eCommons

 

Partitions and Principles for Secure Operating Systems

dc.contributor.authorAndrews, Gregory R.en_US
dc.date.accessioned2007-04-23T17:37:55Z
dc.date.available2007-04-23T17:37:55Z
dc.date.issued1975-02en_US
dc.description.abstractAs part of the general goal of providing secure computer systems, the design of verifiably secure operating systems is one of the most important tasks. This paper addresses the problem by defining security in terms of a model and proposing a set of principles which we feel should be satisfied in a secure operating system. Informally, an operating system is secure if its users completely control the use of all information which they introduce. Four key partitions are identified: user interface functions, user invoked services, background services, and the security kernel. Principles are then defined to insure that interface functions provide a safe initial environment for executing user programs, user called services are confined, background services have no access to user information, and the security kernel adequately protects information storage.en_US
dc.format.extent847470 bytes
dc.format.extent247264 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR75-228en_US
dc.identifier.urihttps://hdl.handle.net/1813/6829
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titlePartitions and Principles for Secure Operating Systemsen_US
dc.typetechnical reporten_US

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
75-228.pdf
Size:
827.61 KB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
75-228.ps
Size:
241.47 KB
Format:
Postscript Files