Map
Index
Random
Help
th

QuoteRef: kargPA6_1974

topics > all references > ThesaHelp: references i-l



Topic:
logging data and events
Topic:
security by audit trail
Group:
security
Topic:
security leaks and weaknesses
Topic:
limitations of system security
Group:
operating system
Topic:
password protection

Reference

Karger, P.A., Schell, R.R., "Multics security evaluation: vulnerability analysis", ESD-TR-74-193, II, June 1974, HQ Electronic Systems Division: Hanscom AFB, Massachusetts, USA. Google

Other Reference

p. 127-150 in Proceedings of the 18th Annual Computer Society Applications Conference (ACSAC'02), December 2002, IEEE Computer Society. Page numbers estimated.

Quotations
128 ;;Quote: to ensure security, a reference monitor must be tamper proof, invoked on every data reference, and small enough to be proven correct
128 ;;Quote: security rings and memory segmentation might be provably secure; e.g., Multics, a descriptor-based system
131 ;;Quote: easily attacked Multics security via hardware, software, and procedures; extracted or modified sensitive data without detection; 250 manhours of effort
131 ;;Quote: the subverter frequently sampled the security sensitive hardware; identified code that allowed illegal access to a protected segment; was due to a field modification
142 ;;Quote: the World Wide Military Command and Control System was developed and deployed by uncleared personnel using an open time sharing system; vulnerable to trap door insertions
143 ;;Quote: a compiler or assembler can insert a trap door when compiling a ring 0 module; hidden even when recompiling the compiler
143 ;;Quote: use system initialization code to insert trap doors as the system is booted; initialization is complex and poorly understood
145 ;;Quote: passwords and security audits are no more than "security blankets" as long as hardware and software are vulnerable

Related Topics up

Topic: logging data and events (17 items)
Topic: security by audit trail (18 items)
Group: security   (23 topics, 874 quotes)
Topic: security leaks and weaknesses (67 items)
Topic: limitations of system security (39 items)
Group: operating system   (27 topics, 924 quotes)
Topic: password protection (44 items)

Collected barberCB 4/05
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.