Loading…
Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark
As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security ope...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 257 |
container_issue | |
container_start_page | 253 |
container_title | |
container_volume | |
creator | Krasov, A. V. Shterenberg, S. I. |
description | As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered. |
doi_str_mv | 10.1109/ICUMT51630.2020.9222413 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9222413</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9222413</ieee_id><sourcerecordid>9222413</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693</originalsourceid><addsrcrecordid>eNotkMtqwzAQRdVCoWmaL-ii-gGn0shypGUJfQQSuomhuyBbo0StLQdLaZq_r0OzGAaGc8_AJeSRsynnTD8t5uVqLXkh2BQYsKkGgJyLK3LHZ6C4HoZfkxFwOcsYiM9bMonxizHGQRWg8xE5rjDtOhup63paHXxjfdhSQ1N_iAktxfDj-y60GBL1gZbB_9Juj71JZy6eBqiNtDJxYLtA0w6pb_cNngMDM5w6N-is3_pkGno0CfvW9N_35MaZJuLkssekfH1Zz9-z5cfbYv68zDwwkTJZ11BVSuYSnQGm8oq7mhdK1BIrWzFnZO1sXlsptQUlCqUNCuEKBGWx0GJMHv69HhE3-94Pz0-bS0_iD0jDYOU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><source>IEEE Xplore All Conference Series</source><creator>Krasov, A. V. ; Shterenberg, S. I.</creator><creatorcontrib>Krasov, A. V. ; Shterenberg, S. I.</creatorcontrib><description>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</description><identifier>EISSN: 2157-023X</identifier><identifier>EISBN: 1728192811</identifier><identifier>EISBN: 9781728192819</identifier><identifier>DOI: 10.1109/ICUMT51630.2020.9222413</identifier><language>eng</language><publisher>IEEE</publisher><subject>Assembler ; Buildings ; Certification Center ; File systems ; Linux ; Operating systems ; Organizations ; Trusted computing ; trusted computing environment ; Unix ; Watermarking</subject><ispartof>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, p.253-257</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9222413$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23921,23922,25131,27916,54546,54923</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9222413$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Krasov, A. V.</creatorcontrib><creatorcontrib>Shterenberg, S. I.</creatorcontrib><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><title>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</title><addtitle>ICUMT</addtitle><description>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</description><subject>Assembler</subject><subject>Buildings</subject><subject>Certification Center</subject><subject>File systems</subject><subject>Linux</subject><subject>Operating systems</subject><subject>Organizations</subject><subject>Trusted computing</subject><subject>trusted computing environment</subject><subject>Unix</subject><subject>Watermarking</subject><issn>2157-023X</issn><isbn>1728192811</isbn><isbn>9781728192819</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2020</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtqwzAQRdVCoWmaL-ii-gGn0shypGUJfQQSuomhuyBbo0StLQdLaZq_r0OzGAaGc8_AJeSRsynnTD8t5uVqLXkh2BQYsKkGgJyLK3LHZ6C4HoZfkxFwOcsYiM9bMonxizHGQRWg8xE5rjDtOhup63paHXxjfdhSQ1N_iAktxfDj-y60GBL1gZbB_9Juj71JZy6eBqiNtDJxYLtA0w6pb_cNngMDM5w6N-is3_pkGno0CfvW9N_35MaZJuLkssekfH1Zz9-z5cfbYv68zDwwkTJZ11BVSuYSnQGm8oq7mhdK1BIrWzFnZO1sXlsptQUlCqUNCuEKBGWx0GJMHv69HhE3-94Pz0-bS0_iD0jDYOU</recordid><startdate>202010</startdate><enddate>202010</enddate><creator>Krasov, A. V.</creator><creator>Shterenberg, S. I.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202010</creationdate><title>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</title><author>Krasov, A. V. ; Shterenberg, S. I.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Assembler</topic><topic>Buildings</topic><topic>Certification Center</topic><topic>File systems</topic><topic>Linux</topic><topic>Operating systems</topic><topic>Organizations</topic><topic>Trusted computing</topic><topic>trusted computing environment</topic><topic>Unix</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Krasov, A. V.</creatorcontrib><creatorcontrib>Shterenberg, S. I.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Krasov, A. V.</au><au>Shterenberg, S. I.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark</atitle><btitle>2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</btitle><stitle>ICUMT</stitle><date>2020-10</date><risdate>2020</risdate><spage>253</spage><epage>257</epage><pages>253-257</pages><eissn>2157-023X</eissn><eisbn>1728192811</eisbn><eisbn>9781728192819</eisbn><abstract>As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.</abstract><pub>IEEE</pub><doi>10.1109/ICUMT51630.2020.9222413</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2157-023X |
ispartof | 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, p.253-257 |
issn | 2157-023X |
language | eng |
recordid | cdi_ieee_primary_9222413 |
source | IEEE Xplore All Conference Series |
subjects | Assembler Buildings Certification Center File systems Linux Operating systems Organizations Trusted computing trusted computing environment Unix Watermarking |
title | Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A03%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Methods%20for%20building%20a%20trusted%20environment%20in%20Unix%20operating%20systems%20based%20on%20the%20implementation%20of%20a%20digital%20watermark&rft.btitle=2020%2012th%20International%20Congress%20on%20Ultra%20Modern%20Telecommunications%20and%20Control%20Systems%20and%20Workshops%20(ICUMT)&rft.au=Krasov,%20A.%20V.&rft.date=2020-10&rft.spage=253&rft.epage=257&rft.pages=253-257&rft.eissn=2157-023X&rft_id=info:doi/10.1109/ICUMT51630.2020.9222413&rft.eisbn=1728192811&rft.eisbn_list=9781728192819&rft_dat=%3Cieee_CHZPO%3E9222413%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-5cc2bb8545efa2084b1fc1683c5ebdb0fa5cfd4cd559d283689ae33f6e28de693%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9222413&rfr_iscdi=true |