Security Features in RTOS Baget
Abstract
The methods used in implementing information security tools for the Baget real-time operating system (RTOS) are considered. The access control model is based on control of user access to commands. The methods for identifying and authenticating users are described. The user interface for executing commands, the software interface for registering user command handlers, and the RTOS configuration tools are also described.
About the Authors
N. D. BaykovRussian Federation
A. N. Godunov
Russian Federation
V. N. Rodionov
Russian Federation
References
1. А.Н. Годунов, В.А. Солдатов. Операционные системы семейства Багет (сходства, отличия и перспективы) – «Программирование», Москва, 2014, № 5, 68–76.
2. ГОСТ 34.11-2018 «Информационная технология. Криптографическая защита информации. Функция хэширования». ФГУП «СТАНДАРТИНФОРМ». Москва. 2018.
3. ГОСТ Р 34.11-2012 «Информационная технология. Криптографическая защита информации. Функция хэширования». ФГУП «СТАНДАРТИНФОРМ». Москва. 2013.
4. V.C. Hu, R. Kuhn, D. Yaga. Verification and Test Methods for Access Control Policies/Models. Special Publication (NIST SP). National Institute of Standards and Technology. 2017. https://doi.org/10.6028/NIST.SP.800-192.
Review
For citations:
Baykov N.D., Godunov A.N., Rodionov V.N. Security Features in RTOS Baget. SRISA Proceedings. 2024;14(4):5-10. (In Russ.)