A comparison of type enforcement and Unix setuid implementation of well-formed transactions
Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes...
Saved in:
Published in: | [1990] Proceedings of the Sixth Annual Computer Security Applications Conference pp. 304 - 312 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE Comput. Soc. Press
1990
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism.< > |
---|---|
AbstractList | Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism.< > |
Author | Haigh, J.T. Thomsen, D.J. |
Author_xml | – sequence: 1 givenname: D.J. surname: Thomsen fullname: Thomsen, D.J. organization: Secure Comput. Technol. Corp., Arden Hills, MN, USA – sequence: 2 givenname: J.T. surname: Haigh fullname: Haigh, J.T. organization: Secure Comput. Technol. Corp., Arden Hills, MN, USA |
BookMark | eNotj01LxDAQhgMq6K57F0_5A10nSdM2x1L8ggUPricPSzaZQKRNSxPR_fdG61xehod3mGdFzsMYkJAbBlvGQN11r223ZUrltRS1YmdkBQ1rKs5A8kuyifED8kjZgKquyHtLzThMevZxDHR0NJ0mpBjcOBscMCSqg6VvwX_TiOnTW-qHqf8jOvml8oV9X-TCgJamWYeozS-K1-TC6T7i5j_XZP9wv--eit3L43PX7grfqFTUFiphTCk1b2xdHQ3YsmaWOS1Qcwcmf4ulzApgjMLMkQs4uuzGUEgr1uR2OesR8TDNftDz6bDYix_jFlOg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSAC.1990.143791 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EndPage | 312 |
ExternalDocumentID | 143791 |
GroupedDBID | 6IE 6IK 6IL AAJGR ACGHX ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIB RIC RIE RIL |
ID | FETCH-LOGICAL-i89t-7d063cc45a28d76bc0d471d1fa3ea2f0c000e451860cc9ebc0e230bf7911e35d3 |
IEDL.DBID | RIE |
ISBN | 0818621052 9780818621055 |
IngestDate | Wed Jun 26 19:31:47 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i89t-7d063cc45a28d76bc0d471d1fa3ea2f0c000e451860cc9ebc0e230bf7911e35d3 |
PageCount | 9 |
ParticipantIDs | ieee_primary_143791 |
PublicationCentury | 1900 |
PublicationDate | 19900000 |
PublicationDateYYYYMMDD | 1990-01-01 |
PublicationDate_xml | – year: 1990 text: 19900000 |
PublicationDecade | 1990 |
PublicationTitle | [1990] Proceedings of the Sixth Annual Computer Security Applications Conference |
PublicationTitleAbbrev | CSAC |
PublicationYear | 1990 |
Publisher | IEEE Comput. Soc. Press |
Publisher_xml | – name: IEEE Comput. Soc. Press |
SSID | ssj0000558096 |
Score | 1.325151 |
Snippet | Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 304 |
SubjectTerms | Certification Computer security Control systems Data security Formal verification Mechanical factors Operating systems Pipelines |
Title | A comparison of type enforcement and Unix setuid implementation of well-formed transactions |
URI | https://ieeexplore.ieee.org/document/143791 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09a8MwEBVtpkz9Suk3GrqqkWUplsaQJmQqhWQodAiy7gQZ6pTGhv78SnKcUOjSzbKRkE_D3T3de0fII4CJKh-W5bJwTAqvmPa2YB6z3JcwMphqc-aL4uVNP09lp7OduDCImIrP8Ck-prt82LgmQmXDLIrnhVTnuDC6pWrt4RSulOZRqK-fNNpCIqPETl-nG6vulpKb4WQxnkSiXhimNX_1VkmuZXbyr02dksGBokdf987njBxhdUHex9Tt-wrSjacRYKUYGUcuwYDUVkBDmPlNt1g3a6Drj65-PB5QnBLBPBYjWQRaH5qJbwdkOZsuJ3O2657A1trUrIAQfDgnlRUailHpOAQ_BJm3OVrhuQs2Q6mCbbhzBsN3DNlI6cO_ZJgryC9Jr9pUeEWoNdJrLlyYKmQuuC2FwBFkzvsQPYG_JufRLKvPVh9j1Vrk5s-3t6Qfzd6CGHekV381eE-Ot9A8pAP9AQ-sn4k |
link.rule.ids | 310,311,782,786,791,792,798,4054,4055,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDDDxKuKNB1ZTx7HzGKvSqohSIbUDEkPl-M5SB1pEE4mfj-00rZBY2OJEjpK74e4-3_cdIfcAuVf50CyWqWFSWMUyq1NmMYptAUmOoTdnOEnHb9ljXzY624ELg4ih-Qwf_GU4y4elqTxU1om8eJ4rdfaUTJO0JmttABWuVMa9VN9BUGlzpYwSa4WdZq2ac0qed3qTbs9T9dwyvPXXdJUQXAaH__qsI9LekvTo6yb8HJMdXJyS9y41m8mCdGmph1gpes6RCUAg1QugLtH8pissqznQ-UfTQe5d5Ld4OI_5XBaBlttx4qs2mQ76096QrecnsHmWlywFl34YI5UWGaRJYTi4SASR1TFqYblxNkOpnG24MTm65-jqkcK6f4kwVhCfkdZiucBzQnUubcaFcVuFjAXXhRCYQGSsdfkT2Aty4s0y-6wVMma1RS7_vHtH9ofTl9Fs9DR-viIH3gU1pHFNWuVXhTdkdwXVbXDuD6cNoto |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=%5B1990%5D+Proceedings+of+the+Sixth+Annual+Computer+Security+Applications+Conference&rft.atitle=A+comparison+of+type+enforcement+and+Unix+setuid+implementation+of+well-formed+transactions&rft.au=Thomsen%2C+D.J.&rft.au=Haigh%2C+J.T.&rft.date=1990-01-01&rft.pub=IEEE+Comput.+Soc.+Press&rft.isbn=9780818621055&rft.spage=304&rft.epage=312&rft_id=info:doi/10.1109%2FCSAC.1990.143791&rft.externalDocID=143791 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/sc.gif&client=summon&freeimage=true |