The security of a major operating system is investigated, including recently announced security enhancements. Four areas of security which are generally applicable to operating system design are discussed. File system security flaws were discovered, permitting a total system penetration. These flaws are described and improvements are recommended.
The programming language POOL (Parallel Object Oriented Logic) allows computation to be represented as a collection of parallel objects which communicate via asynchronous message passing. Object procedures are Constraint Logic Programming (CLP) programs. POOL objects are mapped transparently to a network of CLP machines which execute concurrently. An… (More)
A novel desi n for a secure distributed system is described and evaluated. A capabi ity based computer architecture is combined with crypto-3. graphic network security techniques to protect global objects and preserve access rights across system boundaries. The resulting architecture is evaluated against several criteria, including the DOD Computer System… (More)