AUTHENTICATED OPERATION
#1

AUTHENTICATED OPERATION



INTRODUCTION



Microsoft's next-generation secure computing base aims to provide robust access control while retaining the openness of personal computers. Unlike closed systems, an NGSCB platform can run any software, but it provides mechanisms that allow operating systems and applications to protect themselves against other software running on the same machine. For example, it can make home finance data inaccessible to programs that the user has not specifically authorized.



To enable this mode of operation, NGSCB platforms implement

" Isolation among operating systems and among processes. OS isolation is related to virtual machine monitors. However, some key NGSCB innovations make it more robust than traditional VMMs by enabling a small machine monitor to isolate itself and other high-assurance components from the basic input/output system (BIOS), device drivers, and bus master devices.

" Hardware and software security primitives that allow software modules to keep secrets and authenticate themselves to local and remote entities. These primitives maintain the trustworthiness of OS access protections without preventing the platform from booting other operating systems.



We refer to a security regimen that allows any software to run but requires it to be identified in access-control decisions as authenticated operation, and we call a hardware-software platform that supports authenticated operation a trusted open system.



A variety of commercial requirements and security goals guided the NGSCB system design. The main commercial requirement was for an open architecture that allows arbitrary hardware peripherals to be added to the platform and arbitrary software to execute without involving a central authority. Furthermore, the system had to operate in the legacy environment of personal computers. While we introduced changes to core platform components, most of the PC architecture remained unmodified. The system had to be compatible with the majority of existing peripherals. Finally, the hardware changes had to be such that they would not have a significant impact on PC production costs.



Our main security goal was assurance. Assurance is not any particular security function. It refers to the degree of confidence the owner of a system can have in its correct behavior especially in the presence of attacks. A further goal was to enable authenticated operation.



The hardware platforms are not required to provide protection against hardware tampering. Protection against tampering costs money, and it is clear that most security attacks facing users are launched by malicious software, or are remotely launched and exploit bugs in otherwise benign software. However, we anticipate platforms will be deployed that are also robust against hardware attacks, especially in high-security corporate and government settings.



AUTHENTICATED OPERATION



Traditional access-control systems protect data against unauthorized access through an authentication mechanism such as a password, biometric data, or smart card. Each access request triggers a system component, the guard, that is part of the trusted computing base. The guard grants or denies access, and can audit access requests according to the user, the request, and the system's access-control policy.



Authenticated operation bases access-control decisions in part on the identity of the program making a request. For example, a user can restrict access to files containing financial data to only certain authorized programs.

It is straightforward to extend most existing user-based access-control systems to code-based access models. For example, a resource can have an access-control list that grants access only to a list of programs rather than to users who run these programs. We expect that most systems built to support authenticated operation will base access-control decisions on both program and user resource requests




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: project onbiometric authenticated atm, ngscb,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols seminar paper 0 966 14-03-2012, 04:07 PM
Last Post: seminar paper
  ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT seminar paper 0 707 11-02-2012, 04:36 PM
Last Post: seminar paper
  BASIC HVDC AND CONVERTER OPERATION seminar paper 0 739 09-02-2012, 02:15 PM
Last Post: seminar paper
  Phasor measurement of wind power plant operation in Eastern Denmark seminar addict 0 792 26-01-2012, 11:14 AM
Last Post: seminar addict
  Generator & Switchyard system operation Presentation outline seminar addict 0 1,132 09-01-2012, 04:28 PM
Last Post: seminar addict
  POWERHOUSE OPERATION, MAINTAINANCE project report helper 0 806 20-10-2010, 04:35 PM
Last Post: project report helper
Shocked Extraction of Red Cabbage Anthocyanins: Optimization of the Operation Conditions of t project report helper 0 1,380 02-10-2010, 05:45 PM
Last Post: project report helper

Forum Jump: