Design and Implementation of Secure Xenix
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Communications of the ACM
Building a secure computer system
Building a secure computer system
Communications of the ACM
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
Password security: a case history
Communications of the ACM
Hi-index | 0.00 |
The UNIX@@@@ operating system is designed for collaborative work and not for security. Vendors have modified this operating system (in some cases, radically) to provide levels of security acceptable to their customers, but the versions used in supercomputing environments would benefit from enhancements present in so-called secure versions. This paper discusses the need for security in a supercomputing environment and suggests modifications to the UNIX operating system that would decrease the vulnerability of those sites to attacks. Among the issues are additional auditing controls, changes to network programs, improved user authentication, and better application of the principle of least privilege.