stealth and firewall antedatings (UNCLASSIFIED)

Mullins, Bill AMRDEC Bill.Mullins at US.ARMY.MIL
Wed Apr 23 17:11:38 UTC 2008


Classification:  UNCLASSIFIED
Caveats: NONE

Not really.  Here is the relevant section of the article:

*************Quote starts**************


A Hardware Model for Protection
Leo J. Rotenberg from Project MAC, MIT, presented his
conceptual model for secure operating system hardware.
The model was based on separated domains and capabilities
with processes executing within these domains. Processes
are made up of programs which are implemented in
program segments and descriptor segments. Programs act
upon data segments. Cross domain calls are all'owed but
must be carefully controlled by proper passing of arguments
in both directions. This implementation is to be done
with hardware stacks and binding registers, active domain
tables found in associative memory, memory erasing hardware,
and virtual memory controlling hardware. The operating
system would be embedded in one domain called the
fir'ewall domain containing the active' domain table and
descriptor segments for all processes in the system. Its
function would be to control the protection mechanism of
the system. This includes authorizing capabilities, controlling,
cross-domain calls, memory management, and process
control. New hardware would be utilized for these
functions.
Discussion of this model included passing of large data
argumints by creating new sharable data segments for the
arguments and then passing capabilities for them in the
stack. The need for certifying all prog'rams running within
the firewall domain was noted. The need for effective and
efficient implementation of a protection model even within
an effective hardware protection system was discussed.


*********Quote ends*************

> -----Original Message-----
> From: American Dialect Society
> [mailto:ADS-L at LISTSERV.UGA.EDU] On Behalf Of Joel S. Berson
> Sent: Wednesday, April 23, 2008 12:03 PM
> To: ADS-L at LISTSERV.UGA.EDU
> Subject: Re: stealth and firewall antedatings (UNCLASSIFIED)
>
> ---------------------- Information from the mail header
> -----------------------
> Sender:       American Dialect Society <ADS-L at LISTSERV.UGA.EDU>
> Poster:       "Joel S. Berson" <Berson at ATT.NET>
> Subject:      Re: stealth and firewall antedatings (UNCLASSIFIED)
> --------------------------------------------------------------
> -----------------
>
> Bill, is this description about a particular operating
> system, and if so which one?
>
> Joel
>
> At 4/23/2008 12:32 PM, Mullins, Bill AMRDEC wrote:
> >Firewall (OED has 1974)
> >
> >Branstan, D.K.; "Privacy and Protection in Operating Systems"
> >_Computer_ Volume 6,  Issue 1,  Jan. 1973 p. 46 col 1.
> >"The operating system would be embedded in one domain called the
> >firewall domain containing the active domain table and descriptor
> >segments for all processes in the system."
>
> ------------------------------------------------------------
> The American Dialect Society - http://www.americandialect.org
>
>
Classification:  UNCLASSIFIED
Caveats: NONE

------------------------------------------------------------
The American Dialect Society - http://www.americandialect.org



More information about the Ads-l mailing list