ITOSS: An integrated toolkit for operating system security

  • Michael Rabin
  • J. D. Tygar
Operating Systems And Data Organization
Part of the Lecture Notes in Computer Science book series (LNCS, volume 367)


File System Security Policy Access Mode Access Privilege Trigger Condition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Bashe 86]
    Bashe, C. J., L. R. Johnson, J. H. Palmer, and E. W. Pugh. IBM's Early Computers MIT Press, Cambridge, Massachusetts, 1986.Google Scholar
  2. [Benzel 84]
    “Analysis of a Kernel Verification.” Proceedings of the 1984 Symposium on Security and Privacy, Oakland, California, May 1984, pp. 125–131.Google Scholar
  3. [Daley-Dennis 68]
    Daley, R. C., and Dennis, J. B. “Virtual Memory, Processes, and Sharing in MULTICS.” Communications of the ACM, 11:5, pp. 306–312 (May 1968).Google Scholar
  4. [DeMillo-Lipton-Perlis 79]
    DeMillo, R. A., R. J. Lipton, and A. J. Perlis. “Social Processes and Proofs of Theorems and Programs.” Communications of the ACM, 22:5, (May 1979).Google Scholar
  5. [Dijkstra 68]
    Dijkstra, E. W. “The Structure of the ‘THE’ Multiprogramming System.” Communications of the ACM, 11:5, pp. 341–346 (May 1968).Google Scholar
  6. [DOD 85]
    Trusted Computer System Evaluation Criteria. Computer Security Center, Department of Defense, Fort Meade, Maryland. (CSC-STD-001-83) March 1985.Google Scholar
  7. [Grampp-Morris 84]
    Grampp, F. T., and R. H. Morris. “UNIX Operating System Security.” AT&T Bell Laboratories Technical Journal, 63:8b, pp. 1649–1672 (October 1984).Google Scholar
  8. [Jelen 85]
    Jelen, G. F. Information Security: An Elusive Goal. Program on Information Resources Policy, Harvard University, Cambridge, Massachusetts. June 1985.Google Scholar
  9. [Lampson 73]
    Lampson, B. W. “A Note on the Confinement Problem.” Communications of the ACM, 16:10, pp. 613–615 (October 1973).Google Scholar
  10. [Lampson 74]
    Lampson, B. W. “Protection.” ACM Operating Systems Review, 19:5, pp. 13–24 (December 1985).]Google Scholar
  11. [McLean 85]
    McLean, J. “A Comment on the ‘Basic Security Theorem’ of Bell and La-Padula.” Information Processing Letters, 20:3, pp. 67–70 (1985).Google Scholar
  12. [McLean 86]
    McLean, J. “Reasoning About Security Models.” Personal Communication, 1986.Google Scholar
  13. [Organick 72]
    Organick, E. I. The Multics System. MIT Press, Cambridge, Massachusetts, 1972.Google Scholar
  14. [Rabin 81]
    Rabin, M. O. “Fingerprinting by Random Polynomials.” TR-15-81. Center for Research in Computing Technology, Harvard University, Cambridge, Massachusetts. 1981.Google Scholar
  15. [Ritchie-Thompson 74]
    Ritchie, D. M. and Thompson, K. “The UNIX Time-Sharing System.” Communications of the ACM, 17:7, pp. 365–375 (July 1974).Google Scholar
  16. [Schroeder-Saltzer 72]
    Schroeder, M. D., and J. H. Saltzer. “A Hardware Architecture for Implementing Protection Rings.” Communications of the ACM, 15:3, pp. 157–170 (March 1972).Google Scholar
  17. [Shamir 79]
    Shamir, A. “How to Share a Secret.” Communications of the ACM, 22:11, pp. 612–613 (November 1979).Google Scholar
  18. [Thompson 84]
    Thompson, K. “Reflections on Trusting Trust.” Communications of the ACM, 27:8, pp. 761–763 (August 1984).Google Scholar
  19. [Wulf-Levin-Harbison 81]
    Wulf, W. A., R. Levin, S. P. Harbison. HYDRA/C.mmp. McGraw-Hill, New York, NY, 1981.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1989

Authors and Affiliations

  • Michael Rabin
    • 1
  • J. D. Tygar
    • 2
  1. 1.Aiken Computation LaboratoryHarvard UniversityCambridge
  2. 2.School of Computer ScienceCarnegie Mellon UniversityPittsburgh

Personalised recommendations