Filters








5,056 Hits in 2.2 sec

Protection in the Hydra Operating System

Ellis Cohen, David Jefferson
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel.  ...  In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.  ...  Introduction Hydra was designed with the philosophy that protection must be an integral part of any general purpose operating system.  ... 
doi:10.1145/800213.806532 dblp:conf/sosp/CohenJ75 fatcat:fdyicwflgzhytbct5quximkimq

Protection in the Hydra Operating System

Ellis Cohen, David Jefferson
1975 ACM SIGOPS Operating Systems Review  
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel.  ...  In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.  ...  Introduction Hydra was designed with the philosophy that protection must be an integral part of any general purpose operating system.  ... 
doi:10.1145/1067629.806532 fatcat:4kdnynmnozcgrgvlm7wecgl6sa

Page 83 of Behavior Research Methods Vol. 7, Issue 2 [page]

1975 Behavior Research Methods  
The style and amount of protection in a multi-mini operating system depends greatly on which strategy is chosen for exploiting the multi-mini.  ...  In these systems, protection is associated with the data and not with the processes accessing the data.  ... 

HYDRA: the kernel of a multiprocessor operating system

W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, F. Pollack
1974 Communications of the ACM  
This paper describes the design philosophy of HYDRA --the kernel of an operating system for C.mmp, the Carnegie-Mellon Multi-Mini-Processor.  ...  The mechanisms provide a coherent basis for extension of the system in two directions: the introduction of new facilities, and the creation of highly secure systems.  ...  The remaining ideas and the cement which holds the design together emerged in discussion between the authors.  ... 
doi:10.1145/355616.364017 fatcat:7cvatnfbqre2jdhe7sgkhqaysa

Overview of the Hydra Operating System development

W. Wulf, R. Levin, C. Pierson
1975 ACM SIGOPS Operating Systems Review  
An overview of the hardware and philosophic context in which the Hydra design was done is discussed.  ...  The construction methodology is discussed together with some data which suggests the success of this methodological approach.  ...  With this exception, however, we see that a uniform requirement of all "operating systems" is that they provide protection, in our case, since operating systems are themselves user programs, the only candidate  ... 
doi:10.1145/1067629.806530 fatcat:ix63ho7oevfyhir55ebwwmqcqu

Some issues in programming multi-mini-processors

A. Newell, G. Robertson
1975 Behavior Research Methods  
Two such systems are described, and seven issues encountered in the programming of such systems are discussed. MULTIPROCESSORS computers. some of them will seem quite foreign.  ...  Large computer systems, called multi-mini-processors, can be constructed by joining together many minicomputers.  ...  HYDRA: The C.mmp operating system. Let us now return to describe the operating system, which has been designed in part with the strategic choice of making multiple application systems possible.  ... 
doi:10.3758/bf03201301 fatcat:cg3l7ihlvrdfnotli4gqcawwhe

A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware [chapter]

Weishan Zhang, Julian Schütte, Mads Ingstrup, Klaus M. Hansen
2009 Lecture Notes in Computer Science  
This approach has been realized as a prototype for self-protection in the Hydra middleware, and is integrated with a framework for enforcing the computed solution at run time using security obligations  ...  With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users.  ...  The research reported in this paper has been supported by the Hydra EU project (IST-2005-034891).  ... 
doi:10.1007/978-3-642-10383-4_29 fatcat:2lzfrlgwlnakzp6bkp5z2zc6zi

An Object-Oriented Command Language

R. Snodgrass
1983 IEEE Transactions on Software Engineering  
This paper describes Cola, an object-oriented command language for Hydra; Hydra is a capability-based operating system that runs on C.mmp, a tightly coupled multiprocessor.  ...  Cola is based on Smalltalk in that it uses message-passing as a control structure to allow syntactic freedom in the expression of commands to the system.  ...  A system call embedded in a program can cause Hydra to perform an operation on an object referred to by capability mentioned in the system call.  ... 
doi:10.1109/tse.1983.236163 fatcat:oqgby2swbnbjblbs4lnmho4eji

HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel) [article]

Karim ElDefrawy, Norrathep Rattanavipanon, Gene Tsudik
2017 arXiv   pre-print
RA can be used to establish a static or dynamic root of trust in embedded and cyber-physical systems.  ...  Building upon a formally verified software component increases confidence in security of the overall design of HYDRA and its implementation.  ...  We then describe the sequence of operations in HYDRA.  ... 
arXiv:1703.02688v2 fatcat:wuggtxvwbvfghbgentun6hr2di

Aging and Potential for Self-Renewal: Hydra Living in the Age of Aging - A Mini-Review

Ralf Schaible, Meir Sussman, Boris H. Kramer
2014 Gerontology  
In addition, we discuss the causes of aging in other Hydra species.  ...  We further highlight cellular processes for stem cell maintenance, such as the telomere dynamic, which prevent the accumulation of damage and protect against diseases and pathogens that mediate this condition  ...  However, the distribution of mortality patterns across the tree of life is highly diverse and appears to be random, as closely related species, such as different Hydra strains, may fall into distinct categories  ... 
doi:10.1159/000360397 pmid:25012456 fatcat:gmyjvmsmlnbhxa3qyfomfukr5u

Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device

Ziru Peng, Xiangyang Luo, Fan Zhao, Qingfeng Cheng, Fenlin Liu
2018 Wireless Communications and Mobile Computing  
In order to attract attention to the malicious use of large-scale operation of applications, Hydra-Bite, an Android device privacy leak path implemented by splitting traditional malicious application and  ...  The experimental results show that Hydra-Bite could resist the detecting and killing of about 60 security engines such as Kaspersky, McAfee, and Qihoo-360 in VirusTotal platform and capture the privacy  ...  Acknowledgments The work presented in this paper is supported by the National Natural Science Foundation of China (nos.  ... 
doi:10.1155/2018/2769417 fatcat:uhzwpkqunbgqvlomkpjshffv4m

In support of domain structure for operating systems

Douglas Cook
1979 Proceedings of the seventh symposium on Operating systems principles - SOSP '79  
One approach advocated in the search for better designed and more reliable operating systems is to base the design on the use of small protection domains.  ...  This paper presents empirical evidence to show that, with a suitable architecture, the overheads associated with using small protection domains do not make this an impractical approach.  ...  In the CAL system [6, 7] and in Hydra 18] protection domain switching is implemented entirely in software and consequently the overheads incurred by switching domains are high.  ... 
doi:10.1145/800215.806580 dblp:conf/sosp/Cook79 fatcat:eitzk36rkbawbecnui2evrjq6u

An implementation of a multiprocessing computer system

William B. Ackerman, William W. Plummer
1967 Proceedings of the ACM symposium on Operating System Principles - SOSP '67  
Protection in the Hydra Operating Sys- tem. In Proceedings of the 5th Symposium on Operating Systems Principles, pages 141-160. November 1975. [Cohen 761 E. Cohen, W. Corwin, D. Jefferson, T.  ...  A Data Model Based on the Capability Protection Mechanism. In Proceedings of the International Workshop on Protection in Operating Systems. August 1974. G. W. Cox, W. M. Corwin, K. K. Lai, and F. J.  ... 
doi:10.1145/800001.811666 fatcat:klpvy7r2tbh35a6u7lom4tf6yi

Policy/mechanism separation in Hydra

R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf
1975 ACM SIGOPS Operating Systems Review  
The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of flexibility present in an operating system.  ...  In Hydra the determination to separate mechanism and policy is established as a basic design principle and is implemented by the construction of a kernel composed (almost) entirely of mechanisms.  ...  Introduction An important goal of the Hydra system is to enable the construction of operating system facilities as .normal user programs [WLP75] .  ... 
doi:10.1145/1067629.806531 fatcat:hsykrubq6vgi3eqju3og6ao5de

Policy/mechanism separation in Hydra

R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of flexibility present in an operating system.  ...  In Hydra the determination to separate mechanism and policy is established as a basic design principle and is implemented by the construction of a kernel composed (almost) entirely of mechanisms.  ...  Introduction An important goal of the Hydra system is to enable the construction of operating system facilities as .normal user programs [WLP75] .  ... 
doi:10.1145/800213.806531 dblp:conf/sosp/LevinCCPW75 fatcat:tzouficfd5g6zau6zdvuhzhm6e
« Previous Showing results 1 — 15 out of 5,056 results