Map
Index
Random
Help
th

QuoteRef: grimR2_2001

topics > all references > ThesaHelp: references g-h



ThesaHelp:
references g-h
ThesaHelp:
ACM references f-l
Topic:
extensible systems
Topic:
type-safe and secure languages
Topic:
weak vs. strong type checking
Topic:
security by access rights
Topic:
security by capabilities
Topic:
parameter passing by reference
Topic:
managing shared memory
Topic:
parameter passing by value-result
Topic:
operating system security
Topic:
limitations of system security

Reference

Grimm, R., Bershad, B.N., "Separating access control policy, enforcement, and functionality in extensible systems", ACM Transactions on Computer Systems, 19, 1, pp. 36-70, February 2001. Google

Quotations
abstract ;;Quote: for extensible systems, separate access control into an enforcement manager and policy manager; inspects extensions for protected types and operations; protection domain transfers and audits
37 ;;Quote: extensible systems run core system services and dynamically composed extensions in the same address space using low-latency, type-safe interfaces
43 ;;Quote: assign security IDs to threads, extensions, and other objects; operations require permission; access mode is a 64-bit vector of permissions and permission objects
55 ;;Quote: call-by-reference creates shared memory between caller and callee; if multi-threaded, information can transfer at any time
55+;;Quote: do not use shared memory or call-by-reference for extensible systems; use multiple return results and call-by-value/result
55 ;;Quote: SPIN uses Modula-3 to guarantee that an extension's interface is obeyed; compiler is part of trusted computing base
58 ;;Quote: protection domain transfers take 200 instructions compared to 50 for the event dispatcher; need to limit use, e.g., separate web server from NFS and file cache operations


Related Topics up

ThesaHelp: references g-h (299 items)
ThesaHelp: ACM references f-l (241 items)
Topic: extensible systems (22 items)
Topic: type-safe and secure languages (43 items)
Topic: weak vs. strong type checking (42 items)
Topic: security by access rights (38 items)
Topic: security by capabilities (65 items)
Topic: parameter passing by reference (11 items)
Topic: managing shared memory (74 items)
Topic: parameter passing by value-result (10 items)
Topic: operating system security (18 items)
Topic: limitations of system security (39 items)

Collected barberCB 1/03
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.