by A. K. Jones & W. A. Wulf @ CMU
Software-Practice and Experience(1975)
|
Security Policy: a finite set of rules which prohibits or grants the access to a type of objects
|
|||||||||
|
The factors affecting policy design
|
|||||||||
|
Dimensions of security policy
|
|
Tools to implement policies |
|||||||||||
|
Required general properties
|
|
Protection mechanism assumes a capability database to query to grant a process an access to an object |
|||||
|
Capability database: the set of all capabilities at all execution sites |
|||||
|
Capabilities for a process defines the execution environment |
|||||
|
Extension of capability: classical capability (defined above) + capability-based-addressing
|
|||||
|
In extended capability model,
|
|
HYDRA is OS for a machine with up to 16 C.mmp processors connected to one memory |
|||||||||||||
|
The main facility of OS for multiple processors is the protection |
|||||||||||||
|
HYDRA skeletal backbone is an implementation of protection in terms of extended capabilities |
|||||||||||||
|
Object has:
|
|||||||||||||
|
Type object: representative object of the entire objects of the type |
| Name | Type |
| D1 | Disk |
| D2 | Disk |
| S1 | Semaphore |
| S2 | Semaphore |
| P1 | Procedure |
| Disk | TYPE |
| Semaphore | TYPE |
| Procedure | TYPE |
| TYPE | TYPE |
|
Types: Built-in types or user defined types |
|||||||||||||||||||||||||||||||||||||||||||||||
|
Type creation: through the CREATE access to TYPE object |
|||||||||||||||||||||||||||||||||||||||||||||||
|
Execution environment
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
In the context of extended capability, protection mechanism should be defined in terms of
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
Access control enforcement
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
Capability transfer (manipulation) operations
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
Environment(= LNS) boundary crossing operations
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
Template creation and specification of amplifyrights field should be controlled!
|
|
Policy-1
|
|||||||||||||||||||||||||||||||||||||
|
Implementation-1
|
|
Pros
|
|||||||||
|
Cons
|