An enhanced scheme of enforcing DTE security policy based on trusted computing technology

As a classical security policy, DTE (domain and type enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there are three main questions for most systems that have implemented DTE security policy as follows: 1) security policy enforcing module is easy to be tampered and bypass before loaded; 2) The content of security policy file is easily to be disclosed and modified; 3) The system is prone to suffer from "changed-name" attack. Trusted computing provides novel ideas and methods to solve the question of information security. The paper presents an enhanced scheme of enforcing DTE security policy based on trusted computing technology, it is scalable and can deal with the questions mentioned above well. It analyses the whole design of scheme in details and implements a prototype system to demonstrate the feasibility. Experiment results show that it has accepted performance overhead.

[1]  Daniel F. Sterne,et al.  Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[2]  John Potter,et al.  An Approach to Dynamic Domain and Type Enforcement , 1997, ACISP.

[3]  Stephen Smalley,et al.  Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.

[4]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[5]  Daniel A. Menascé Security Performance , 2003, IEEE Internet Comput..