Skip to main content

ITOSS: An integrated toolkit for operating system security

  • Operating Systems And Data Organization
  • Conference paper
  • First Online:
Foundations of Data Organization and Algorithms (FODO 1989)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 367))

  • 387 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. Bashe, C. J., L. R. Johnson, J. H. Palmer, and E. W. Pugh. IBM's Early Computers MIT Press, Cambridge, Massachusetts, 1986.

    Google Scholar 

  2. “Analysis of a Kernel Verification.” Proceedings of the 1984 Symposium on Security and Privacy, Oakland, California, May 1984, pp. 125–131.

    Google Scholar 

  3. Daley, R. C., and Dennis, J. B. “Virtual Memory, Processes, and Sharing in MULTICS.” Communications of the ACM, 11:5, pp. 306–312 (May 1968).

    Google Scholar 

  4. DeMillo, R. A., R. J. Lipton, and A. J. Perlis. “Social Processes and Proofs of Theorems and Programs.” Communications of the ACM, 22:5, (May 1979).

    Google Scholar 

  5. Dijkstra, E. W. “The Structure of the ‘THE’ Multiprogramming System.” Communications of the ACM, 11:5, pp. 341–346 (May 1968).

    Google Scholar 

  6. Trusted Computer System Evaluation Criteria. Computer Security Center, Department of Defense, Fort Meade, Maryland. (CSC-STD-001-83) March 1985.

    Google Scholar 

  7. Grampp, F. T., and R. H. Morris. “UNIX Operating System Security.” AT&T Bell Laboratories Technical Journal, 63:8b, pp. 1649–1672 (October 1984).

    Google Scholar 

  8. Jelen, G. F. Information Security: An Elusive Goal. Program on Information Resources Policy, Harvard University, Cambridge, Massachusetts. June 1985.

    Google Scholar 

  9. Lampson, B. W. “A Note on the Confinement Problem.” Communications of the ACM, 16:10, pp. 613–615 (October 1973).

    Google Scholar 

  10. Lampson, B. W. “Protection.” ACM Operating Systems Review, 19:5, pp. 13–24 (December 1985).]

    Google Scholar 

  11. McLean, J. “A Comment on the ‘Basic Security Theorem’ of Bell and La-Padula.” Information Processing Letters, 20:3, pp. 67–70 (1985).

    Google Scholar 

  12. McLean, J. “Reasoning About Security Models.” Personal Communication, 1986.

    Google Scholar 

  13. Organick, E. I. The Multics System. MIT Press, Cambridge, Massachusetts, 1972.

    Google Scholar 

  14. Rabin, M. O. “Fingerprinting by Random Polynomials.” TR-15-81. Center for Research in Computing Technology, Harvard University, Cambridge, Massachusetts. 1981.

    Google Scholar 

  15. Ritchie, D. M. and Thompson, K. “The UNIX Time-Sharing System.” Communications of the ACM, 17:7, pp. 365–375 (July 1974).

    Google Scholar 

  16. Schroeder, M. D., and J. H. Saltzer. “A Hardware Architecture for Implementing Protection Rings.” Communications of the ACM, 15:3, pp. 157–170 (March 1972).

    Google Scholar 

  17. Shamir, A. “How to Share a Secret.” Communications of the ACM, 22:11, pp. 612–613 (November 1979).

    Google Scholar 

  18. Thompson, K. “Reflections on Trusting Trust.” Communications of the ACM, 27:8, pp. 761–763 (August 1984).

    Google Scholar 

  19. Wulf, W. A., R. Levin, S. P. Harbison. HYDRA/C.mmp. McGraw-Hill, New York, NY, 1981.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Witold Litwin Hans-Jörg Schek

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rabin, M., Tygar, J.D. (1989). ITOSS: An integrated toolkit for operating system security. In: Litwin, W., Schek, HJ. (eds) Foundations of Data Organization and Algorithms. FODO 1989. Lecture Notes in Computer Science, vol 367. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51295-0_115

Download citation

  • DOI: https://doi.org/10.1007/3-540-51295-0_115

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-51295-0

  • Online ISBN: 978-3-540-46186-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics