VM/370 security retrofit program
暂无分享,去创建一个
This report describes a design strategy for performing a retrofit to IBM Corporation' s Virtual Machine 370 (VM/370) system that will provide a time-shared environment in which user processes bearing differing military classification levels may be operated simultaneously without compromise to military security. The strategy entails drawing together into a secure kernel those system functions that may be exploited to violate security. This report finalizes the results of the first year of an ongoing research and development program. An earlier version of this paper appeared in "SHARE VM/370 Project Minutes," June, 1977.
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[3] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[4] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..