by other processes or by external clients, errors in one process can propagate to others. We show here three patterns that can help provide a secure and reliable execution environment although they need to be complemented with other patterns. They include Protected Entry Points, which control the correct use of entry points according to their signatures (type and length of parameters); and Protection Rings, which control the calls between processes, enforcing constraints on entry points and signatures according to the level of trust in the processes. Finally, the Multilevel Secure Partitions (MSP) pattern, confines execution of a process to a system partition that has a specific confidentiality or integrity level.