Publication | Closed Access
Protection in the Hydra Operating System
123
Citations
15
References
1975
Year
EngineeringInformation SecurityFormal VerificationSoftware AnalysisHardware SecuritySystems EngineeringTrusted Execution EnvironmentSecure ComputingTrusted Operating SystemProtection MechanismsDirectory SubsystemsHydra SuppliesOperating System SecuritySecure By DesignComputer ScienceHydra Operating SystemData SecurityCryptographyOperating SystemsFormal MethodsSystem Software
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel. These mechanisms support the construction of user-defined protected subsystems, including file and directory subsystems, which do not therefore need to be supplied directly by Hydra. In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.
| Year | Citations | |
|---|---|---|
Page 1
Page 1