Protection in the Hydra Operating System
- 1 November 1975
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 9 (5) , 141-160
- https://doi.org/10.1145/1067629.806532
Abstract
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel. These mechanisms support the construction of user-defined protected subsystems, including file and directory subsystems, which do not therefore need to be supplied directly by Hydra. In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.Keywords
This publication has 7 references indexed in Scilit:
- The enforcement of security policies for computationPublished by Association for Computing Machinery (ACM) ,1975
- Policy/mechanism separation in HydraPublished by Association for Computing Machinery (ACM) ,1975
- Overview of the Hydra Operating System developmentPublished by Association for Computing Machinery (ACM) ,1975
- Capability-based addressingCommunications of the ACM, 1974
- A note on the confinement problemCommunications of the ACM, 1973
- Protection in programming languagesCommunications of the ACM, 1973
- SIMULA: an ALGOL-based simulation languageCommunications of the ACM, 1966