skip to main content
10.1145/319195.319229acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article
Free Access

Security architecture for component-based operating systems

Authors Info & Claims
Published:07 September 1998Publication History
First page image

References

  1. {1} J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, James P. Anderson and Co., Fort Washington, PA, USA, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  2. {2} L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In IEEE Symposium on Security and Privacy, pages 66-77, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2): 131-152, 1996.Google ScholarGoogle Scholar
  4. {4} J. B. Dennis and E. C. Van Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3):143-155, March 1966. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} B. Ford, G. Back, G. Benson, J. Lepreau, A. Lin, and O. Shivers. The Flux OSKit: A substrate for kernel and language research. In Proceedings of the 16th Symposium on Operating Systems Principles, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. {6} F. S. Gallo. Penguin: Java done right. The Perl Journal, 1(2):10- 12, 1996.Google ScholarGoogle Scholar
  7. {7} L. Giuri and P. Iglio. Role templates for content-based access control. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {8} L. Gong. Java security: present and near future. IEEE Micro, 17(3):14-19, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {9} T. Jaeger, F. Giraud, N. Islam, and J. Liedtke. A role-based access control model for protection domain derivation and management. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. {10} T. Jaeger, J. Liedtke, and N. Islam. Operating system protection for fine-grained programs. In Proceedings of the 7th USENIX Security Symposium, pages 143-156, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. {11} P. A. Karger. Improving Security and Performance for Capability Systems. PhD thesis, University of Cambridge, 1988.Google ScholarGoogle Scholar
  12. {12} J. Liedtke. Improving IPC by kernel design. In Proceedings of the 14th Symposium on Operating Systems Principles, pages 175-187, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. {13} E. C. Lupu and M. Sloman. Reconciling role-based management and role-based access control. In Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {14} D. Mazieres and M. F. Kaashoek. Secure applications need flexible operating systems. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems, pages 56-61, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. {15} S. E. Minear. Providing policy control over object operations in a Mach-based system. In Proceedings of the 5th USENIX UNIX Security Symposium, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. {16} J. G. Mitchell and et al. An overview of the Spring system. In Proceedings of Compcon, February 1994.Google ScholarGoogle Scholar
  17. {17} J. K. Ousterhout, J. Y. Levy, and B. B. Welch. The Safe-Tcl security model. In Proceedings of the 23rd USENIX Annual Technical Conference, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. {18} R. Rashid, A. Tevanian Jr., M. Young, D. Golub, D. Baron, D. Black, W. J. Bolosky, and J. Chew. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures. IEEE Transactions on Computers, 37(8):896-908, August 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. {19} M. Rozier and et al. Overview of the Chorus distributed operating system. In USENIX Symposium on Micro-kernels and Other Kernel Architectures, pages 39-69, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. {20} G. van Rossum. Grail - The browser for the rest of us (draft), 1996. Available at http://monty.cnri.reston.va.us/grail/.Google ScholarGoogle Scholar
  21. {21} J. Vochteloo, K. Elphinstone, S. Russell and G. Heiser. Protection domain extensions in Mungi. In Proceedings of the Fifth International Workshop on Object Orientation in Operating Systems, pages 161-165, October 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. {22} D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the 16th Symposium on Operating Systems Principles, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. {23} M. V. Wilkes and R. M. Needham. The Cambridge CAP Computer and Its Operating System. North Holland, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. {24} W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. Communications of the ACM, 17(6):337-345, June 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security architecture for component-based operating systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              EW 8: Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
              September 1998
              279 pages
              ISBN:9781450373173
              DOI:10.1145/319195

              Copyright © 1998 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 September 1998

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate37of37submissions,100%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader