This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Design and Implementation of Secure Xenix
February 1987 (vol. 13 no. 2)
pp. 208-221
Secure Xenix? is an experimental system designed to run on IBM PC/AT workstations. Like Xenix, it is a Unix? System V implementation on the PC/AT workstation; unlike Xenix, it eliminates the Unix security deficiencies and it enhances security policies. In this paper, we present the design features of Secure Xenix, their integration within Xenix, and some of the lessons learned from this experiment to date.
Index Terms:
Xenix, Access control lists, auditor, model interpretation, operating system security, secure attention key, security levels, trusted path, Unix
Citation:
V.D. Gligor, C.S. Chandersekaran, R.S. Chapman, L.J. Dotterer, M.S. Hetch, null Wen-Der Jiang, A. Johri, G.L. Luckenbaugh, N. Vasudevan, "Design and Implementation of Secure Xenix," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 208-221, Feb. 1987, doi:10.1109/TSE.1987.232893
Usage of this product signifies your acceptance of the Terms of Use.