ThesaHelp: references g-h
ThesaHelp: ACM references f-l
Topic: extensible systems
Topic: type-safe and secure languages
Topic: weak vs. strong type checking
Topic: security by access rights
Topic: security by capabilities
Topic: parameter passing by reference
Topic: managing shared memory
Topic: parameter passing by value-result
Topic: operating system security
Topic: limitations of system security
| |
Reference
Grimm, R., Bershad, B.N.,
"Separating access control policy, enforcement, and functionality in extensible systems",
ACM Transactions on Computer Systems, 19, 1, pp. 36-70, February 2001.
Google
Quotations
abstract ;;Quote: for extensible systems, separate access control into an enforcement manager and policy manager; inspects extensions for protected types and operations; protection domain transfers and audits
| 37 ;;Quote: extensible systems run core system services and dynamically composed extensions in the same address space using low-latency, type-safe interfaces
| 43 ;;Quote: assign security IDs to threads, extensions, and other objects; operations require permission; access mode is a 64-bit vector of permissions and permission objects
| 55 ;;Quote: call-by-reference creates shared memory between caller and callee; if multi-threaded, information can transfer at any time
| 55+;;Quote: do not use shared memory or call-by-reference for extensible systems; use multiple return results and call-by-value/result
| 55 ;;Quote: SPIN uses Modula-3 to guarantee that an extension's interface is obeyed; compiler is part of trusted computing base
| 58 ;;Quote: protection domain transfers take 200 instructions compared to 50 for the event dispatcher; need to limit use, e.g., separate web server from NFS and file cache operations
|
Related Topics
ThesaHelp: references g-h (299 items)
ThesaHelp: ACM references f-l (241 items)
Topic: extensible systems (22 items)
Topic: type-safe and secure languages (43 items)
Topic: weak vs. strong type checking (42 items)
Topic: security by access rights (38 items)
Topic: security by capabilities (65 items)
Topic: parameter passing by reference (11 items)
Topic: managing shared memory (74 items)
Topic: parameter passing by value-result (10 items)
Topic: operating system security (18 items)
Topic: limitations of system security (39 items)
|