Abstract | ||
---|---|---|
The user-interface-level and implementation-level protection mechanisms of the BirliX operating system are described and motivated. Descriptions are provided of subject restriction and object protection as complementary user-interface-level mechanisms for enforcing security policies by building small domains of protection. Traceability is used as a basis for tracing back violations of policies to answerable humans |
Year | DOI | Venue |
---|---|---|
1990 | 10.1109/ICDCS.1990.89290 | Paris |
Keywords | Field | DocType |
distributed processing,network operating systems,security of data,user interfaces,BirliX operating system,abstract data type management,access control lists,acl,adt,identification tags,implementation-level protection mechanisms,message protection,object protection,security domains,security policies,subject restriction,traceability,user interface level security | Network security policy,Computer science,Computer security,Computer network,Security service,Cloud computing security,Network Access Control,Distributed computing,Security policy,User interface,Operating system,Computer security model,Traceability | Conference |
Citations | PageRank | References |
11 | 1.10 | 9 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Oliver C. Kowalski | 1 | 35 | 7.15 |
Hermann Härtig | 2 | 686 | 64.40 |