Skip to main content

A Base for Secure Object Oriented Environments

  • Chapter
Security for Object-Oriented Systems

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

  • 38 Accesses

Abstract

In object oriented environments a small but powerful base protection mechanism is needed which supports the specification of access based on the right to invoke an object interface routine. This base protection mechanism can be used to build up different security policies. The MONADS computer architecture is an efficient realisation of the base protection mechanism. The paper presents a solution for an implementation of different security policies in the MONADS environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Evered M, Keedy JL. A Model for Protection in Persistent Object-Oriented Systems. In Rosenberg J, Keedy JL (eds.). Security and Persistence. Springer-Verlag, London, 1990, pp 67–82

    Chapter  Google Scholar 

  2. Lampson BW. Protection. ACM Operating System Reviews 1974; 8, 1: 18–24

    Google Scholar 

  3. Chin RS, Chanson ST. Distributed Object-Based Programming Systems. ACM Computing Surveys 1991; 23, 1: 91–124

    Article  Google Scholar 

  4. McLean J. The Specification and Modelling of Computer Security. IEEE Computer 1990; 23, 1: 9–16

    Google Scholar 

  5. Department of Defence. Trusted Computer System Evaluation Criteria. 1985

    Google Scholar 

  6. Ting TC. A User-Role Based Data Security Approach. In Landwehr C (ed.). Database Security: Status and Prospects. North-Holland, 1988

    Google Scholar 

  7. Rosenberg J, Abramson DA. MONADS-PC: A Capability Based Workstation to Support Software Engineering. In Proceedings of the 18th Hawaii International Conference on Systems Sciences. 1985, pp 222–231

    Google Scholar 

  8. Keedy JL, Rosenberg J. Support for Objects in the MONADS Architecture. In Proceedings of the International Workshop of Persistent Object Systems. Newcastle, 1989, pp 202–213

    Google Scholar 

  9. Abramson DA, Keedy JL. Implementing a Large Virtual Memory in a Distributed Computing System. In Proceedings of the 18th Hawaii Conference on System Sciences, 1985, pp 515–522

    Google Scholar 

  10. Henskens FA. A Capability-Based Persistent Distributed Shared Memory. PhD thesis, University of Newcastle, 1991

    Google Scholar 

  11. Rosenberg J, Keedy JL, Abramson DA. Addressing Mechanisms for Large Virtual Memories. The Computer Journal 1992; 35, 4: 369–375

    Google Scholar 

  12. Keedy JL, Vosseberg K. Persistent Protected Modules and Persistent Processes as the Basis for a More Secure Operating System. In Proceedings of the 25th Hawaii International Conference on System Sciences, Kauai, 1992, pp. 747756

    Google Scholar 

  13. Karger PA. Improving Security and Performance for Capability Systems. PhD thesis, University of Cambridge Computer Laboratory, 1988

    Google Scholar 

  14. Gong L. On Security in Capability-Based Systems. ACM Operating Systems Review 1989; 23, 2: 56–60

    Google Scholar 

  15. Landau CR Security in a Secure Capability-Based System. ACM Operating Systems Review 1989; 23,4:2–4

    Google Scholar 

  16. Lampson BW. A Note on the Confinement Problem. Communications of the ACM 1973; 16, 10: 613–615

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Vosseberg, K., Brössler, P., Keedy, J.L. (1994). A Base for Secure Object Oriented Environments. In: Thuraisingham, B., Sandhu, R., Ting, T.C. (eds) Security for Object-Oriented Systems. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3858-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3858-7_4

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19877-2

  • Online ISBN: 978-1-4471-3858-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics