Proving Protection Systems Safe
نویسندگان
چکیده
Theories of protection powerful enough to resolve security questions of computer systems are considered. Mo single theory of protection is adequate for proving whether the security afforded by an arbitrary protection system suffices to safeguard data from unauthorized access. When theories of protection are restricted' to computer systems which are bounded in size, adequate theories exist, but they are inherently intractable. The implications of these results are discussed. i Computer Science Department, Purdue University, W. Lafayette, IN *l?907. Research sponsored by the National Science Foundation MCS75-21100. ? Department of Mathematics, Dartmouth College, Hanover, NH 03755. Research sponsored by the Office of Naval Research Contract OMR >100014-75-0-051^ •^Computer Science Department, University of California, Berkeley, CA 9'1720. Research sponsored by the National Science Foundation MCS7^-07636-A01. ''current address: Department of Computer Science, University of Washington, Seattle, Washington 93195. Research supported by an IBÎ Pre-doctoral Fellowship.
منابع مشابه
Progress toward an HIV vaccine.
The development of an HIV vaccine is proving to be an unprecedented challenge. The difficulty in creating this vaccine arises from the enormous genetic variation of the virus and the unusual importance of cytotoxic T lymphocytes (CTL) in controlling its spread. Whereas traditional vaccine strategies are unlikely to confer safe and effective HIV protection, novel strategies for eliciting CTL hav...
متن کاملImplementing Multiple Protection Domains in Java
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to objects cannot be forged. A safe language alone, however, lacks many features taken for granted in more traditional operating systems, such as rights revocation, thread protection, resource management, and support for doma...
متن کاملOperating System Support for Easy Development of Distributed File Systems
A number of new distributed file systems have been developed, but the development of such file systems is not a simple task because it requires the operating system kernel to be modified. We have therefore developed the CAPELA operating system, which makes distributed file systems easy to develop. CAPELA allows the users to develop a file system as an extension module separated from the kernel,...
متن کاملIssues about Java Operating System
Safe language technology, which can be used for protection within a single address space, is not a new idea in operating system area. As Java is becoming more and more popular, many researches use the type safety feature in Java as an alternative to hardware-based protection in systems. However, safe language alone is not sufficient to provide similar protection as that is found in traditional ...
متن کاملBeyond Address Spaces - Flexibility, Performance, Protection, and Resource Management in the Type-Safe JX Operating System
Early type-safe operating systems were hampered by poor performance. Contrary to these experiences we show that an operating system that is founded on an object-oriented, type-safe intermediate code can compete with MMUbased microkernels concerning performance while widening the realm of possibilities. Moving from hardware-based protection to softwarebased protection offers new options for oper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011