Penetrating an operating system: a study of VM/370 integrity

作者: C. Richard Attanasio , Peter W. Markstein , Ray J. Phillips , None

DOI: 10.1147/SJ.151.0102

关键词:

摘要: Discussed is a methodology for discovering operating system design flaws as an approach to learning techniques that may make possible greater data security. Input/output has been found be involved in most of the weaknesses discovered by study team particular version system. Relative simplicity was source greatest protection against penetration efforts.

参考文章(7)
Anita Katherine Jones, Protection in programmed systems. Carnegie Mellon University. ,(1973)
Stuart E. Madnick, John J. Donovan, An approach to information system isolation and security in a shared facility Research Papers in Economics. ,(1973)
R. P. Parmelee, T. I. Peterson, C. C. Tillman, D. J. Hatfield, Virtual storage and virtual machine concepts IBM Systems Journal. ,vol. 11, pp. 99- 130 ,(1972) , 10.1147/SJ.112.0099
Gerald J. Popek, Charles S. Kline, Verifiable secure operating system software Proceedings of the May 6-10, 1974, national computer conference and exposition on - AFIPS '74. pp. 145- 151 ,(1974) , 10.1145/1500175.1500204
W. S. McPhee, Operating system integrity in OS/VS2 IBM Systems Journal. ,vol. 13, pp. 230- 252 ,(1974) , 10.1147/SJ.133.0230
M. McGrath, Virtual machine computing in an engineering environment IBM Systems Journal. ,vol. 11, pp. 131- 149 ,(1972) , 10.1147/SJ.112.0131
Richard L. Bisbey, Gerald J. Popek, Encapsulation Proceedings of the 1974 annual conference on XX - ACM '74. pp. 666- 675 ,(1974) , 10.1145/1408800.1408877