firewall antedatings

Joel S. Berson Berson at ATT.NET
Wed Apr 23 17:23:12 UTC 2008

At 4/23/2008 01:11 PM, Mullins, Bill AMRDEC wrote:
>Classification:  UNCLASSIFIED
>Caveats: NONE
>Not really.  Here is the relevant section of the article:

Well, yes it does (identify the operating system).  I thought
so.  Project MAC developed the Multics operating system -- many
concepts far in advance of its time, including how to prevent people
from walking off with CDs of classified or private, personal
information, or from downloading such information to their home
computers.  I have some of its technical reports, which I have been
hoping for some time to go through for antedatings of computer
terms.  When higher-priority requirements and more interesting desires permit.


>*************Quote starts**************
>A Hardware Model for Protection
>Leo J. Rotenberg from Project MAC, MIT, presented his
>conceptual model for secure operating system hardware.
>The model was based on separated domains and capabilities
>with processes executing within these domains. Processes
>are made up of programs which are implemented in
>program segments and descriptor segments. Programs act
>upon data segments. Cross domain calls are all'owed but
>must be carefully controlled by proper passing of arguments
>in both directions. This implementation is to be done
>with hardware stacks and binding registers, active domain
>tables found in associative memory, memory erasing hardware,
>and virtual memory controlling hardware. The operating
>system would be embedded in one domain called the
>fir'ewall domain containing the active' domain table and
>descriptor segments for all processes in the system. Its
>function would be to control the protection mechanism of
>the system. This includes authorizing capabilities, controlling,
>cross-domain calls, memory management, and process
>control. New hardware would be utilized for these
>Discussion of this model included passing of large data
>argumints by creating new sharable data segments for the
>arguments and then passing capabilities for them in the
>stack. The need for certifying all prog'rams running within
>the firewall domain was noted. The need for effective and
>efficient implementation of a protection model even within
>an effective hardware protection system was discussed.
>*********Quote ends*************
> > -----Original Message-----
> > From: American Dialect Society
> > [mailto:ADS-L at LISTSERV.UGA.EDU] On Behalf Of Joel S. Berson
> > Sent: Wednesday, April 23, 2008 12:03 PM
> > Subject: Re: stealth and firewall antedatings (UNCLASSIFIED)
> >
> > ---------------------- Information from the mail header
> > -----------------------
> > Sender:       American Dialect Society <ADS-L at LISTSERV.UGA.EDU>
> > Poster:       "Joel S. Berson" <Berson at ATT.NET>
> > Subject:      Re: stealth and firewall antedatings (UNCLASSIFIED)
> > --------------------------------------------------------------
> > -----------------
> >
> > Bill, is this description about a particular operating
> > system, and if so which one?
> >
> > Joel
> >
> > At 4/23/2008 12:32 PM, Mullins, Bill AMRDEC wrote:
> > >Firewall (OED has 1974)
> > >
> > >Branstan, D.K.; "Privacy and Protection in Operating Systems"
> > >_Computer_ Volume 6,  Issue 1,  Jan. 1973 p. 46 col 1.
> > >"The operating system would be embedded in one domain called the
> > >firewall domain containing the active domain table and descriptor
> > >segments for all processes in the system."
> >
> > ------------------------------------------------------------
> > The American Dialect Society -
> >
> >
>Classification:  UNCLASSIFIED
>Caveats: NONE
>The American Dialect Society -

The American Dialect Society -

More information about the Ads-l mailing list