
 
7  CONCLUSION 
The separation kernel abstraction and the principle 
of least privilege are significant tools for the 
protection of critical system resources. In this paper, 
we described a fusion of the separation abstraction 
with the least privilege principle.  In addition to the 
inter-block flow control policy prescribed by the 
traditional separation kernels, this approach supports 
an orthogonal, finer-grained flow control policy by 
extending the granularity of protected elements to 
subjects and resources, as well as blocks, in a 
partitioned system. We showed how least privilege 
provides assurance that the effects of subjects’ 
activities may be minimized to their intended scope. 
In summary, application of the principle of least 
privilege, resource separation and controlled sharing 
are synergistic security properties in a separation 
kernel.  Each subject is only given a minimum set of 
logically separated resources necessary to perform 
its assigned task, and the sharing of resources 
between subjects is rigorously controlled by the 
kernel.  A separation kernel that correctly 
implements these properties can meet the objective 
to minimize and confine damage with a high level of 
assurance. 
ACKNOWLEDGEMENTS 
We  like to thank Michael McEvilley for his helpful 
comments regarding the history of the principle of 
least privilege. 
REFERENCES 
Alves-Foss, Jim and Taylor, Carol. An Analysis of the 
GWV Security Policy. In Proc. of Fifth International 
Workshop on the ACL2  Theorem Prover and its 
Applications (ACL2-2004). November 2004. 
Ames, B. Real-Time Software Goes Modular. Military & 
Aerospace Electronics. Vol 14, No. 9. pp24-29. Sept. 
2003. 
Anderson, J.P. On the Feasibility of Connecting RECON 
to an External Network. Tech. Report, James P. 
Anderson Co.. March 1981. 
Boebert, W. E. and R. Y. Kain. A Practical Alternative to 
Hierarchical Integrity Policies. In Proc. of the 
National Computer Security Conference. Vol. 8, Num. 
18 1985. 
Common Criteria Project Sponsoring Organizations 
(CCPSO).  Common Criteria for Information 
Technology Security Evaluation. Version 3.0 Revision 
2, CCIMB-2005-07-[001, 002, 003]. June 2005. 
Department of Defense (DOD). Trusted Computer System 
Evaluation Criteria.  DoD 5200.28-STD, December 
1985. 
Irvine, C. E., Levin, T. E., Nguyen, T. D., and Dinolt, G. 
W. The Trusted Computing Exemplar Project. Proc. of 
the 2004 IEEE Systems, Man and Cybernetics 
Information Assurance Workshop. West Point, NY, 
June 2004. pp. 109-115. 
Irvine, C. E., SecureCore Project. last accessed 8 April 
2006. last modified 5 April 2006. 
http://cisr.nps.edu/projects/securecore.html.  
Kemmerer, R.A. A Practical Approach to Identifying 
Storage and     Timing Channels. In Proc. of the 
1982  IEEE Symposium on Security and Privacy. 
Oakland, CA. April 1982. pp. 66-73.    
Lampson, B. Protection. In Proc. of 5th Princeton 
Conference on Information Sciences.  Princeton, NJ. 
1971. Reprinted in Operating Systems Reviews, 8(1): 
18-24, 1974. 
Levin, T. E., Irvine, C. E., Nguyen, T. D.. A Note on High 
Robustness Requirements for Separation Kernels. 6th 
International Common Criteria Conference (ICCC 
05). September 28-29, 2005.  
Loscocco, P.A. Smalley, S.D. (2001). Meeting critical 
security objectives with Security-Enhanced Linux. In 
Proc. of the 2001 Ottawa Linux Symposium 
Millen, J.K. Covert Channel Capacity. Proc of the IEEE 
Symposium on Research in Security and Privacy. 
Oakland, CA. pp. 60-66. April 1987. 
National Security Agency (NSA). U.S. Government 
Protection Profile for Separation Kernels in 
Environments Requiring High Robustness. 1 July 
2004.  http://niap.nist.gov/pp/draft_pps/ 
pp_draft_skpp_hr_v0.621.html 
Nguyen, T. D., Levin, T. E., and Irvine, C. E.. High 
Robustness Requirements in a Common Criteria 
Protection Profile. Proceedings of the Fourth IEEE 
International Information Assurance Workshop. Royal 
Holloway, UK. April 2006 
Preparata, F. P., and Yeh, R.T.. Introduction to Discrete 
Structures for Computer Science and Engineering. 
Addison Wesley. Reading, MA. 1973. 
Reed, D.P.,  and Kanodia, R.K.. Synchronization with 
Eventcounts and Sequencers. 
Communications of the 
ACM.. 22(2):115-123. 1979. 
Rushby. J.. Design And Verification Of Secure Systems. 
Operating Systems Review. 15(5). 1981. 
Saltzer, J. H., and Schroeder, M. D.. The Protection of 
Information in Operating Systems. Proceedings of the 
IEEE. 63(9):1278-1308. 1975. 
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
362