Minimizing the Naming Facilities Requiring Protection in a Computing Utility

This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur...

Full description

Bibliographic Details
Main Author: Bratt, Richard Glenn
Other Authors: Schroeder, Michael D.
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149450
_version_ 1811080450134769664
author Bratt, Richard Glenn
author2 Schroeder, Michael D.
author_facet Schroeder, Michael D.
Bratt, Richard Glenn
author_sort Bratt, Richard Glenn
collection MIT
description This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility.
first_indexed 2024-09-23T11:31:52Z
id mit-1721.1/149450
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T11:31:52Z
publishDate 2023
record_format dspace
spelling mit-1721.1/1494502023-03-30T03:52:06Z Minimizing the Naming Facilities Requiring Protection in a Computing Utility Bratt, Richard Glenn Schroeder, Michael D. This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility. 2023-03-29T14:59:42Z 2023-03-29T14:59:42Z 1975-09 https://hdl.handle.net/1721.1/149450 02170867 MIT-LCS-TR-156 MAC-TR-156 application/pdf
spellingShingle Bratt, Richard Glenn
Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title_full Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title_fullStr Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title_full_unstemmed Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title_short Minimizing the Naming Facilities Requiring Protection in a Computing Utility
title_sort minimizing the naming facilities requiring protection in a computing utility
url https://hdl.handle.net/1721.1/149450
work_keys_str_mv AT brattrichardglenn minimizingthenamingfacilitiesrequiringprotectioninacomputingutility