Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences 1992
DOI: 10.1109/hicss.1992.183229
|View full text |Cite
|
Sign up to set email alerts
|

Persistent protected modules and persistent processes as the basis for a more secure operating system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

1992
1992
2008
2008

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…This can be achieved as: Given these definitions, the following code will take an unrestricted capability for the 'top secret'-level directory and create a capability suitable for use by lower-level principals: The beauty of this solution, in contrast to previous capability-based implementations of the Bell-LaPadula model such as [20], is that the text and directory objects themselves contain no special code for enforcing the access constraints. Indeed they could equally well be used in a system with quite a different security policy.…”
Section: Interface Lowerlevelview { Void Addfile(string Name Capabilmentioning
confidence: 99%
“…This can be achieved as: Given these definitions, the following code will take an unrestricted capability for the 'top secret'-level directory and create a capability suitable for use by lower-level principals: The beauty of this solution, in contrast to previous capability-based implementations of the Bell-LaPadula model such as [20], is that the text and directory objects themselves contain no special code for enforcing the access constraints. Indeed they could equally well be used in a system with quite a different security policy.…”
Section: Interface Lowerlevelview { Void Addfile(string Name Capabilmentioning
confidence: 99%
“…One of the most important considerations in the design of an operating system is the model of interaction between these entities. Grasshopper uses the object-thread model, in which communication is achieved via a mechanism similar to procedure calls, in which threads (loci) move between entities [15]. Thus, a locus may invoke a container, thereby changing its host container, and may later return to its original container.…”
Section: Containersmentioning
confidence: 99%
“…The parameters of the method (here method m of object x) are evaluated in the creating thread and are made available as values, references 6 and/or capabilities to the new thread. If the method is defined to return a result, this is discarded, i.e.…”
Section: Creating Threadsmentioning
confidence: 99%