A Family of Securable Protection Systems

نویسندگان

  • Jonathan S. Shapiro
  • Sam Weber
چکیده

This paper describes Metagap e, a formally speciied family of capability systems capable of restricting the transfer of both information and access rights. Previous work indicates that the identiication of such architectures is diicult, and in most cases their veriication is undecidable. To the best of our knowledge, Metagap e spans all real capability systems known to support the connnement property, and excludes all known systems that do not. One test of eeectiveness for a protection system is its ability to enforce the connnement property, which requires that information be contained within well-speciied boundaries. This paper demonstrates a proof of correctness of Metagap e with respect to connnement. We show that the model enforces the connnement requirements if a small number of initial static checks on the connned subsystem are satissed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography

With fast growing network, many people utilize the internet to transfer digital image information. The need of the time is to implement an extremely securable, economic and perfect system of image encryption that can be well protected from unauthorized access. Also, the bulk size of the image data produces many problems in their transmission via internet. So, in this paper, a very new and combi...

متن کامل

Modeling the Trust Boundaries Created by Securable Objects

Matt Miller presented his work on automatically discovering data flows between trust boundaries in the Microsoft Windows operating systems. Trust boundaries are divisions between privilege levels on a system (e.g., different user accounts or user versus administrator privileges). Discovering paths of data flow between privilege levels allows software auditors to audit only those sections of cod...

متن کامل

Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection

Appropriate operation of protection system is one of the effective factors to have a desirable reliability in power systems, which vitally needs routine test of protection system. Precise determination of optimum routine test time interval (ORTTI) plays a vital role in predicting the maintenance costs of protection system. In the most previous studies, ORTTI has been determined while remote bac...

متن کامل

DC Microgrid Protection in the Presence of the Photovoltaic and Energy Storage Systems

In recent years, most of the loads and distributed generations are connected to the AC grid through the power electronic converters. Using the DC grid beside the AC grid can reduce the conversion stages and power losses. Protection of the DC grids is a challenging issue because of the new structures of DC grids and fast transients of the DC faults. This paper studies the protection of the low v...

متن کامل

Applications for multilevel secure operating systems

Specification of a Muitics Security Kernel," ESD-TR-77-259. Vols. I-III, The MITRE Corporation, Bedford, Massachusetts. 12. Ames. S. R., J. K. Millen. "Interface Verification for A Security Ker-nel," INFOTECH State of the Art Report: System Reliability and Integrity. Vol. 2, INFOTECH International, pp. 1-22. 13. Popek, G. J., et al.. "UCLA Data Secure UNIX-A Securable OperatingSystem: S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998