• DocumentCode
    745945
  • Title

    Design and Implementation of Secure Xenix

  • Author

    Gligor, Virgil D. ; Chandersekaran, C.S. ; Chapman, Robert S. ; Dotterer, Leslie J. ; Hetch, M.S. ; Jiang, Wen-Der ; Johri, Abhai ; Luckenbaugh, Gary L. ; Vasudevan, N.

  • Author_Institution
    Department of Electrical Engineering, University of Maryland
  • Issue
    2
  • fYear
    1987
  • Firstpage
    208
  • Lastpage
    221
  • Abstract
    Secure Xenix™ is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix™ System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.
  • Keywords
    Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path; Information security; Kernel; Operating systems; Project management; Testing; Trademarks; US Government; Workstations; Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path;
  • fLanguage
    English
  • Journal_Title
    Software Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0098-5589
  • Type

    jour

  • DOI
    10.1109/TSE.1987.232893
  • Filename
    1702201