ThesaHelp: ACM references a-e
ThesaHelp: references a-b
Topic: security by access rights
Topic: operating system kernel
Topic: extensible systems
Topic: operating system security
Topic: type-safe and secure languages
Topic: weak vs. strong type checking
Topic: security of remotely executed code
Topic: safe use of pointers
Topic: security by capabilities
Topic: event controlled processing
| |
Reference
Bershad, B.N., Savage, S.,, Pardyak, P., Sirer, E.G., Fiuczynski, M.E., Becker, D., Chambers, C., Eggers, S.,
"Extensibility, safety and performance in the SPIN operating system",
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Copper Mountain, Colorado, USA, December 1995,
Operating Systems Review, 29, 5, 12/1995, pp. 267-284.
Google
Notes
http://www-spin.cs.washington.edu
Quotations
270 ;;Quote: SPIN OS provides language-based, fine-grained access control and fine-grained user extensions; static type checking and dynamic linking
| 270 ;;Quote: SPIN depends only on Modula-3's interfaces, type safety, and automatic memory management; no dangling pointers or array overflow
| 270 ;;Quote: SPIN capabilities are Modula pointers; pointers cannot be forged or dereferenced incorrectly; minimal overhead
| 270 ;;Quote: SPIN uses externalized references for user-level access to in-kernal data structures; i.e., index into a per-application table
| 272 ;;Quote: exported SPIN procedures are events; the event dispatcher uses a procedure call if there is only one handler
| 272 ;;Quote: in SPIN, the primary event handler verifies handler requests and adds guards or closures
| 275 ;;Quote: SPIN's core services (e.g., memory and processor) must be trusted; incorrect usage isolated to the extension
|
Related Topics
ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Topic: security by access rights (36 items)
Topic: operating system kernel (67 items)
Topic: extensible systems (22 items)
Topic: operating system security (17 items)
Topic: type-safe and secure languages (42 items)
Topic: weak vs. strong type checking (39 items)
Topic: security of remotely executed code (22 items)
Topic: safe use of pointers (102 items)
Topic: security by capabilities (65 items)
Topic: event controlled processing (46 items)
|