skip to content
Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA). Preview this item
ClosePreview this item
Checking...

Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA).

Author: Howard Shrobe; Andre DeHon; Thomas Knight; MASSACHUSETTS INST OF TECH CAMBRIDGE.
Publisher: Ft. Belvoir : Defense Technical Information Center, DEC 2009.
Edition/Format:   eBook : English
Database:WorldCat
Summary:
This report describes the Trust-management, Intrusion-tolerance, Accountability, and Reconstitution Architecture (TIARA) system, a broad design effort including novel computer architecture, operating system and application middleware. TIARA illustrates that a highly secure computer system can be designed without sacrificing performance. TIARA involves three major sub-efforts: A hardware security tagged architecture  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource
All Authors / Contributors: Howard Shrobe; Andre DeHon; Thomas Knight; MASSACHUSETTS INST OF TECH CAMBRIDGE.
OCLC Number: 505464339
Notes: Final rept. Apr 2007-Jun 2009.
Description: 133 p. ; 23 x 29 cm.

Abstract:

This report describes the Trust-management, Intrusion-tolerance, Accountability, and Reconstitution Architecture (TIARA) system, a broad design effort including novel computer architecture, operating system and application middleware. TIARA illustrates that a highly secure computer system can be designed without sacrificing performance. TIARA involves three major sub-efforts: A hardware security tagged architecture (STA) that tags each word of the computer's memory with metadata such as the data type and compartment of the data. The STA hardware enforces access rules controlling which principals are allowed to perform which operations on which data. This allows the construction of a novel Zero-kernel Operating System (ZKOS) that has no single all privileged kernel and that provides strong guarantees against penetration. Finally TIARA provides a level of application middleware that enforces architectural level constraints and maintains the provenance of application data. All common exploits are preventable by the TIARA architecture and this incurs only a minor increase in chip area.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/505464339>
library:oclcnum"505464339"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/505464339>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:contributor
schema:datePublished"2009"
schema:datePublished"DEC 2009"
schema:description"This report describes the Trust-management, Intrusion-tolerance, Accountability, and Reconstitution Architecture (TIARA) system, a broad design effort including novel computer architecture, operating system and application middleware. TIARA illustrates that a highly secure computer system can be designed without sacrificing performance. TIARA involves three major sub-efforts: A hardware security tagged architecture (STA) that tags each word of the computer's memory with metadata such as the data type and compartment of the data. The STA hardware enforces access rules controlling which principals are allowed to perform which operations on which data. This allows the construction of a novel Zero-kernel Operating System (ZKOS) that has no single all privileged kernel and that provides strong guarantees against penetration. Finally TIARA provides a level of application middleware that enforces architectural level constraints and maintains the provenance of application data. All common exploits are preventable by the TIARA architecture and this incurs only a minor increase in chip area."
schema:exampleOfWork<http://worldcat.org/entity/work/id/377981152>
schema:inLanguage"en"
schema:name"Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA)."
schema:numberOfPages"133"
schema:publisher
schema:url
schema:url<http://handle.dtic.mil/100.2/ADA511350>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.