DocumentCode
745945
Title
Design and Implementation of Secure Xenix
Author
Gligor, Virgil D. ; Chandersekaran, C.S. ; Chapman, Robert S. ; Dotterer, Leslie J. ; Hetch, M.S. ; Jiang, Wen-Der ; Johri, Abhai ; Luckenbaugh, Gary L. ; Vasudevan, N.
Author_Institution
Department of Electrical Engineering, University of Maryland
Issue
2
fYear
1987
Firstpage
208
Lastpage
221
Abstract
Secure Xenix™ is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix™ System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.
Keywords
Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path; Information security; Kernel; Operating systems; Project management; Testing; Trademarks; US Government; Workstations; Access control lists; Unix; Xenix; auditor; model interpretation; operating system security; secure attention key; security levels; trusted path;
fLanguage
English
Journal_Title
Software Engineering, IEEE Transactions on
Publisher
ieee
ISSN
0098-5589
Type
jour
DOI
10.1109/TSE.1987.232893
Filename
1702201
Link To Document