Operating System Structures to Support Security and Reliable Software (original) (raw)
Published: 01 December 1976 Publication History
References
[1]
ANVE~ON, J. Computer security technology planning study, Air Force Elect. Systems Dip., ESD- TR-73-51, Oct. 1972.]]
[2]
BELL, D.; AND LAPADULA, L. Secure computer systems, Air Force Elect. Systems Dip., ESD-TR-73- 278, Nov. 1973.]]
[3]
BaANST~, D. K. "Privacy and ~omp rotection in operating systems," uter 6 (Jan. 1973), 43-46.]]
[4]
COHEN, E.; AND JEFFERSON, D. "Protection in the Hydra operating system," in Proc. Fifth ACM Symposium on Operating Systems Principles; ACM Operating System Review 9, 5, (Nov. 1975), 141-160, ACM, New York~ 1975.]]
[5]
CoNwAY, R. W.;MAxwELL,W. L.; AND MOaGAN, H. L. "On the implementation of security measures m information systems," Comm. ACM 16, 4, (April 1972), 211-220.]]
[6]
COSSeRAT, D.C. "A data model based on the capabilityprotection mechanism" in Proc. IRIA Internatl. Workshop on Protection in Operating Systems," 1974 Institut de Recherche d'Informatique et d'Automatique, France, 35-54.]]
[7]
DAHL, O.-J.; MYHRH~UNG, B.; AND NYGAARD, K. The S~mula 67 common base language, Norwegian Computing Center, Oslo, Norway, 196~. " ...... N]]
[8]
DENNIS, J. B.; AND VAN nu~, C. Programming semantics for multiprogrammed computations," COmm. ACM 9, 3 (March 1966), 143-155.]]
[9]
DxjKsT1t~, E.W. "The structure of the THE multiprogramming system," Comm. ACM 11, 5 (May 1968), 341-346.]]
[10]
DX#KSTRA, E. W. "Notes on structured programming," in Structured programming, O. -J. Dahl, E. W. Dijkstra, C. A. R. Hoare, (Eds.), Academic Press, New York, 1972.]]
[11]
ENGLAND, D.M. "Architectural features of System 250," in Proc. Internatl. Switching Symposium, Cambridge, Mass. 1972.]]
[12]
ENOLANV, D. M. "Capability concept mechanism and structure in System 250," in Proc. IRIA Internatl. Workshop on Protectwn in Operating Systems, 1974 Instirut de Recherche d'Informatique et de Automatique, France, 63-82.]]
[13]
FABRY, R. S. "Preliminary description of a supervisor for a machine oriented around capabilities," ICR Quarlerly Report 18 Univ. of Chicago, Chicago, Ill.: 1968.]]
[14]
FABRY, R. "Dynamic verification of operating system decisions" Comm. ACM 16, 11 (Nov. 1973), 659--668.]]
[15]
FABRY, R. S. "Capability-based addressing," Comm. ACM 17, 7 (July 1974), 403-412.]]
[16]
FERRIE, J.; KAISER, D.; LAN- cIhux, D.; AND MARTIN, B. "An extensible structure for protected systems design," in Proc. IRIA Internatl. Workshop on Proteclion in Operating Syslems, 1974 Institut de Recherche de Informatique et d'Automatic~ue, France.]]
[17]
GRAHAM, G. ~.; AND DENNING, P.J. "Protection--principle and practice," in Proc. 197~ AFIPS Spring Jr. Computer Conf. Vol. 40, AFIPS Press, Montvale, N. J., 1972 p. 417-424.]]
[18]
GRAY, J.; LAMPSON, B. W.; LIND- SAY, B.; AND STURGIS, H. The control structure of an operating system, Research Report, IBM Watson Research Center, Yorktown Heights, N. Y., July 1972.]]
[19]
HOARE, C. A.R., "Notes on data structuring," Structured programm~ng, O.-J. Dahl, E. W. Dijkstra, C. A. R. Hoare, (Eds.), Academic Press, New York 1972.]]
[20]
HOARE, C. A.R. "Monitors: an operating system structuring concept," Comm. ACM 17, 10 (Oct. 1974), 549-557.]]
[21]
I'IOFFMAN L J., "The formulary model for access control," in Proc. 1971 A FIPS Fall jr. Computer Conf., Vol. 39, AFIPS Press, Montvale, NJ., 1971, pp. 587-601.]]
[22]
JONES, A.J. "Protection in programmed systems," PhD Thesis, Carnegie-Mellon Univ., Pittsburgh, Pa., June 1973.]]
[23]
KNUTH, D.E. The art of computer programming, seminumer~cal algorithms, Vol. 2, Addision-Wesley Publ. Co., Reading, Mass., 1969.]]
[24]
LAMPSON, B. W. "Dynamic protection structures," in Proc. 1969 AFIPS Fall Jt. Computer Conf., Vol. 35, AFIPS Press, Montvale, N. J., 1969 pp. 27-38.]]
[25]
LAMPSON, B. W. "Protection," in Proc. F~fth Annual Princeton Conf. on Information Sczences and Systems, 1971, pp. 437-443. Reprinted zn A CM Operating Systems Review (Jan. 1974).]]
[26]
LAMPSON, B.W. "A note on the confinement problem," Comm. ACM 16, 10 (Oct. 1973), 613-615.]]
[27]
LAMFSON, B. W.; AND STURGIS, H.E. "Reflections on an operating system design," Comm. ACM 19, 5 (May 1976), 251-266.]]
[28]
LINDEN, T. A. "The use of ab* stract data types to simphfy pro- ~o ram modifications, in Proc. of nf on Data: Abstraction Definition and Structure, SIGPLAN Notices, 8, 2 (March 1976), 12-23, ACM, New York, 1976.]]
[29]
LIPNER, S., (Chm.), "A panel session-- security kernels," in Proc. 1974 AFIPS National Computer Conf., Vol. 43, AFIPS Press, Montvale, N. J., pp. 993- 999.]]
[30]
LIPNER, S. B. "A comment on the confinement problem," ACM Operating System Review 9, 5 (Nov. 1975), 192-196.]]
[31]
LISKOV, B.; AND ZILLES, S. "An approach to abstraction," in Proc. of a Symposium on Very High Level Languages, SIGPLAN Notices 9, 4 (April 1974).]]
[32]
LISKOV, B. ; AND ZILLES, S. "Specification techniques for data abstractions," IEEE Trans. on Software Engineemng 1, 1 (March 1975), 7-18.]]
[33]
LONDON, R. L.; WULF, W. A.; AND SHAw, M. Abstraction and verification in Alphard: A symbol table example, Tech. Report, Carnegie- Mellon Univ., Pittsburgh, Pa., 1976.]]
[34]
MORRIS, J. H. "Protection in ~ rogramming languages," Comm. CM 16, 1 (Jan. 1973), 15-21.]]
[35]
NEEDHAM, R. "Protection systems and protection implementations," in Proc. 1972 AFIPS Fall Jr. Computer Conf. Vol. 41, AFIPS Press, Montvale, N. J., pp. 571- 578.]]
[36]
NEEDHAM, R. M.; AND WALKER, R. D.H. "Protection and process management in the CAP com- ~t uter," in Proc. IRIA Internatl. orkshop on Protectwn in Operating Systems, Institut de Recherche d'Informatique et d'Automatique, France, 1974, pp. 155- 160.]]
[37]
NEUMANN, P. G., FABRY, n. S.; LEVITT, K. N.; ROBINSON, L., AND WENSLEY, J. H. "Oil the design of a provably secure operating system," in Proc. IRIA Internatl. Workshop on Protection in Operatin~ Systems, 1974, institut de Recherche d'Informatique et d'Automatique, France, pp. 161- 176.]]
[38]
NEUMANN, P. G.; ROBINSON, L ; LEVITT, I~. N.; BOYER, R. S.; ANt) SAXE~A, A. R. A provably secure operating system, Stanford Research Inst. Final Report, Menlo Park, Calif., June 1975.]]
[39]
ORGANICK, E. I. The Mult~cs system: an examination of ~ts structure, MIT Press, Cambridge, Mass., 1972.]]
[40]
ORGANICK, E. I. Computer system organ~zatwn--the B5700/B6700 series, Academic Press, New York, 1973.]]
[41]
PALME, J. Protected program modules ~n Szmula 67, Research Inst. National Defense, Stockholm, Sweden, July 1973.]]
[42]
PARKER, D. B. Computer abuse assessment, Stanford Research Inst., Menlo Park, Calif., Dec. 1975.]]
[43]
PARNAS, D.L. "A technique for software module specification with examples," Comm ACM 15, 5 (May 1972), 330-336.]]
[44]
PARNAS, D.L., "On the criteria to be used in decomposing systems into modules," Comm. ACM 15, 12, (Dec. 1972), 1053-1058.]]
[45]
PARNAS, D. L. "Some conclusions from an experiment m software engineering techmques," in Proc. 1972 AFIPS Fall Jt. Computer Conf. Vol. 41, AFIPS Press, Montvale, N. J, 1972, pp. 325-329.]]
[46]
PARNAS, D.L. "On a 'buzzword': hierarchical structure," in Proc. IFIP Congress 74 Informatwn Processing 7$-Software, North Holland Publ. Co., Amsterdam, The Netherlands, 1974 pp. 336- 339.]]
[47]
POPEK, C. J.; CLINE, C.S. "Verifiable secure operating system software," in Proc. 1974 AFIPS National Computer Conf. Vol. 43, AFIPS Press, Montvale, N. J., 1974, pp. 145-151.]]
[48]
POPEK, G.J., "Protection structures," Computer 7, 6 (June 1974), 22-31.]]
[49]
PRICE, R.W. "Implications of a virtual memory mechanism for implementing protectlon in a family of operating systems," PhD Thesis, Carnegie-Mellon Univ., Pittsburgh, Pa., june 1973.]]
[50]
REDELL, D. R.; AND FABRY, R. S. "Selective revocation of capabilities," IRIA Internatl. Workshop on Protection in Operating Systems, Institut de Recherche d'Informatique et D'Automatique, 1974 France, p~j.197-210.]]
[51]
REDELL, D."Naming and protection in extendible operating systems" PhD Thesis, Univ. of Calif.Berkeley. MAC TR-140, MIT, Cambridge, Mass., Nov. 1974.]]
[52]
RITCHIE, D M.; AND THOMPSON, K. "The UNIX time-sharing system," Comm. ACM 17, 7 (July 1974), 365-376.]]
[53]
ROBINSON, L.; LEVITT, K. N.; NEUMANN, P. G.; AND SAXENA, A. R. "On attaining reliable software for a secure operating system," in Proc. 1975 Internatl. Conf. on Relzable Software, 10, 6, (June 1975), 267-284. ACM, New York, 1975.]]
[54]
SALTZER, J.H. "Protection and the control of information sharing in Multics," Comm. ACM 17, 7 (July 1974), 388-402.]]
[55]
SALTZER, J. H.; AND SCHROEDER, M.D. "The protection of information in computer systems," in Proc. of the IEEE 63, 9 (Sept. 1975), 1278-1308.]]
[56]
SCmLbER, W. Design of a secumty kernel for the PDP-11/45, Air Force Elect. Systems Div., ESD- TR-73-294, Dec. 1973.]]
[57]
SCHROEDER, M.; AND SALTZER, J. "A hardware architecture for implementing protection rings," Comm. ACM 15, 3 (March 1972), 143-147.]]
[58]
SCHROEDER, hi "Cooperation of mutually suspicious subsystems in a computer utility," PhD Thesis, MIT, Cambridge, Mass., 1972.]]
[59]
SEVICK, K.C. Project SUE as a learning experience," in Proc. AFIPS 197~ Fall Jr. Computer Conf. Vol. 40, AFIPS Press, Montvale, N. J., 1972, pp. 571-578.]]
[60]
SHAw, M.; WULF, W. A., AND LONDON, R. L., Abstractwn and vemficat~on in Alphard: Iteratwn and generators, Tech. Report, Carnegie-Mellon Univ, Pittsburgh, Pa., 1976.]]
[61]
SIMON, H.A. The sciences of the artificial, MIT Press, Cambridge Mass. 1969.]]
[62]
SPIER, M. J.; HASTINGS, T. N.; AND CUTLER, D.N. "An experimental implementation of the kernel/domain architecture," A CM Operating Systems Review 7, 4, (Oct. 1973), 8-21.]]
[63]
WALTER, K. G. et al. "Structured specification of a security kernel," in Proc. 1975 Internatl. Conf. on Reliable Software, SIG- PLAN Notices 10, 6 (April 1975), 285-293, ACM, New York, 1975.]]
[64]
WmSSMAN, C. "Security controls m the ADEPT-50 time-sharing system," in Proc., 1969 AFIPS Fall Jr. Computzng Conf. Vol. 35, AFIPS Press, Montvale, N. J., 1969, pp. 119-133.]]
[65]
WULF, W. A.; AND SHAW, M. "Global variables considered harmful," SIGPLAN Notices 8, 2 (Feb. 1973), 28-34.]]
[66]
WULF, W. A.; et al. "HYDRA: the kernel of a multiprocessor operating system," Comm. ACM 17, 6 (June 1974), 337-345.]]
[67]
WULF, W.A. Toward a language to support structured programs, Carnegie-Mellon Univ., Pittsburgh, Pa., April 1974]]
[68]
WULF, W. A.; LONDON, R. L.; AND SHAW, M. Abstraction and verzficat~on in Alphard: Introduction to language and methodology, Tech. Report, Carnegm-Mellon Univ., Pittsburgh, Pa., 1976.]]
Information & Contributors
Information
Published In
ACM Computing Surveys Volume 8, Issue 4
Dec. 1976
88 pages
Copyright © 1976 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 01 December 1976
Published in CSUR Volume 8, Issue 4
Permissions
Request permissions for this article.
Check for updates
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
- Downloads (Last 12 months)784
- Downloads (Last 6 weeks)76
Reflects downloads up to 09 Jan 2025
Other Metrics
Citations
- Pathak PNadeem MAnsar S(2024)Security assessment of operating system by using decision making algorithmsInternational Journal of Information Technology10.1007/s41870-023-01706-9Online publication date: 19-Jan-2024
- Kim HKim D(2023)A Taxonomic Hierarchy of Blockchain Consensus Algorithms: An Evolutionary Phylogeny ApproachSensors10.3390/s2305273923:5(2739)Online publication date: 2-Mar-2023
- Kuzuno HYamauchi T(2021)Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory MechanismIEEE Access10.1109/ACCESS.2021.31014529(111651-111665)Online publication date: 2021
- KUZUNO HYAMAUCHI T(2020)Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation MechanismIEICE Transactions on Information and Systems10.1587/transinf.2019ICP0011E103.D:7(1462-1475)Online publication date: 1-Jul-2020
- Abid CKessentini MAlizadeh VDhouadi MKazman R(2020)How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring ApproachIEEE Transactions on Software Engineering10.1109/TSE.2020.3005995(1-1)Online publication date: 2020
- Kuzuno HYamauchi T(2020)MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory CorruptionAdvances in Information and Computer Security10.1007/978-3-030-58208-1_6(97-116)Online publication date: 26-Aug-2020
- Kuzuno HYamauchi T(2019)KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection MechanismInformation Security Practice and Experience10.1007/978-3-030-34339-2_5(75-94)Online publication date: 6-Nov-2019
- Jin HLiu MDodhia KLi YSrivastava GFredrikson MAgarwal YHong J(2018)Why Are They Collecting My Data?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/32870512:4(1-27)Online publication date: 27-Dec-2018
- Madhavapeddy ASivaramakrishnan KGordon GGazagnaire T(2018)An architecture for interspatial communicationIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406931(716-723)Online publication date: Apr-2018
- Unger B(2016)Programming languages for computer system simulationSIMULATION10.1177/00375497780300040230:4(101-110)Online publication date: 19-Aug-2016
- Show More Cited By
View Options
View options
View or Download as a PDF file.
eReader
View online with eReader.
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
Media
Figures
Other
Tables
Affiliations
Theodore A. Linden
Institute for Computer Sciences and Technology, National Bureau of Standards, Washington, D.C.