Security in Plan 9

نویسندگان

  • Russ Cox
  • Eric Grosse
  • Rob Pike
  • David L. Presotto
  • Sean Quinlan
چکیده

The security architecture of the Plan 9" operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to make the system more conve­ nient to use securely. Plan 9 has thus improved in two ways not usually seen together: it has become more secure and easier to use. The central component of the new architecture is a per-user selfcontained agent called factotum. Factotum securely holds a copy of the user s keys and negotiates authentication protocols, on behalf of the user, with secure services around the network. Concentrating security code in a single program offers several advantages including: ease of update or repair to broken security software and protocols; the ability to run secure services at a lower privilege level; uniform management of keys for all services; and an opportunity to provide single sign on, even to unchanged legacy applications. Factotum has an unusual architec­ ture: it is implemented as a Plan 9 file server.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimum Farm Plan for Food Security among Smallholder Farmers in Imo State, Nigeria

The paper determined optimum farm plan for food security among smallholder farmers in Imo State, Nigeria. Data were collected with structured and validated questionnaire from 180 smallholder crops farmers in Imo State. Data were analyzed using descriptive statistics (mean, frequency distribution and percentages), budgetary analysis and linear programming model. Results show that the mean age of...

متن کامل

Optimum Farm Plan for Food Security among Smallholder Farmers in Imo State, Nigeria

The paper determined optimum farm plan for food security among smallholder farmers in Imo State, Nigeria. Data were collected with structured and validated questionnaire from 180 smallholder crops farmers in Imo State. Data were analyzed using descriptive statistics (mean, frequency distribution and percentages), budgetary analysis and linear programming model. Results show that the mean age of...

متن کامل

USENIX Association Proceedings of the 11 th USENIX Security

The security architecture of the Plan 9" operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to make the system more convenient to use securely. Plan 9 has thus improved in two ways not usually seen together: it has become more secure and easier to use. The central component of the new architecture is a per-user self-c...

متن کامل

Pension Plan Heterogeneity and Retirement Behavior∗

This paper examines the role of the shift in pension plans — from Defined Benefit to Defined Contribution — in explaining the recent increase in labor supply of older workers. A structural model of consumption, savings, Social Security, and pension plan heterogeneity is estimated using data from the Health and Retirement Study. Model simulations indicate that changes in pension plan composition...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002