DocumentCode :
3309799
Title :
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
Author :
Thomsen, D.J. ; Haigh, J.T.
Author_Institution :
Secure Comput. Technol. Corp., Arden Hills, MN, USA
fYear :
1990
fDate :
3-7 Dec 1990
Firstpage :
304
Lastpage :
312
Abstract :
Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism
Keywords :
data integrity; security of data; Secure Ada Target; Unix setuid mechanism; data integrity; security mechanisms; transformation procedures; type enforcement mechanism; well-formed transactions; Certification; Computer security; Control systems; Data security; Formal verification; Mechanical factors; Operating systems; Pipelines;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2105-2
Type :
conf
DOI :
10.1109/CSAC.1990.143791
Filename :
143791
Link To Document :
بازگشت