Abstract
The paper introduces design principles of Secure Operating System Fenix developed in Information Security Centre of Saint-Petersburg Technical University. Fenix is a special purpose secure operating system supposed to be a basis for secure information processing. Fenix is fully compliant with Russian national information security requirements and standards. Security was the main goal of this project, other aspects of operating system were subject to it. Security functions enforcement was the main factor in the operating system design. Microkernel architecture, client-server technology and object-oriented approach form a core of the Fenix operating system design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Trusted Information Systems, Inc. Trusted Mach System Architecture (October 1995)
Open Software Foundation, Inc. MK++ Kernel Executive Summary (November 1995)
Secure Computing Corporation. DTOS General System Security and Assurability Assessment Report. (June 1997)
Secure Computing Corporation. DTOS Lessons Learned Report. (June 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zegzhda, D.P., Stepanov, P.G., Otavin, A.D. (2001). Fenix Secure Operating System: Principles, Models, and Architecture. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_21
Download citation
DOI: https://doi.org/10.1007/3-540-45116-1_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42103-0
Online ISBN: 978-3-540-45116-7
eBook Packages: Springer Book Archive