Filters








767 Hits in 3.1 sec

Protection and the control of information sharing in multics

Jerome H. Saltzer
1974 Communications of the ACM  
The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs.  ...  The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection.  ...  The Multics system, I a prototype computer utility, serves as a case study of protection mechanisms which can permit controlled sharing of information in an on-line, generalpurpose, information-storing  ... 
doi:10.1145/361011.361067 fatcat:asimarwprjcodaojrgnwokvgka

Protection and control of information sharing in multics

Jerome H. Saltzer
1973 Proceedings of the fourth symposium on Operating system principles - SOSP '73  
The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs.  ...  The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection.  ...  The Multics system, I a prototype computer utility, serves as a case study of protection mechanisms which can permit controlled sharing of information in an on-line, generalpurpose, information-storing  ... 
doi:10.1145/800009.808059 dblp:conf/sosp/Saltzer73 fatcat:qoqh5xlorbbn5iuotnhbbws45y

Protection and control of information sharing in multics

Jerome H. Saltzer
1973 ACM SIGOPS Operating Systems Review  
The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs.  ...  The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection.  ...  The Multics system, I a prototype computer utility, serves as a case study of protection mechanisms which can permit controlled sharing of information in an on-line, generalpurpose, information-storing  ... 
doi:10.1145/957195.808059 fatcat:d7kvyxmawrd2papqfhcp3fsi5i

Engineering a security kernel for Multics

Michael D. Schroeder
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
to make verification of correctness by auditing possible, and to demonstrate by test'implementation that the security kernel so developed is capable of supporting the functionality of Multics completely  ...  The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access, to simplify the structure of that minimum mechanism  ...  Acknowledgements In describing a group project of the Computer Systems Research Division of Project MAC at M.I.T., this paper discusses the work of several faculty members, graduate students, and staff  ... 
doi:10.1145/800213.806518 dblp:conf/sosp/Schroeder75 fatcat:nbceukdiarhnxkojlzk5v2hcqm

Engineering a security kernel for Multics

Michael D. Schroeder
1975 ACM SIGOPS Operating Systems Review  
to make verification of correctness by auditing possible, and to demonstrate by test'implementation that the security kernel so developed is capable of supporting the functionality of Multics completely  ...  The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access, to simplify the structure of that minimum mechanism  ...  Acknowledgements In describing a group project of the Computer Systems Research Division of Project MAC at M.I.T., this paper discusses the work of several faculty members, graduate students, and staff  ... 
doi:10.1145/1067629.806518 fatcat:l7rwu3onirf75h7flcjhglppku

Multics

F. J. Corbató, J. H. Saltzer, C. T. Clingen
1971 Proceedings of the November 16-18, 1971, fall joint computer conference on - AFIPS '71 (Fall)  
An internal file system so reliable that users trust their only copy of programs and data to be stored in it; 5. Sufficient control of access to allow selective sharing of information; 6.  ...  confidence place appropriate control on the release of their private information.  ...  Further information on most of these features may be found in the Multics Programmers' Manuals [35] .  ... 
doi:10.1145/1478873.1478950 dblp:conf/afips/CorbatoSC72 fatcat:ikcj7p54wzcotfjsdg2cwc37wi

The Multics virtual memory: concepts and design

A. Bensoussan, C. T. Clingen, R. C. Daley
1972 Communications of the ACM  
Here, the design and implementation considerations of segmentation and sharing in Multics are first discussed under the assumption that all information resides in a large, segmented main memory.  ...  Usually, sharing is accomplished by allowing several users to share data via input and output of information stored in files kept in secondary storage.  ...  This paper would be incomplete without acknowledgment of the people who worked so hard to build the virtual memory supervisor portion of Multics. Special mention goes to G.  ... 
doi:10.1145/355602.361306 fatcat:co3dcbj6zng4jclkv6k2wh53ye

Reliability in Computer Systems [chapter]

1999 Design Reliability  
The initial MAC computer system became operational in November 1963. It was a copy of the Compatible Time Sharing System [1], based on a modified IBM 7094 computer, which had been developed in the M.  ...  The latter, which had to provide more traditional batch-processing service to the M.I.T. community, could be operated in a time-sharing mode only part of the time.  ...  Protection of Data and Procedures. Multics permitted controlled sharing of segments without duplication of the object shared.  ... 
doi:10.1201/9781420050141.ch12 fatcat:z6ijr2725fh3rmpv7et2gqs2z4

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
Christoph Schuba has studied mathematics and management information systems at the University of Heidelberg and the University of Mannheim in Germany.  ...  He is currently the architect for Solaris Trusted Extensions, and was one of the architects for Trusted Solaris and Role-Based Access Control.  ...  the protection state and (2) the set of directed edges E consists of each read and write information flow in the protection state.  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

Measurements of sharing in Multics

Warren A. Montgomery
1977 ACM SIGOPS Operating Systems Review  
Multics system in order to obtain estimates of the values of these parameters for that system.  ...  These estimates are upper bounds on the amount of sharing and show that although Multics was designed to provide active sharing among its users, very little sharing actually takes place.  ...  Svobodova, and the reviewers, whose comments have contributed to the more concise and effective presentation of the data and discussion of technical details.  ... 
doi:10.1145/1067625.806549 fatcat:47f5z25ovzd5vbqwkvvbgonrdm

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1972 ACM SIGOPS Operating Systems Review  
Protection of computations and information is an important aspect of a computer utility.  ...  The mechanisms of passing and referencing arguments are the same in both cases as well.  ...  The concepts embodied in the  ... 
doi:10.1145/850614.850623 fatcat:4vaqzthtovclthsejye3hieogi

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1972 Communications of the ACM  
Protection of computations and information is an important aspect of a computer utility.  ...  The mechanisms of passing and referencing arguments are the same in both cases as well.  ...  The concepts embodied in the  ... 
doi:10.1145/361268.361275 fatcat:ypbh6cdizjddzdwufqwnkf32ey

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1971 Proceedings of the third symposium on Operating systems principles - SOSP '71  
Protection of computations and information is an important aspect of a computer utility.  ...  The mechanisms of passing and referencing arguments are the same in both cases as well.  ...  Access Control in a Computer Utility Protection of computations and information is an important aspect of a computer utility.  ... 
doi:10.1145/800212.806498 dblp:conf/sosp/SchroederS71 fatcat:f3fxqui7bvbvhm7u7ve2rdcgaq

The Multics kernel design project

Michael D. Schroeder, David D. Clark, Jerome H. Saltzer
1977 Proceedings of the sixth symposium on Operating systems principles - SOSP '77  
We describe a plan to create an auditable version of Multics. The engineering experiments of that plan are now complete.  ...  Type extension as a design discipline has been demonstrated feasible, even for the internal workings of an operating system, where many subtle intermodule dependencies were discovered and controlled.  ...  Introduction In 1974, a project was begun to apply the emerging ideas of security kernel technology, information flow control, and verification of correctness to a full function operating system, Multics  ... 
doi:10.1145/800214.806546 dblp:conf/sosp/SchroederCS77 fatcat:2dwq3y5vqfgavlw3qxdnegbspi

The Multics kernel design project

Michael D. Schroeder, David D. Clark, Jerome H. Saltzer
1977 ACM SIGOPS Operating Systems Review  
We describe a plan to create an auditable version of Multics. The engineering experiments of that plan are now complete.  ...  Type extension as a design discipline has been demonstrated feasible, even for the internal workings of an operating system, where many subtle intermodule dependencies were discovered and controlled.  ...  Introduction In 1974, a project was begun to apply the emerging ideas of security kernel technology, information flow control, and verification of correctness to a full function operating system, Multics  ... 
doi:10.1145/1067625.806546 fatcat:fjiklkpy2vf5fgebsfortvk7te
« Previous Showing results 1 — 15 out of 767 results