A Guide to Understanding Discretionary Access Control in Trusted Systems

  • US Department of Defense


Access Control System Administrator Trojan Horse Access Mode Access Permission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Department of Defense Trusted Computer System Evaluation Criteria, DoD, DoD 5200.28-STD, 1985.Google Scholar
  2. 2.
    Schell, R. R., “Security Kernels: A Methodical Design of System Security,” in Technical Papers, USE Inc., Spring Conference, 5–9 March 1979, pp. 245–250.Google Scholar
  3. 3.
    Schroeder, M.D., Cooperation of Mutually Suspicious Subsystems, PhD dissertation, M.I.T., 1972.Google Scholar
  4. 4.
    Boebert, W.E., and Ferguson, C.T., “A Partial Solution to the Discretionary Trojan Horse Problem,” 9th Security Conference, DoD/NBS, September 1985, pp 141–144.Google Scholar
  5. 5.
    Downs, D, “Discretionary Access Control Guideline,” Aerospace Report, The Aerospace Corporation, September 1985.Google Scholar
  6. 6.
    Boebert, W.E., Kain, R.Y. and Young, W.D., “Secure Computing: The Secure Ada Target Approach,” Scientific Honeyweller, Vol. 6, No. 2 July 1985, pp 1–17.Google Scholar
  7. 7.
    Saltzer, Jerome H., “Protection and the Control of Information in Multics,” Communications of the ACM, Vol. 17, No. 7, July 1974, pp. 388–402.Google Scholar
  8. 8.
    Fabry, R.S., “Capability-Based Addressing,” Communications of the ACM, Vol. 17, No. 7, July 1974, pp. 403–411.Google Scholar
  9. 9.
    Redell, D.D., “Naming and Protection in Extensible Operating Systems,” AD-A001 721, published by M.I.T., Cambridge MA, November 1974.Google Scholar
  10. 10.
    Karger, P.A. and Herbert, A.J., “Lattice Security and Traceability of Access,” Symposium on Security and Privacy, IEEE, April 1984, pp. 13–23.Google Scholar
  11. 11.
    Gligor, V., Huskamp, J., Welke, S., Linn, C., and Mayfield, W., “Traditional Capability-Based Systems: An Analysis of Their Ability to Meet the Trusted Computer Security Evaluation Criteria,” IDA Paper P-1935, October 1986.Google Scholar
  12. 12.
    Computer Associates, CA-SENTINEL Reference Guide, 1983.Google Scholar
  13. 13.
    Saltzer, Jerome H. and Schroeder, Michael D., “The Protection of Information in Computer Systems,” Proceedings of the IEEE, Vol. 63, No. 9, September 1975, pp. 1278–1308.Google Scholar
  14. 14.
    Honeywell Informations Systems, Inc., Multics Programmer’s Manual—Reference Guide, 7 ed., AG91.Google Scholar
  15. 15.
    UC Berkeley, UNIX Programmer’s Manual, 7 ed., 1981.Google Scholar
  16. 16.
    IBM, Access Method Services, 1983.Google Scholar
  17. 17.
    Control Data Corporation, NOS Version 2 Reference Set, 3 ed., 1983.Google Scholar
  18. 18.
    APOLLO Computer Inc., The DOMAIN System Administrator’s Guide, 3 ed., 1983.Google Scholar
  19. 19.
    Bell, D.E. and LaPadula, L.J., “Secure Computer Systems: Unified Exposition and Multics Interpretation,” Tech. report MTR-2997 Rev. 1, MITRE Corp., March 1976.Google Scholar
  20. 20.
    Benzel Vickers, T., “Overview of the SCOMP Architecture and Security Mechanisms,” Tech. report MTR-9071, MITRE Corp., September 1983.Google Scholar

Copyright information

© National Computer Security Center 1985

Authors and Affiliations

  • US Department of Defense

There are no affiliations available

Personalised recommendations