DocumentCode :
745945
Title :
Design and Implementation of Secure Xenix
Author :
Gligor, Virgil D. ; Chandersekaran, C.S. ; Chapman, Robert S. ; Dotterer, Leslie J. ; Hetch, M.S. ; Jiang, Wen-Der ; Johri, Abhai ; Luckenbaugh, Gary L. ; Vasudevan, N.
Author_Institution :
Department of Electrical Engineering, University of Maryland
Issue :
2
fYear :
1987
Firstpage :
208
Lastpage :
221
Abstract :
Secure Xenix™ is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix™ System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.
Keywords :
Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path; Information security; Kernel; Operating systems; Project management; Testing; Trademarks; US Government; Workstations; Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path;
fLanguage :
English
Journal_Title :
Software Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
0098-5589
Type :
jour
DOI :
10.1109/TSE.1987.232893
Filename :
1702201
Link To Document :
بازگشت