1987
DOI: 10.1109/tse.1987.232893
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Secure Xenix

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

1990
1990
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…48 One such product was Trusted Xenix, a multilevel secure access control system for the Unix-variant Xenix that was based on the Bell-LaPadula security model. 49 SRI's Advisor Project was a research and development effort to provide TIS with a modified version of NIDES to most effectively enhance intrusion detection efforts with Trusted Xenix. SRI was TIS's subcontractor on TIS's contract with Rome Laboratory.…”
Section: Next Generation Intrusion Detection Expert Systemmentioning
confidence: 99%
“…48 One such product was Trusted Xenix, a multilevel secure access control system for the Unix-variant Xenix that was based on the Bell-LaPadula security model. 49 SRI's Advisor Project was a research and development effort to provide TIS with a modified version of NIDES to most effectively enhance intrusion detection efforts with Trusted Xenix. SRI was TIS's subcontractor on TIS's contract with Rome Laboratory.…”
Section: Next Generation Intrusion Detection Expert Systemmentioning
confidence: 99%
“…Previous research efforts [13,23,25,29,46,47], as well as hardened Linux configurations, such as SELinux and AppArmor, have only considered least privilege on these utilities from the perspective of the administrator, not the untrusted user. In the case of mount utilities, systems like AppArmor attempt to limit the effects of a compromised mount to arbitrarily changing the file system tree.…”
Section: 5%mentioning
confidence: 99%
“…Secure Xenix [23,25], and other secure Unix variants [13,29,46,47] developed modern best practices for enforcing least privilege on the administrator: fragmenting administrative privilege into roles or capabilities, restricting the ability to create more setuid binaries, and removing the setuid bit if a binary is overwritten. Limiting the risk of exploiting a setuid binary is complimentary to Protego's goal of eliminating the need for setuid binaries.…”
Section: Related Workmentioning
confidence: 99%
“…Secure Xenix Somewhat later than the work above, IBM retrofitted Microsoft's Xenix with access control and auditing features [111].This work was influenced the UNIX retrofit of Kramer [173], but aimed to provide a comprehensive and effective implementation of Multics security features [280] (see Chapter 3) in Xenix. Two key issues among several addressed by the Secure Xenix work were compatibility and trusted path.…”
Section: Kvm/370mentioning
confidence: 99%