摘要: Hogan in her recent paper presented the requirements and characteristics of operating systems to realize principle complete mediation She states requires that every access object be checked for authority This implies a secure system must utilize foolproof method identifying source request Wells argues later s discussion does not apply contemporary capability based technology statement is true such used KeyKOS as an example In our opinion argument holds at most one special type which we refer fully armed fact can argue utilization mechanism implicitly embedded throughout design mixed with other issues would naturally more di cult Moreover it hard convinced architecture like suitable support open policy A simple question who will maintain those discernible external communications run across geographical organizational boundaries And do trust them The aim this note supply picture security