• DocumentCode
    3309799
  • Title

    A comparison of type enforcement and Unix setuid implementation of well-formed transactions

  • Author

    Thomsen, D.J. ; Haigh, J.T.

  • Author_Institution
    Secure Comput. Technol. Corp., Arden Hills, MN, USA
  • fYear
    1990
  • fDate
    3-7 Dec 1990
  • Firstpage
    304
  • Lastpage
    312
  • Abstract
    Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism
  • Keywords
    data integrity; security of data; Secure Ada Target; Unix setuid mechanism; data integrity; security mechanisms; transformation procedures; type enforcement mechanism; well-formed transactions; Certification; Computer security; Control systems; Data security; Formal verification; Mechanical factors; Operating systems; Pipelines;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
  • Conference_Location
    Tucson, AZ
  • Print_ISBN
    0-8186-2105-2
  • Type

    conf

  • DOI
    10.1109/CSAC.1990.143791
  • Filename
    143791