Applications for multilevel secure operating systems
نویسنده
چکیده
Specification of a Muitics Security Kernel," ESD-TR-77-259. Vols. I-III, The MITRE Corporation, Bedford, Massachusetts. 12. Ames. S. R., J. K. Millen. "Interface Verification for A Security Ker-nel," INFOTECH State of the Art Report: System Reliability and Integrity. Vol. 2, INFOTECH International, pp. 1-22. 13. Popek, G. J., et al.. "UCLA Data Secure UNIX-A Securable OperatingSystem: Software Architecture," SDPS-78-003, Uni~ersity of California, Los Angeles, California, August 1978.14. Woodward, J. P. L., and G. H. Nibaldi, "A Kernel-Based Secure UNIX Design," MTR-3499, The MITRE Corporation. Bedford. Massachusetts. November 1977.15. McCauley, E. J., et aI., "KSOS: Design ofa Secure Operating System:' Ford Aerospace and Communications Corporation, Palo Alto, California. 16. Berson, T. A., et aI., "KSOS: Development Methodology For a Secure Operating System," Ford Aerospace and Communications Corporation, Palo Alto, California. 17. "Kernelized Secure Operating System-System Specification," TRW, Redondo Beach, California, April 1978. 18. "Secure Minicomputer Operating System (KSOS) System Specification (Type A)," WDL-TR7808, Rev. I, Ford Aerospace and Communications Corporation, Palo Alto, California, July 1978. 19. Ames, S. R., and D. R. Oestreicher, "Design of a Message Processing System for a Multilevel Secure Environment," 1978 National Computer Conference, Anaheim, California, June 1978, pp. 765-771. 20. Broadbridge, R., and J. Mekota, "Secure Communications Processor Specification," ESD-TR-76-351, Honeywell Information Systems, Incorporated, Federal Systems Division, McLean, Virginia, June 1976. 21. Rolfe, G., and J. Carnal I, "Detail Specification for the Security Protection Module (SPM)," ESD-TR-76-366, Honeywell Information Systems, Incorporated, Aerospace Division, St. Petersburg, Florida, September 1976.22. Woodward, J. P. L., "ACCAT Guard System Specification (Type A)," MTR-3634, The MITRE Corporation. Bedford. Massachusetts, August
منابع مشابه
High Assurance Multilevel Services For Off-The-Shelf Workstation Applications
The need for multilevel secure (MLS) systems still exists yet, the popularity of desktop systems has resulted in the imposition of new requirements. To be useful, a system must employ commercialoff-the-shelf (COTS) operating systems and office productivity software. We describe the preliminary architecture for a COTS-driven local area network that will provide MLS services to users while permit...
متن کاملKSOS-Computer network applications
The need for multilevel security in computer systems has become well known. In the military, lacking such systems makes costs higher than they should be because of the need either to replicate facilities or perform "color changes" (shutting down and purging systems between uses at varying levels) in order to deny less-cleared users access to highly-classified information, and desirable function...
متن کاملKernelized Database Systems Security
There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths & Wade, 1976). Discretionary security is not...
متن کاملAn introduction to multilevel secure relational database management systems
Multilevel Security (MLS) is a capability that allows information with different classifications to be available in an information system, with users having different security clearances and authorizations, while preventing users from accessing information for which they are not cleared or authorized. It is a security policy that has grown out of research and development efforts funded mostly b...
متن کاملKSOS-Development methodology for a secure operating system*
The goal of the Department of Defense Kernelized Secure Operating System (KSOS) project is to design, implement and prove a secure operating system. Specifically, it is desired that KSOS be designed and proven to enforce a security model, derived from the security practices of the Department of Defense, referred to as "multilevel security." The proof required for KSOS is rigorous proof in the m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010