A secure distributed operating system

  • Authors:
  • Thomas A. Casey, Jr.;Stephen T. Vinter;D. G. Weber;Rammohan Varadarajan;David Rosenthal

  • Affiliations:
  • BBN Laboratories, Cambridge, MA;BBN Laboratories, Cambridge, MA;Odyssey Research Associates, Ithaca, NY;Odyssey Research Associates, Ithaca, NY;Odyssey Research Associates, Ithaca, NY

  • Venue:
  • SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
  • Year:
  • 1988

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper discusses some issues in distributed system security, in the context of the design of a secure distributed operating system. The design is targeted for an A1 rating. Some new developments in formal verification methods are reported. Distributed system security is contrasted with single-host and network security, and described in the context of the TNI. Problems unique to distributed system security are discussed. An argument is made for implementing security features in higher layers, corresponding roughly to the session thru application layers of the OSI model. A new security policy, based on message-passing rather than reads and writes, is described. The SDOS design is summarized.