Title
Protection in the BirliX operating system
Abstract
The user-interface-level and implementation-level protection mechanisms of the BirliX operating system are described and motivated. Descriptions are provided of subject restriction and object protection as complementary user-interface-level mechanisms for enforcing security policies by building small domains of protection. Traceability is used as a basis for tracing back violations of policies to answerable humans
Year
DOI
Venue
1990
10.1109/ICDCS.1990.89290
Paris
Keywords
Field
DocType
distributed processing,network operating systems,security of data,user interfaces,BirliX operating system,abstract data type management,access control lists,acl,adt,identification tags,implementation-level protection mechanisms,message protection,object protection,security domains,security policies,subject restriction,traceability,user interface level security
Network security policy,Computer science,Computer security,Computer network,Security service,Cloud computing security,Network Access Control,Distributed computing,Security policy,User interface,Operating system,Computer security model,Traceability
Conference
Citations 
PageRank 
References 
11
1.10
9
Authors
2
Name
Order
Citations
PageRank
Oliver C. Kowalski1357.15
Hermann Härtig268664.40