Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
Password authentication with insecure communication
Communications of the ACM
Authentication of signatures using public key encryption
Communications of the ACM
Advances in Computer Architecture
Advances in Computer Architecture
An implementation of capabilities on the PDP-11/45
ACM SIGOPS Operating Systems Review
Capability architecture revisited
ACM SIGOPS Operating Systems Review
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
The use of the monitor call instruction to implement domain switching in the IBM 370 architecture
ACM SIGOPS Operating Systems Review
Identifier protection in a distributed operating system
ACM SIGOPS Operating Systems Review
Software Design: Methods and Techniques
Software Design: Methods and Techniques
A secure distributed capability based system (extended abstract)
ACM '85 Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective
Hi-index | 0.01 |
Computer security violations have become a serious threat to both corporate and national defense activities. By extending the work done by Myers et. el. in the development of the capability based addressing system for the SWARD at IBM, a Computer architectural approach has been developed which solves all known software based internal computer security problems. The problems solved include (but are not restricted to):(1) Violations of priority and access priveleges by highly skilled users,(2) The clasic "Trojan Horse" problem,(3) Access and alteration of sensitive data-bases by unauthorized users(4) The "Lost Key" problem of advanced capability based addressing systems.This solution proposes and develops an architectural approach which manages a sophisticated capability based addressing system entirely in hardware. As a result, the architectures developed by this approach tend to be somewhat hardware intensive in that they require unusual amounts of control and memory not available to any user (it is maintained soley for security purposes).