Map
Index
Random
Help
th

QuoteRef: rushJ7_1983

topics > all references > ThesaHelp: references p-r



ThesaHelp:
references p-r
Topic:
security by secure domains
Topic:
security leaks and weaknesses
Topic:
operating system security
Topic:
distributed system security
Topic:
encryption
Topic:
one-way hash function
Topic:
trust
Topic:
security by audit trail

Reference

Rushby, J., Randell, B., "A distributed secure system", Computer, July 1983. Google

Quotations
55 ;;Quote: multilevel security: each individual is assigned a clearance and each item of information has a classification; widely used
55 ;;Quote: security partition: a set of compartments accessible by an individual, and a clearance or classification
55 ;;Quote: conventional computer systems do not enforce multilevel security; subverted by trap doors and trojan horses
57 ;;Quote: reference monitor for trustworthy access to untrusted components and data; checks each access against policy and record so far
57 ;;Quote: a security kernel mistakenly combines separation and mediation of security issues
57 ;;Quote: physically separate untrusted computing resources and the security processors
57 ;;Quote: temporally separate activities in different security partitions by reinitializing an untrusted host
57 ;;Quote: security processors contain a separation kernel to logically separate reference monitors and untrusted support functions
57 ;;Quote: separation kernels are smaller, less complicated, faster, and more easily verified then security kernels
57 ;;Quote: cryptographic separation for different uses of shared communication and storage media
58 ;;Quote: implemented the secure Newcastle_Connection as a Unix layer above the kernel
60 ;;Quote: cipher block chaining prevents information leaks by modulating message contents, but not leaks from pattern-of-use channels
60 ;;Quote: separate communication channels by encryption and a high-quality checksum that includes a message's identification fields
61 ;;Quote: separate communication channels by a different encryption key for each security partition
62 ;;Quote: use a trustworthy intermediary for secure information flow; e.g., a low-level host places a file in a secure store for reading by a high-level host
63 ;;Quote: partition secure file system into trusted and untrusted machines; the secure file manager enforces secure access to the untrusted file storage
63 ;;Quote: secure file manager adds a checksum to prevent top secret information from leaking from the file store
64 ;;Quote: secure file manager maintains a complete history of the last five minutes; prevents frequent versions of the same file for a pattern-of-use channel
64 ;;Quote: a file storage machine can be used for multiple security partitions since leaks are prevented by the secure file manager


Related Topics up

ThesaHelp: references p-r (245 items)
Topic: security by secure domains (42 items)
Topic: security leaks and weaknesses (56 items)
Topic: operating system security (17 items)
Topic: distributed system security (16 items)
Topic: encryption (43 items)
Topic: one-way hash function (23 items)
Topic: trust (16 items)
Topic: security by audit trail (13 items)

Collected barberCB 3/87
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.