Biological versus computer viruses
ACM SIGSAC Review
UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
On a Pattern-Oriented Model for Intrusion Detection
IEEE Transactions on Knowledge and Data Engineering
A bandwidth computation model for covert storage channels and its applications
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Trusted subjects configuration based on TE model in MLS systems
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Trustworthy execution on mobile devices: what security properties can my mobile platform give me?
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Hi-index | 0.00 |
Secure Xenix is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.