Guarded commands, nondeterminacy and formal derivation of programs
Communications of the ACM
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
Hi-index | 0.00 |
If signalling channels can only be driven by the Trusted Path, they cannot be exploited by Trojan Horses in untrusted software. To this end, the SMITE system aims to provide a general purpose Trusted path, based on a screen editor, which would act as the users' normal interface to the system. The feasability of the approach relies on the use of a sympathetic computer architecture, which supports a fine grain of protection.