{"title":"The security policy of the secure distributed operating system prototype","authors":"Norman Proctor, R. Wong","doi":"10.1109/CSAC.1989.81034","DOIUrl":null,"url":null,"abstract":"The experimental secure distributed operating system (SDOS) is described. It uses a composable property as its mandatory security policy. The security policy includes a fine granularity of discretionary access control immune to Trojan horse attacks. The high degree of assurance that composability makes practical and the richness of the discretionary controls lead SDOS to use balanced assurance. In balance assurance, the assurance measures are fitted to the portion of the security policy whose enforcement is being assured. Like the Cronus distributed computing environment from which it is derived, SDOS uses an object model with abstract operations on various types of system objects and permits an application to extend the paradigm to new types of application objects with new operations. The SDOS security policy and enforcement can likewise be extended for an application's security policy and enforcement.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The experimental secure distributed operating system (SDOS) is described. It uses a composable property as its mandatory security policy. The security policy includes a fine granularity of discretionary access control immune to Trojan horse attacks. The high degree of assurance that composability makes practical and the richness of the discretionary controls lead SDOS to use balanced assurance. In balance assurance, the assurance measures are fitted to the portion of the security policy whose enforcement is being assured. Like the Cronus distributed computing environment from which it is derived, SDOS uses an object model with abstract operations on various types of system objects and permits an application to extend the paradigm to new types of application objects with new operations. The SDOS security policy and enforcement can likewise be extended for an application's security policy and enforcement.<>