Protection in the Hydra Operating System

作者: Ellis Cohen , David Jefferson

DOI: 10.1145/1067629.806532

关键词: Operating system kernelLernaean HydraComputer scienceOperating systemRevocationDirectoryHardware and Architecture

摘要: This paper describes the capability based protection mechanisms provided by Hydra Operating System Kernel. These support construction of user-defined protected subsystems, including file and directory which do not therefore need to be supplied directly Hydra. In addition, we discuss a number well known problems, Mutual Suspicion, Confinement Revocation, present that supplies in order solve them.

参考文章(21)
B Lampson, J Gray, H Sturgis, B Lindsay, The Control Structure of an Operating System ,(1972)
Elliott Irving Organick, Computer system organization: The B5700/B6700 series (ACM monograph series) Academic Press, Inc.. ,(1973)
Anita Katherine Jones, Protection in programmed systems. Carnegie Mellon University. ,(1973)
Robert L Ashenhurst, Elliott I Organick, Computer system organization : the B5700/B6700 series Academic Press. ,(1973)
Leo Joseph Rotenberg, Making computers keep secrets. Massachusetts Institute of Technology. ,(1973)
D. D. Redell., David D. Redell, NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS Massachusetts Institute of Technology. ,(1974)
M. D. Schroeder, COOPERATION OF MUTUALLY SUSPICIOUS SUBSYSTEMS IN A COMPUTER UTILITY Massachusetts Institute of Technology. ,(1972)
Thomas J. Dingwall, Communication Within Structured Operating Systems Cornell University. ,(1973)
James H. Morris, Protection in programming languages Communications of the ACM. ,vol. 16, pp. 15- 21 ,(1973) , 10.1145/361932.361937