Abstract
In object oriented environments a small but powerful base protection mechanism is needed which supports the specification of access based on the right to invoke an object interface routine. This base protection mechanism can be used to build up different security policies. The MONADS computer architecture is an efficient realisation of the base protection mechanism. The paper presents a solution for an implementation of different security policies in the MONADS environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Evered M, Keedy JL. A Model for Protection in Persistent Object-Oriented Systems. In Rosenberg J, Keedy JL (eds.). Security and Persistence. Springer-Verlag, London, 1990, pp 67–82
Lampson BW. Protection. ACM Operating System Reviews 1974; 8, 1: 18–24
Chin RS, Chanson ST. Distributed Object-Based Programming Systems. ACM Computing Surveys 1991; 23, 1: 91–124
McLean J. The Specification and Modelling of Computer Security. IEEE Computer 1990; 23, 1: 9–16
Department of Defence. Trusted Computer System Evaluation Criteria. 1985
Ting TC. A User-Role Based Data Security Approach. In Landwehr C (ed.). Database Security: Status and Prospects. North-Holland, 1988
Rosenberg J, Abramson DA. MONADS-PC: A Capability Based Workstation to Support Software Engineering. In Proceedings of the 18th Hawaii International Conference on Systems Sciences. 1985, pp 222–231
Keedy JL, Rosenberg J. Support for Objects in the MONADS Architecture. In Proceedings of the International Workshop of Persistent Object Systems. Newcastle, 1989, pp 202–213
Abramson DA, Keedy JL. Implementing a Large Virtual Memory in a Distributed Computing System. In Proceedings of the 18th Hawaii Conference on System Sciences, 1985, pp 515–522
Henskens FA. A Capability-Based Persistent Distributed Shared Memory. PhD thesis, University of Newcastle, 1991
Rosenberg J, Keedy JL, Abramson DA. Addressing Mechanisms for Large Virtual Memories. The Computer Journal 1992; 35, 4: 369–375
Keedy JL, Vosseberg K. Persistent Protected Modules and Persistent Processes as the Basis for a More Secure Operating System. In Proceedings of the 25th Hawaii International Conference on System Sciences, Kauai, 1992, pp. 747756
Karger PA. Improving Security and Performance for Capability Systems. PhD thesis, University of Cambridge Computer Laboratory, 1988
Gong L. On Security in Capability-Based Systems. ACM Operating Systems Review 1989; 23, 2: 56–60
Landau CR Security in a Secure Capability-Based System. ACM Operating Systems Review 1989; 23,4:2–4
Lampson BW. A Note on the Confinement Problem. Communications of the ACM 1973; 16, 10: 613–615
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Vosseberg, K., Brössler, P., Keedy, J.L. (1994). A Base for Secure Object Oriented Environments. In: Thuraisingham, B., Sandhu, R., Ting, T.C. (eds) Security for Object-Oriented Systems. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3858-7_4
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3858-7_4
Publisher Name: Springer, London
Print ISBN: 978-3-540-19877-2
Online ISBN: 978-1-4471-3858-7
eBook Packages: Springer Book Archive