Operating System Structures to Support Security and Reliable Software

@article{Linden1976OperatingSS,
  title={Operating System Structures to Support Security and Reliable Software},
  author={Theodore A. Linden},
  journal={ACM Comput. Surv.},
  year={1976},
  volume={8},
  pages={409-445}
}
  • T. Linden
  • Published 1 December 1976
  • Computer Science
  • ACM Comput. Surv.

Security and protection of data in the IBM System/38

This paper describes the addressing mechanism, basic data organization and process structure of the System/38 and describes of security in the architecture and how it can be extended.

Operating Systems Principles for Data Flow Networks

A deep look at contemporary operating systems finds data flow principles of value to computer networks large and small.

Computer Security Bibliography

A categorized bibliography of published reports and papers on computer security is presented, highlighting the importance of knowing the sources of information on which to draw conclusions.

Protection in languages for real time programming

A protection mechanism which may be embedded in an object oriented language for real time programming permitting definition of abstract data types, is proposed in this paper.

IBM System/38 support for capability-based addressing

The IBM System/38 provides capability-based addressing and support is divided among architectural definition, microcode, and hardware to minimize overhead for this function.

Improving Intrusion Awareness with a Neural Network Classifier

To me, a personal computer should be small, reliable, convenient to use and inexpensive.

A security policy for a profile-oriented operating system

A security policy for a profile-oriented operating system is described that is adopted from state-of-the-art security properties designed to meet even the strict security requirements of the

Storage concepts in a software-reliability-directed computer architecture

This paper concentrates on the storage concepts in the architecture of a new computer architecture that will substantially enhance the reliability of the programs executing above it.

Remediation of Application-Specific Security Vulnerabilities at Runtime

Researchers at Telcordia Technologies and the State University of New York, Stony Brook, are working on an approach that gives computer users new capabilities for defending against exploitation of

Preventing Privilege Escalation

The design and analysis of the "Systrace" facility is presented which supports fine grained process confinement, intrusion detection, auditing and privilege elevation, and it is shown that Systrace is efficient and does not impose significant performance penalties.
...

References

SHOWING 1-10 OF 79 REFERENCES

Security controls in the ADEPT-50 time-sharing system

At present, the system described in this paper has not been approved by the Department of Defense for processing classified information. This paper does not represent DOD policy regarding industrial

Protection in the Hydra Operating System

This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel. These mechanisms support the construction of user-defined protected subsystems,

A Provably Secure Operating System.

This report summarizes work to date toward the development of a provable secure operating system by discussing a methodology for the design, implementation, and proof of properties of large computing systems.

Dynamic protection structures

This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated.

Structured specification of a Security Kernel

It is intended that the final level of modeling will specify the primitive commands for the kernel of a Multics-like system and will enumerate precisely those assertions which must be proved about the implementation in order to establish correctness.

NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS

A new design is proposed, which provides both type extension and revocation through the definition of generalized sealing of capabilities, and it is demonstrated that it would be workable and acceptable economically.

HYDRA: the kernel of a multiprocessor operating system

This paper describes the design philosophy of HYDRA—the kernel of an operating system for C.mmp, the Carnegie-Mellon Multi-Mini-Processor. This philosophy is realized through the introduction of a

Protection and the control of information sharing in multics

Five design principles help provide insight into the tradeoffs among different possible designs in the Multics system and several known weaknesses in the current protection mechanism design are discussed.

Protection systems and protection implementations

  • R. Needham
  • Computer Science
    AFIPS '72 (Fall, part I)
  • 1972
The paper outlines a system which is being developed to the point of hardware implementation in the Computer Laboratory, Cambridge, and outlines the potentialities and limitations of a variety of approaches to protection systems.

Verifiable secure operating system software

While the desire for reliable security in multiuser computer systems has grown significantly, the computing community's knowledge of how to provide the requisite protection is still inadequate.
...