Skip to main content

Mechanisms for Persistence and Security in BirliX

  • Conference paper

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

BirliX is an operating system kernel supporting fault tolerant and secure applications in a distributed environment. Essentially it is an abstract data type management system. Its basic services are the definition of abstract data types, their instantiation, their identification, and the communication between instances. All abstract data types share a common set of type-independent attributes inherited from the kernel-defined BirliX Primary Type.

BirliX Types are persistent. Persistence of an instance depends on long term name bindings within nameservers, short term references form other instances, and internal instance activities. The kernel maintains an instance as long as there is at least one name binding, one external reference or an internal instance activity. Persistence of BirliX Types is based on persistent memory segments.

Security in BirliX is also based upon BirliX Types. Depending on their role during access, instances are classified as subjects (accessing instances) or objects (accessed instances). Access rights can be controlled from the point of view of subjects, called subject restriction lists (SRLs), and from the point of view of used objects, called access control lists (ACLs). The resulting granted access rights are the intersection of the granted rights as specified by ACLs and SRLs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Guy T. Almes, Andrew P. Black, Edward D. Lazowska, and Jerre D. Noe. The eden system: A technical review. Transactions On Software Engineering, 11 (1), January 1985.

    Article  Google Scholar 

  2. C.B. Hogan. Protection Imperfect: The Security of some Computing Environments. Operating System Review, 22 (3): 7–27, July 1988.

    Article  Google Scholar 

  3. S.J. Mullender, editor. The AMOEBA Distributed Operating System — selected papers 1984–1987. Amsterdam, Centrum voor Wiskunde en Informatica, 1987.

    Google Scholar 

  4. R. Schumann, R. Kroger, M. Mock, and E. Nett. Recovery Management in the Relax Distributed Transaction Laver. In 8th Symp. on Reliable Distributed Systems, Seattle, October 1989.

    Google Scholar 

  5. A. Tevanian and R.F. Rashid. MACH - A Basis for Future Unix Development. In EUUG Conference Proceedings, Manchester, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 British Computer Society

About this paper

Cite this paper

Kühnhauser, W.E., Härtig, H., Kowalski, O.C., Lux, W. (1990). Mechanisms for Persistence and Security in BirliX. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3178-6_22

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19646-4

  • Online ISBN: 978-1-4471-3178-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics