Proceedings Seventh Annual Computer Security Applications Conference
DOI: 10.1109/csac.1991.213019
|View full text |Cite
|
Sign up to set email alerts
|

A prototype B3 trusted X Window System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…However, both works neglect restrictions in window management. Similarly, Epstein et al address security issues like weak authentication, unlimited sharing of X resources, between applications or overlapping windows in X11 [8] and propose mechanisms [7] to prevent them. However, they do not enforce permission based display access restrictions.…”
Section: Related Workmentioning
confidence: 99%
“…However, both works neglect restrictions in window management. Similarly, Epstein et al address security issues like weak authentication, unlimited sharing of X resources, between applications or overlapping windows in X11 [8] and propose mechanisms [7] to prevent them. However, they do not enforce permission based display access restrictions.…”
Section: Related Workmentioning
confidence: 99%
“…According to [17], the X11 Windowing System does not provide security. Trusted X [4] has been proposed to provide security for the X Windowing System targeting the requirements in TCSEC B3 (superseded by [13, ISO 15408-2]) but has not been certified. To provide isolation, an untrusted X server and a window manager is deployed for each security level which impacts scalability.…”
Section: Related Workmentioning
confidence: 99%
“…There have been different efforts to build trusted X. Epstein [13], [12], [11] and Woodward [42] describe different trusted X implementations. Picciotto [31] presents two approaches for implementing trusted cut and paste operation in X.…”
Section: Related Workmentioning
confidence: 99%