Operating System Protection Domains, a New Approach
نویسنده
چکیده
Secure computing has been an issue of high concern since the beginning of shared computers. As computers became more prevalent, so did resources shared between different users of computer systems, and naturally, users came to want to limit the access of other users to their own resources. To this end, many access control mechanisms have been devised whose general purpose are to allow access to system resources only to authorized entities. Though these methods have served us well for decades, their evolution has been overall slow.
منابع مشابه
Simple Memory Protection for Embedded Operating System Kernels
This work describes the design and implementation of memory protection in the Roadrunner operating system. The design is portable between various CPUs that provide page-level protection using Memory-Management Unit (MMU) hardware. The approach overlays protection domains on regions of physical memory that are in use by application processes and the operating system kernel. An analysis of code s...
متن کاملA New Approach for Determination of Break Points for Protection Co-Ordination
Interconnected power system networks are multi loop structured. Settings determination of all over current and distance relays in such networks can be in different forms and complicated. The main problem is the determination of starting points i.e. the location of starting relays in the procedure for settings, which is referred to as break points. In this paper, a new approach based on graph th...
متن کاملThe structure of a type safe operating system
The architecture of traditional operating systems relies on address-based memory protection. To achieve flexibility at a low cost operating system research has recently started to explore alternative protection mechanisms, such as type safety. This dissertation presents an operating system architecture that completely replaces address-based protection with type-based protection. Replacing such ...
متن کاملUSENIX Association Proceedings of the 9 th USENIX Security Symposium
The JavaTM Virtual Machine is viewed by many as inherently insecure despite all the efforts to improve its security. In this paper we take a different approach to Java security and describe the design and implementation of a system that provides operating system style protection for Java code. We use hardware protection domains to separate Java classes, provide access control on cross domain me...
متن کاملThe Role of IPC in the Component-Based Operating System JX
In currently used operating systems hardware support is used to ensure the memory protection. The communication between protection domains is obviously slower than simple method invocations. Robust component-based services need a flexible system design and fast communication mechanism between different units of protection. We describe the Java operating system JX that uses the type safety of th...
متن کامل