A comparison of type enforcement and Unix setuid implementation of well-formed transactions

Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes...

Full description

Saved in:
Bibliographic Details
Published in:[1990] Proceedings of the Sixth Annual Computer Security Applications Conference pp. 304 - 312
Main Authors: Thomsen, D.J., Haigh, J.T.
Format: Conference Proceeding
Language:English
Published: IEEE Comput. Soc. Press 1990
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism.< >
AbstractList Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They introduced the notion of transformation procedures which are intended to perform integrity preserving or enhancing operations on various classes of data. These operations are called well-formed transactions. This paper compares the effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism.< >
Author Haigh, J.T.
Thomsen, D.J.
Author_xml – sequence: 1
  givenname: D.J.
  surname: Thomsen
  fullname: Thomsen, D.J.
  organization: Secure Comput. Technol. Corp., Arden Hills, MN, USA
– sequence: 2
  givenname: J.T.
  surname: Haigh
  fullname: Haigh, J.T.
  organization: Secure Comput. Technol. Corp., Arden Hills, MN, USA
BookMark eNotj01LxDAQhgMq6K57F0_5A10nSdM2x1L8ggUPricPSzaZQKRNSxPR_fdG61xehod3mGdFzsMYkJAbBlvGQN11r223ZUrltRS1YmdkBQ1rKs5A8kuyifED8kjZgKquyHtLzThMevZxDHR0NJ0mpBjcOBscMCSqg6VvwX_TiOnTW-qHqf8jOvml8oV9X-TCgJamWYeozS-K1-TC6T7i5j_XZP9wv--eit3L43PX7grfqFTUFiphTCk1b2xdHQ3YsmaWOS1Qcwcmf4ulzApgjMLMkQs4uuzGUEgr1uR2OesR8TDNftDz6bDYix_jFlOg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSAC.1990.143791
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 312
ExternalDocumentID 143791
GroupedDBID 6IE
6IK
6IL
AAJGR
ACGHX
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i89t-7d063cc45a28d76bc0d471d1fa3ea2f0c000e451860cc9ebc0e230bf7911e35d3
IEDL.DBID RIE
ISBN 0818621052
9780818621055
IngestDate Wed Jun 26 19:31:47 EDT 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i89t-7d063cc45a28d76bc0d471d1fa3ea2f0c000e451860cc9ebc0e230bf7911e35d3
PageCount 9
ParticipantIDs ieee_primary_143791
PublicationCentury 1900
PublicationDate 19900000
PublicationDateYYYYMMDD 1990-01-01
PublicationDate_xml – year: 1990
  text: 19900000
PublicationDecade 1990
PublicationTitle [1990] Proceedings of the Sixth Annual Computer Security Applications Conference
PublicationTitleAbbrev CSAC
PublicationYear 1990
Publisher IEEE Comput. Soc. Press
Publisher_xml – name: IEEE Comput. Soc. Press
SSID ssj0000558096
Score 1.325151
Snippet Two security mechanisms are compared and contrasted based on their implementation of the concept of well-formed transactions (D. Clark et al., 1987). They...
SourceID ieee
SourceType Publisher
StartPage 304
SubjectTerms Certification
Computer security
Control systems
Data security
Formal verification
Mechanical factors
Operating systems
Pipelines
Title A comparison of type enforcement and Unix setuid implementation of well-formed transactions
URI https://ieeexplore.ieee.org/document/143791
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09a8MwEBVtpkz9Suk3GrqqkWUplsaQJmQqhWQodAiy7gQZ6pTGhv78SnKcUOjSzbKRkE_D3T3de0fII4CJKh-W5bJwTAqvmPa2YB6z3JcwMphqc-aL4uVNP09lp7OduDCImIrP8Ck-prt82LgmQmXDLIrnhVTnuDC6pWrt4RSulOZRqK-fNNpCIqPETl-nG6vulpKb4WQxnkSiXhimNX_1VkmuZXbyr02dksGBokdf987njBxhdUHex9Tt-wrSjacRYKUYGUcuwYDUVkBDmPlNt1g3a6Drj65-PB5QnBLBPBYjWQRaH5qJbwdkOZsuJ3O2657A1trUrIAQfDgnlRUailHpOAQ_BJm3OVrhuQs2Q6mCbbhzBsN3DNlI6cO_ZJgryC9Jr9pUeEWoNdJrLlyYKmQuuC2FwBFkzvsQPYG_JufRLKvPVh9j1Vrk5s-3t6Qfzd6CGHekV381eE-Ot9A8pAP9AQ-sn4k
link.rule.ids 310,311,782,786,791,792,798,4054,4055,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDDDxKuKNB1ZTx7HzGKvSqohSIbUDEkPl-M5SB1pEE4mfj-00rZBY2OJEjpK74e4-3_cdIfcAuVf50CyWqWFSWMUyq1NmMYptAUmOoTdnOEnHb9ljXzY624ELg4ih-Qwf_GU4y4elqTxU1om8eJ4rdfaUTJO0JmttABWuVMa9VN9BUGlzpYwSa4WdZq2ac0qed3qTbs9T9dwyvPXXdJUQXAaH__qsI9LekvTo6yb8HJMdXJyS9y41m8mCdGmph1gpes6RCUAg1QugLtH8pissqznQ-UfTQe5d5Ld4OI_5XBaBlttx4qs2mQ76096QrecnsHmWlywFl34YI5UWGaRJYTi4SASR1TFqYblxNkOpnG24MTm65-jqkcK6f4kwVhCfkdZiucBzQnUubcaFcVuFjAXXhRCYQGSsdfkT2Aty4s0y-6wVMma1RS7_vHtH9ofTl9Fs9DR-viIH3gU1pHFNWuVXhTdkdwXVbXDuD6cNoto
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=%5B1990%5D+Proceedings+of+the+Sixth+Annual+Computer+Security+Applications+Conference&rft.atitle=A+comparison+of+type+enforcement+and+Unix+setuid+implementation+of+well-formed+transactions&rft.au=Thomsen%2C+D.J.&rft.au=Haigh%2C+J.T.&rft.date=1990-01-01&rft.pub=IEEE+Comput.+Soc.+Press&rft.isbn=9780818621055&rft.spage=304&rft.epage=312&rft_id=info:doi/10.1109%2FCSAC.1990.143791&rft.externalDocID=143791
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780818621055/sc.gif&client=summon&freeimage=true