The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (1987 vol.13)
pp: 208-221
V.D. Gligor , Department of Electrical Engineering, University of Maryland
ABSTRACT
Secure Xenix? is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix? System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.
INDEX TERMS
Xenix, Access control lists, auditor, model interpretation, operating system security, secure attention key, security levels, trusted path, Unix
CITATION
V.D. Gligor, C.S. Chandersekaran, R.S. Chapman, L.J. Dotterer, M.S. Hetch, null Wen-Der Jiang, A. Johri, G.L. Luckenbaugh, N. Vasudevan, "Design and Implementation of Secure Xenix", IEEE Transactions on Software Engineering, vol.13, no. 2, pp. 208-221, February 1987, doi:10.1109/TSE.1987.232893
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool