A security policy for a profile-oriented operating system

  • Authors:
  • Charles R. Young

  • Affiliations:
  • Sperry Univac, Blue Bell, Pennsylvania

  • Venue:
  • AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
  • Year:
  • 1981

Quantified Score

Hi-index 0.00

Visualization

Abstract

A security policy for a profile-oriented operating system is described that is adopted from state-of-the-art security properties designed to meet even the strict security requirements of the Department of Defense. The policy is built around user, execution, and program profiles that serve as repositories for security related information. The security terms access category, access list, security level, clearance level, subject, object, discretionary and nondiscretionary security, and profile are defined. The six security rules that form the foundation of system security are described. Their interactions are detailed and examples are given. The six rules are: discretionary security condition, simple security condition, *-property (star property), tranquility principle, nonaccessibility of deleted objects, and rewriting of newly created objects.