Language-based system: Difference between revisions

Content deleted Content added
No edit summary
Examples: Add RedoxOS
Tags: Mobile edit Mobile web edit
 
(6 intermediate revisions by 5 users not shown)
Line 1:
{{Short description|Type of operating system that uses language features to provide security}}
A '''language-based system''' is a type of [[operating system]] that uses [[programming language|language]] features to provide [[Language-based security|security]], instead of or in addition to hardware mechanisms. In such systems, code referred to as the ''trusted base'' is responsible for approving programs for [[execution (computing)|execution]], assuring they cannot perform operations detrimental to the system's stability without first being detected and dealt with.<ref name="Schneider">[https://www.cs.cmu.edu/~rwh/papers/langsec/dagstuhl.pdf A Language-Based Approach to Security], Schneider F., Morrissett G. (Cornell University) and Harper R. (Carnegie Mellon University). Informatics: 10 Years Back, 10 Years Ahead. (2000)</ref> A very common strategy of guaranteeing that such operations are impossible is to base the system around a [[High-level programming language|high-level language]], such as [[Java (programming language)|Java]], whose design precludes dangerous constructs; many are entirely written in such a language, with only the minimum amount of [[low-level programming language|low-level code]] being used.<ref>{{cite web|
title=JX - A flexible Java Operating System (poster)|
Line 5 ⟶ 6:
 
==Examples==
*[[{{annotated link|Burroughs MCP]]}}
*[[{{annotated link|Cosmos (operating system)]]|Cosmos}}
*[[{{annotated link|Emerald (programming language)|Emerald]]}}
*[[{{annotated link|Inferno (operating system)|Inferno]]}}
*[[{{annotated link|JX (operating system)|JX]]}}
*[[{{annotated link|Lisp machine]]}}
*[[{{annotated link|Midori (operating system)|Midori]]}}
*[[{{annotated link|Oberon (operating system)|Oberon]]}}
*[[Redox{{annotated (operating system)link|RedoxOS|Redox]]}}
*[[{{annotated link|Singularity (operating system)|Singularity]]}}
*[[{{annotated link|Smalltalk]]}}
*[https://github.com/theseus-os/Theseus Theseus OS]
*[[UCSD P-system]]
*[[Verve{{annotated (operatinglink|UCSD P-system)|Verve]]}}
*{{annotated link|Verve (operating system)|Verve}}
 
==See also==
Line 25 ⟶ 27:
{{Reflist}}
{{refbegin}}
*A Sabelfeld, AC Myers ''[httphttps://ieeexplore.ieee.org/xpldocument/freeabs_all.jsp1159651/;jsessionid=A692CC7FF77CD2C81E9E3E42B7099A2A?arnumber=1159651&isnumber=25986 Language-based information-flow security]'' IEEE Journal on Selected Areas in Communications, 2003 Volume 21, Issue 1 pp.&nbsp;5–19
*V Haldar, D Chandra, M Franz ''[http://www.vivekhaldar.com/pubs/trustedvm-tr.pdf Semantic remote attestation—a virtual machine directed approach to trusted computing]'' USENIX Virtual Machine Research and Technology Symposium, 2004
*Giacobazzi, Mastroeni ''[http://doi.acm.org/10.1145/964001.964017 Abstract non-interference: parameterizing non-interference by abstract interpretation]'' Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages pp 186–97 (2004)