Map
Index
Random
Help
Topics
th

QuoteRef: bersBN12_1995

topics > all references > ThesaHelp: references a-b



ThesaHelp:
ACM references a-e
ThesaHelp:
references a-b
Topic:
security by access rights
Topic:
operating system kernel
Topic:
extensible systems
Topic:
operating system security
Topic:
type-safe and secure languages
Topic:
weak vs. strong type checking
Topic:
security of remotely executed code
Topic:
safe use of pointers
Topic:
security by capabilities
Topic:
event controlled processing

Reference

Bershad, B.N., Savage, S.,, Pardyak, P., Sirer, E.G., Fiuczynski, M.E., Becker, D., Chambers, C., Eggers, S., "Extensibility, safety and performance in the SPIN operating system", Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Copper Mountain, Colorado, USA, December 1995, Operating Systems Review, 29, 5, 12/1995, pp. 267-284. Google

Notes

http://www-spin.cs.washington.edu

Quotations
270 ;;Quote: SPIN OS provides language-based, fine-grained access control and fine-grained user extensions; static type checking and dynamic linking
270 ;;Quote: SPIN depends only on Modula-3's interfaces, type safety, and automatic memory management; no dangling pointers or array overflow
270 ;;Quote: SPIN capabilities are Modula pointers; pointers cannot be forged or dereferenced incorrectly; minimal overhead
270 ;;Quote: SPIN uses externalized references for user-level access to in-kernal data structures; i.e., index into a per-application table
272 ;;Quote: exported SPIN procedures are events; the event dispatcher uses a procedure call if there is only one handler
272 ;;Quote: in SPIN, the primary event handler verifies handler requests and adds guards or closures
275 ;;Quote: SPIN's core services (e.g., memory and processor) must be trusted; incorrect usage isolated to the extension


Related Topics up

ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Topic: security by access rights (36 items)
Topic: operating system kernel (67 items)
Topic: extensible systems (22 items)
Topic: operating system security (17 items)
Topic: type-safe and secure languages (42 items)
Topic: weak vs. strong type checking (39 items)
Topic: security of remotely executed code (22 items)
Topic: safe use of pointers (102 items)
Topic: security by capabilities (65 items)
Topic: event controlled processing (46 items)

Collected barberCB 10/03
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.