Minimizing the Naming Facilities Requiring Protection in a Computing Utility
This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur...
Main Author: | |
---|---|
Other Authors: | |
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149450 |
_version_ | 1826200144835510272 |
---|---|
author | Bratt, Richard Glenn |
author2 | Schroeder, Michael D. |
author_facet | Schroeder, Michael D. Bratt, Richard Glenn |
author_sort | Bratt, Richard Glenn |
collection | MIT |
description | This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility. |
first_indexed | 2024-09-23T11:31:52Z |
id | mit-1721.1/149450 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T11:31:52Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1494502023-03-30T03:52:06Z Minimizing the Naming Facilities Requiring Protection in a Computing Utility Bratt, Richard Glenn Schroeder, Michael D. This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility. 2023-03-29T14:59:42Z 2023-03-29T14:59:42Z 1975-09 https://hdl.handle.net/1721.1/149450 02170867 MIT-LCS-TR-156 MAC-TR-156 application/pdf |
spellingShingle | Bratt, Richard Glenn Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title | Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title_full | Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title_fullStr | Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title_full_unstemmed | Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title_short | Minimizing the Naming Facilities Requiring Protection in a Computing Utility |
title_sort | minimizing the naming facilities requiring protection in a computing utility |
url | https://hdl.handle.net/1721.1/149450 |
work_keys_str_mv | AT brattrichardglenn minimizingthenamingfacilitiesrequiringprotectioninacomputingutility |