Abstract | ||
---|---|---|
Secure Xenix is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date. |
Year | DOI | Venue |
---|---|---|
1987 | 10.1109/TSE.1987.232893 | IEEE Trans. Software Eng. |
Keywords | Field | DocType |
experimental system,unix security deficiency,system v implementation,design feature,secure xenix,security policy,ibm pc,unix,auditor,system design,operating system | Secure attention key,Trusted path,Unix security,Computer science,Workstation,Unix,Personal computer,IBM PC compatible,Security policy,Operating system,Embedded system | Journal |
Volume | Issue | ISSN |
13 | 2 | 0098-5589 |
Citations | PageRank | References |
25 | 7.90 | 3 |
Authors | ||
9 |
Name | Order | Citations | PageRank |
---|---|---|---|
Virgil D. Gligor | 1 | 4133 | 513.94 |
C. Sekar Chandersekaran | 2 | 77 | 23.38 |
Robert S. Chapman | 3 | 40 | 17.05 |
Leslie J. Dotterer | 4 | 40 | 17.05 |
Matthew S. Hecht | 5 | 428 | 267.50 |
Wen-der Jiang | 6 | 56 | 19.94 |
Abhai Johri | 7 | 33 | 9.34 |
Gary L. Luckenbaugh | 8 | 48 | 18.50 |
N. Vasudevan | 9 | 40 | 17.39 |