Loading…

Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark

As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security ope...

Full description

Saved in:
Bibliographic Details
Main Authors: Krasov, A. V., Shterenberg, S. I.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 257
container_issue
container_start_page 253
container_title
container_volume
creator Krasov, A. V.
Shterenberg, S. I.
description As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.
doi_str_mv 10.1109/ICUMT51630.2020.9222413
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9222413</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9222413</ieee_id><sourcerecordid>9222413</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693</originalsourceid><addsrcrecordid>eNotkMtqwzAQRdVCoWmaL-ii-gGn0shypGUJfQQSuomhuyBbo0StLQdLaZq_r0OzGAaGc8_AJeSRsynnTD8t5uVqLXkh2BQYsKkGgJyLK3LHZ6C4HoZfkxFwOcsYiM9bMonxizHGQRWg8xE5rjDtOhup63paHXxjfdhSQ1N_iAktxfDj-y60GBL1gZbB_9Juj71JZy6eBqiNtDJxYLtA0w6pb_cNngMDM5w6N-is3_pkGno0CfvW9N_35MaZJuLkssekfH1Zz9-z5cfbYv68zDwwkTJZ11BVSuYSnQGm8oq7mhdK1BIrWzFnZO1sXlsptQUlCqUNCuEKBGWx0GJMHv69HhE3-94Pz0-bS0_iD0jDYOU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><source>IEEE Xplore All Conference Series</source><creator>Krasov, A. V. ; Shterenberg, S. I.</creator><creatorcontrib>Krasov, A. V. ; Shterenberg, S. I.</creatorcontrib><description>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</description><identifier>EISSN: 2157-023X</identifier><identifier>EISBN: 1728192811</identifier><identifier>EISBN: 9781728192819</identifier><identifier>DOI: 10.1109/ICUMT51630.2020.9222413</identifier><language>eng</language><publisher>IEEE</publisher><subject>Assembler ; Buildings ; Certification Center ; File systems ; Linux ; Operating systems ; Organizations ; Trusted computing ; trusted computing environment ; Unix ; Watermarking</subject><ispartof>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, p.253-257</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9222413$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23921,23922,25131,27916,54546,54923</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9222413$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Krasov, A. V.</creatorcontrib><creatorcontrib>Shterenberg, S. I.</creatorcontrib><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><title>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</title><addtitle>ICUMT</addtitle><description>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</description><subject>Assembler</subject><subject>Buildings</subject><subject>Certification Center</subject><subject>File systems</subject><subject>Linux</subject><subject>Operating systems</subject><subject>Organizations</subject><subject>Trusted computing</subject><subject>trusted computing environment</subject><subject>Unix</subject><subject>Watermarking</subject><issn>2157-023X</issn><isbn>1728192811</isbn><isbn>9781728192819</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2020</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtqwzAQRdVCoWmaL-ii-gGn0shypGUJfQQSuomhuyBbo0StLQdLaZq_r0OzGAaGc8_AJeSRsynnTD8t5uVqLXkh2BQYsKkGgJyLK3LHZ6C4HoZfkxFwOcsYiM9bMonxizHGQRWg8xE5rjDtOhup63paHXxjfdhSQ1N_iAktxfDj-y60GBL1gZbB_9Juj71JZy6eBqiNtDJxYLtA0w6pb_cNngMDM5w6N-is3_pkGno0CfvW9N_35MaZJuLkssekfH1Zz9-z5cfbYv68zDwwkTJZ11BVSuYSnQGm8oq7mhdK1BIrWzFnZO1sXlsptQUlCqUNCuEKBGWx0GJMHv69HhE3-94Pz0-bS0_iD0jDYOU</recordid><startdate>202010</startdate><enddate>202010</enddate><creator>Krasov, A. V.</creator><creator>Shterenberg, S. I.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202010</creationdate><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><author>Krasov, A. V. ; Shterenberg, S. I.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Assembler</topic><topic>Buildings</topic><topic>Certification Center</topic><topic>File systems</topic><topic>Linux</topic><topic>Operating systems</topic><topic>Organizations</topic><topic>Trusted computing</topic><topic>trusted computing environment</topic><topic>Unix</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Krasov, A. V.</creatorcontrib><creatorcontrib>Shterenberg, S. I.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Krasov, A. V.</au><au>Shterenberg, S. I.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</atitle><btitle>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</btitle><stitle>ICUMT</stitle><date>2020-10</date><risdate>2020</risdate><spage>253</spage><epage>257</epage><pages>253-257</pages><eissn>2157-023X</eissn><eisbn>1728192811</eisbn><eisbn>9781728192819</eisbn><abstract>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</abstract><pub>IEEE</pub><doi>10.1109/ICUMT51630.2020.9222413</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2157-023X
ispartof 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, p.253-257
issn 2157-023X
language eng
recordid cdi_ieee_primary_9222413
source IEEE Xplore All Conference Series
subjects Assembler
Buildings
Certification Center
File systems
Linux
Operating systems
Organizations
Trusted computing
trusted computing environment
Unix
Watermarking
title Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A03%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Methods%20for%20building%20a%20trusted%20environment%20in%20Unix%20operating%20systems%20based%20on%20the%20implementation%20of%20a%20digital%20watermark&rft.btitle=2020%2012th%20International%20Congress%20on%20Ultra%20Modern%20Telecommunications%20and%20Control%20Systems%20and%20Workshops%20(ICUMT)&rft.au=Krasov,%20A.%20V.&rft.date=2020-10&rft.spage=253&rft.epage=257&rft.pages=253-257&rft.eissn=2157-023X&rft_id=info:doi/10.1109/ICUMT51630.2020.9222413&rft.eisbn=1728192811&rft.eisbn_list=9781728192819&rft_dat=%3Cieee_CHZPO%3E9222413%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9222413&rfr_iscdi=true