Providing policy control over object operations in a mach based system

作者: Spencer E. Minear

DOI:

关键词:

摘要: In both secure and safety-critical systems it is desirable to have a very clear relationship between the system's mandatory security policy its proven operational semantics. This made clearer if system architecture provides strong separation enforcement mechanisms decisions, decision software clearly identifiable in architecture. This paper describes prototype Unix based on Mach which control over all kernel-supported operations. The work modified kernel by extending limited port right. extensions allow specify not only access an object via right, but individual services supported object. implemented external Security Server software. makes possible support wide range of policies with no change or applications.

参考文章(13)
David Finkel, Robert Kinicki, Aju John, Bradford Nichols, Somesh Rao, Developing Benchmarks to Measure the Performance of the Mach Operating System. USENIX MACH Symposium. pp. 83- 100 ,(1990)
O.S. Saydjari, J.M. Beckman, J.R. Leaman, LOCK trek: navigating uncharted space ieee symposium on security and privacy. pp. 167- 175 ,(1989) , 10.1109/SECPRI.1989.36291
L. Gong, A secure identity-based capability system ieee symposium on security and privacy. ,vol. 1989, pp. 56- 63 ,(1989) , 10.1109/SECPRI.1989.36277
J. Knight, B. Littlewood, Critical task of writing dependable software IEEE Software. ,vol. 11, pp. 16- 20 ,(1994) , 10.1109/52.251196
Ellis Cohen, David Jefferson, Protection in the Hydra Operating System ACM SIGOPS Operating Systems Review. ,vol. 9, pp. 141- 160 ,(1975) , 10.1145/1067629.806532
R.S. Sandhu, Lattice-based access control models IEEE Computer. ,vol. 26, pp. 9- 19 ,(1993) , 10.1109/2.241422
Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek, Specification and verification of the UCLA Unix security kernel Communications of The ACM. ,vol. 23, pp. 118- 131 ,(1980) , 10.1145/358818.358825
R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf, Policy/mechanism separation in Hydra ACM SIGOPS Operating Systems Review. ,vol. 9, pp. 132- 140 ,(1975) , 10.1145/1067629.806531
Paul A. Karger, Andrew J. Herbert, An Augmented Capability Architecture to Support Lattice Security and Traceability of Access ieee symposium on security and privacy. pp. 2- 2 ,(1984) , 10.1109/SP.1984.10001