Method and system for providing a user access to multiple secured subsystems

作者: Ivan M. Milman , John H. Wilson , L. Brooks Hickerson , Douglas B. Scheer , Robert S. Gittins

DOI:

关键词:

摘要: An improvement relating to the security of an operating system for either a stand alone computer or networked system. The provides improved programs available on having different protocols. unifies these protocols each user based unique credentials. operates, upon request start program procedure by user, authenticate identity information that user. Following which, generates handle associated with then notifies new credentials These are and is mapped user's procedure. Once this accomplished, invokes alternate process tags handle. from access object accessed through server requested, grants typically association identifier, handle, before.

参考文章(27)
Richard G. Bratt, Walter A. Wallach, John K. Ahlstrom, Edward S. Gavrin, Michael S. Richmond, David H. Bernstein, Gerald F. Clancy, Stephen I. Schleimer, Craig J. Mundie, Steven J. Wallach, Ronald H. Gruner, Digital computer system incorporating object-based addressing and access control and tables defining derivation of addresses of data from operands in instructions ,(1986)
David K. Clark, William J. Johnson, Larry M. Lachman, David Flores, Local area network peripheral lock method and system ,(1993)
Larry K. Loucks, Anthony D. Hooten, Keith E. Duvall, Method to share copy on write segment for mapped files ,(1986)
Richard G. Bratt, Ronald H. Gruner, Edward S. Gavrin, Gerald F. Clancy, Stephen I. Schleimer, Craig J. Mundie, Steven J. Wallach, Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information ,(1984)
Richard G. Bratt, Walter A. Wallach, Richard A. Belgard, John K. Ahlstrom, Edward S. Gavrin, Thomas M. Jones, Douglas M. Wells, Michael S. Richmond, David H. Bernstein, Gerald F. Clancy, Lawrence H. Katz, Stephen I. Schleimer, Craig J. Mundie, Steven J. Wallach, Brett L. Bachman, Ronald H. Gruner, Data processing system using object-based information and a protection scheme for determining access rights to such information and using multilevel microcode techniques ,(1981)