Skip to main content

Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System

  • Chapter
The ‘Orange Book’ Series
  • 1015 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Department of Defense, Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, December 1985.

    Google Scholar 

  2. National Computer Security Center, A Guide to Understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003 Version-1, September 1987.

    Google Scholar 

  3. UNIX System Access Control List Proposal, C. Rubin, AT & T, May 15, 1988.

    Google Scholar 

  4. Adding Access Control Lists To UNIX, A. Silverstein, B. McMahon, G. Nuss, Hewlett-Packard Co., March 12, 1988.

    Google Scholar 

  5. Discretionary Access Control System Functions, D. H. Steves, IBM, March 14, 1988.

    Google Scholar 

  6. P1003.6 Security Extension Proposal: Discretionary Access Control Semantics, W. Olin Sibert, Oxford Systems Inc., May 18, 1988.

    Google Scholar 

  7. P1003.6 Supplementary Document: Discretionary Access Control: Problems in P1003.1 Draft 12 , W. Olin Sibert, Oxford Systems Inc., May 18, 1988.

    Google Scholar 

  8. P1003.6 Supplementary Document: Comments on Hewlett-Packard ACL Proposal, W. Olin Sibert, Oxford Systems Inc., May 18, 1988.

    Google Scholar 

  9. Extending The UNIX Protection Model with Access Control Lists, G. Fernandez, L. Allen, Apollo Computer Inc., June 1988.

    Google Scholar 

  10. On Incorporating Access Control Lists into the UNIX Operating System S. M. Kramer, Secure Ware Inc., June 1988.

    Google Scholar 

  11. Trusted UNIX Discretionary Access and Privilege Control Mechanisms, B.D. Wilner, Infosystems Technology Inc., June 2, 1988.

    Google Scholar 

  12. Access Control List Design, Hewlett Packard, October 21, 1988.

    Google Scholar 

  13. Proposal for Adding Access Control Lists to POSIX, P. B. Flinn, Secure Ware Inc., July 25, 1988.

    Google Scholar 

  14. Discretionary Access Control Proposal, H. L. Hall, Digital Equipment Corporation, Oct. 1988.

    Google Scholar 

  15. Portable Operating System Interface for Computer Environments IEEE Std. 1003.1-1988

    Google Scholar 

Download references

Author information

Consortia

Editor information

Copyright information

© 1985 National Computer Security Center

About this chapter

Cite this chapter

US Department of Defense. (1985). Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-12020-8_3

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-0-333-53947-7

  • Online ISBN: 978-1-349-12020-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics