Abstract
BirliX is an operating system kernel supporting fault tolerant and secure applications in a distributed environment. Essentially it is an abstract data type management system. Its basic services are the definition of abstract data types, their instantiation, their identification, and the communication between instances. All abstract data types share a common set of type-independent attributes inherited from the kernel-defined BirliX Primary Type.
BirliX Types are persistent. Persistence of an instance depends on long term name bindings within nameservers, short term references form other instances, and internal instance activities. The kernel maintains an instance as long as there is at least one name binding, one external reference or an internal instance activity. Persistence of BirliX Types is based on persistent memory segments.
Security in BirliX is also based upon BirliX Types. Depending on their role during access, instances are classified as subjects (accessing instances) or objects (accessed instances). Access rights can be controlled from the point of view of subjects, called subject restriction lists (SRLs), and from the point of view of used objects, called access control lists (ACLs). The resulting granted access rights are the intersection of the granted rights as specified by ACLs and SRLs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Guy T. Almes, Andrew P. Black, Edward D. Lazowska, and Jerre D. Noe. The eden system: A technical review. Transactions On Software Engineering, 11 (1), January 1985.
C.B. Hogan. Protection Imperfect: The Security of some Computing Environments. Operating System Review, 22 (3): 7–27, July 1988.
S.J. Mullender, editor. The AMOEBA Distributed Operating System — selected papers 1984–1987. Amsterdam, Centrum voor Wiskunde en Informatica, 1987.
R. Schumann, R. Kroger, M. Mock, and E. Nett. Recovery Management in the Relax Distributed Transaction Laver. In 8th Symp. on Reliable Distributed Systems, Seattle, October 1989.
A. Tevanian and R.F. Rashid. MACH - A Basis for Future Unix Development. In EUUG Conference Proceedings, Manchester, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 British Computer Society
About this paper
Cite this paper
Kühnhauser, W.E., Härtig, H., Kowalski, O.C., Lux, W. (1990). Mechanisms for Persistence and Security in BirliX. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_22
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3178-6_22
Publisher Name: Springer, London
Print ISBN: 978-3-540-19646-4
Online ISBN: 978-1-4471-3178-6
eBook Packages: Springer Book Archive