Filters








27 Hits in 4.3 sec

Policy/mechanism separation in Hydra

R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf
1975 ACM SIGOPS Operating Systems Review  
In Hydra the determination to separate mechanism and policy is established as a basic design principle and is implemented by the construction of a kernel composed (almost) entirely of mechanisms.  ...  The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of flexibility present in an operating system.  ...  The remaining sections of this paper discuss three important examples of policy/mechanism separation in Hydra.  ... 
doi:10.1145/1067629.806531 fatcat:hsykrubq6vgi3eqju3og6ao5de

Policy/mechanism separation in Hydra

R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
In Hydra the determination to separate mechanism and policy is established as a basic design principle and is implemented by the construction of a kernel composed (almost) entirely of mechanisms.  ...  The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of flexibility present in an operating system.  ...  The remaining sections of this paper discuss three important examples of policy/mechanism separation in Hydra.  ... 
doi:10.1145/800213.806531 dblp:conf/sosp/LevinCCPW75 fatcat:tzouficfd5g6zau6zdvuhzhm6e

Overview of the Hydra Operating System development

W. Wulf, R. Levin, C. Pierson
1975 ACM SIGOPS Operating Systems Review  
An overview of the hardware and philosophic context in which the Hydra design was done is discussed.  ...  We refer to this negative criterion as the principle of "policy/mechanism separation'; Brinch Hansen [Bri70] has made cogent arguments for this separation.  ...  two are copied from the earlier discussion for completeness): -protection -policy/mechanism separation creation of new kinds of virtual resources (new types) -specification of the representation of, and  ... 
doi:10.1145/1067629.806530 fatcat:ix63ho7oevfyhir55ebwwmqcqu

Protection in the Hydra Operating System

Ellis Cohen, David Jefferson
1975 ACM SIGOPS Operating Systems Review  
In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.  ...  This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel.  ...  In [Lev75], we discuss in some detail a central philosophy of Hydra, that of Policy/Mechanism separation.  ... 
doi:10.1145/1067629.806532 fatcat:4kdnynmnozcgrgvlm7wecgl6sa

Protection in the Hydra Operating System

Ellis Cohen, David Jefferson
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.  ...  This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel.  ...  In [Lev75], we discuss in some detail a central philosophy of Hydra, that of Policy/Mechanism separation.  ... 
doi:10.1145/800213.806532 dblp:conf/sosp/CohenJ75 fatcat:fdyicwflgzhytbct5quximkimq

Perspectives on protection and security

Butler Lampson
2015 SOSP History Day 2015 on - SOSP '15  
Correctness Policy/mechanisms vs. Assurance Access control vs.  ...  the manual  Today in seL4, Ironclad, … First tried in Gypsy (late 1970s)  What if the spec is wrong?  ...  In the real world, good security is a bank vault ▬ Hardly any computer systems have anything like this ▬ We only know how to make simple things secure  Access control doesn't work-40 years of experience  ... 
doi:10.1145/2830903.2830905 dblp:conf/sosp/Lampson15 fatcat:f3a7fr6wxrgcbpnuik4dwkxyqm

A compliant persistent architecture

Ron Morrison, Dharini Balasubramaniam, Mark Greenwood, Graham Kirby, Ken Mayes, Dave Munro, Brian Warboys
2000 Software, Practice & Experience  
By separating policy from mechanism in all components, the architecture may be tailored to the policy needs of the application. ‡ ‡ We first propose a generic architecture for compliance, and then show  ...  We postulate, since we have not yet measured, that the benefits of compliant architectures will be a reduction in complexity, with corresponding gains in flexibility, portability, understandability in  ...  The layers in Flask constitute a clear instantiation of the policy/mechanism separation.  ... 
doi:10.1002/(sici)1097-024x(20000410)30:4<363::aid-spe303>3.0.co;2-p fatcat:5v7upmneozfvtf2mugcmh3dl2a

A compliant persistent architecture

Ron Morrison, Dharini Balasubramaniam, Mark Greenwood, Graham Kirby, Ken Mayes, Dave Munro, Brian Warboys
2000 Software, Practice & Experience  
By separating policy from mechanism in all components, the architecture may be tailored to the policy needs of the application. ‡ ‡ We first propose a generic architecture for compliance, and then show  ...  We postulate, since we have not yet measured, that the benefits of compliant architectures will be a reduction in complexity, with corresponding gains in flexibility, portability, understandability in  ...  The layers in Flask constitute a clear instantiation of the policy/mechanism separation.  ... 
doi:10.1002/(sici)1097-024x(20000410)30:4<363::aid-spe303>3.3.co;2-g fatcat:ep3fafdaifh7liobb5jcf4wjem

Towards Secure Information Sharing models for community Cyber Security

Ravi Sandhu, Ram Krishnan, Gregory B. White
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security.  ...  We believe that similar models will be applicable in numerous other domains.  ...  The premise of sharply separating P-and E-layers builds on the much practised policy/mechanism separation principle first articulated in HYDRA [15] .  ... 
doi:10.4108/icst.collaboratecom.2010.3 dblp:conf/colcom/SandhuKW10 fatcat:aqfi7fnct5etvlyn4c3zxvsxlm

A policy based approach for automated topology management of peer to peer networks and a prototype implementation

A. Di Ferdinando, P. Mckee, A. Amoroso
Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks  
In order to better test our approach we developed and tested a working prototype of the system, also described in this paper.  ...  In this paper we will explain how our approach works and the benefits rising from its use.  ...  NeToC in action A new Hydra node can join an existing network or create a new network; in both the cases the aggregating process is automatically managed by the policy mechanism.  ... 
doi:10.1109/policy.2003.1206978 dblp:conf/policy/FerdinandoMA03 fatcat:vobzv77wh5bpvp52gcxdiljhte

Security In Keykos™

S.A. Rajunas, N. Hardy, A.C. Bomberger, W.S. Frantz, C.R. Landau
1986 1986 IEEE Symposium on Security and Privacy  
This is accomplished not by relying on tagged memory but rather by storing capabilities separate from data.  ...  Violating this principle by introducing centralized checking degrades performance and confuses the conceptual claflty of the policy/mechanism dichotomy.  ...  Finally, migration is a non-problem in KeyKOS. Keys and data reside in separate spaces; there is no intermingling.  ... 
doi:10.1109/sp.1986.10000 dblp:conf/sp/RajunasHBFL86 fatcat:o7pxtjqs7zho5mpvgbmto2frxi

HYDRA -- the kernel of a multiprocessor operating system

William Allan. Wulf
2018
The remaining ideas and the cement which holds the design together emerged in discussion between the authors. THE HYDRA KERNEL  ...  Rather than detail the various policy/mechanism issues, which are the subject of another report [Wu73] , we shall simply illustrate the nature of these issues with a single example; that of scheduling  ...  While the goal of separating mechanism and policy is a laudable one, it is impossible to achieve a complete separation in practice.  ... 
doi:10.1184/r1/6606224.v1 fatcat:nata45rh55ahnbmlph4inrk4ha

Group-Centric Models for Secure and Agile Information Sharing [chapter]

Ravi Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough
2010 Lecture Notes in Computer Science  
In particular specifying information sharing patterns beyond those supported by currently defined authorization attributes is cumbersome or infeasible.  ...  In this paper we review g-SIS models, discuss their relationship with traditional access control models and demonstrate their agility relative to these.  ...  The premise of sharply separating P-and E-layers builds on the much practised policy/mechanism separation principle first articulated in HYDRA [26] .  ... 
doi:10.1007/978-3-642-14706-7_5 fatcat:uxsoawyslfemjp3tw34xbpa5wa

Virtualization

Andrew Herbert
2015 SOSP History Day 2015 on - SOSP '15  
machine monitor allowed different processes organize their own virtual memory management system -an early example of the principle of policy/mechanism separation.  ...  Jefferson, "Protection in the HYDRA operating system", Proc. Fifth ACM Symposium on Operating Systems Principles, published in ACM Operating Systems Review, 9, 5, Nov. 1975, pp. 141-160) .  ... 
doi:10.1145/2830903.2830909 dblp:conf/sosp/Herbert15 fatcat:mposov6rcjchvbagkz7476zppu

Ocean energy development in Europe: Current status and future perspectives

Davide Magagna, Andreas Uihlein
2015 International Journal of Marine Energy  
A number of policy initiatives and mechanisms have been put in place to ensure that ocean energy technologies could become cost-competitive in the short term, in order to exploit the benefits that these  ...  Ocean energy has the potential to play a significant role in the future energy system, whilst contributing to the reduction of carbon emissions and stimulating economic growth in coastal and remote areas  ...  The harmonisation of policy mechanisms and consenting process at MS level is expected to help the sector overcoming administrative and environmental issues; while the shift towards an integrated European  ... 
doi:10.1016/j.ijome.2015.05.001 fatcat:da2e7syh4jgcfm246ootbf567i
« Previous Showing results 1 — 15 out of 27 results