DocumentCode
3309799
Title
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
Author
Thomsen, D.J. ; Haigh, J.T.
Author_Institution
Secure Comput. Technol. Corp., Arden Hills, MN, USA
fYear
1990
fDate
3-7 Dec 1990
Firstpage
304
Lastpage
312
Abstract
Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism
Keywords
data integrity; security of data; Secure Ada Target; Unix setuid mechanism; data integrity; security mechanisms; transformation procedures; type enforcement mechanism; well-formed transactions; Certification; Computer security; Control systems; Data security; Formal verification; Mechanical factors; Operating systems; Pipelines;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location
Tucson, AZ
Print_ISBN
0-8186-2105-2
Type
conf
DOI
10.1109/CSAC.1990.143791
Filename
143791
Link To Document