firewall antedatings (UNCLASSIFIED)

Mullins, Bill AMRDEC Bill.Mullins at US.ARMY.MIL
Wed Apr 23 21:07:25 UTC 2008


Classification:  UNCLASSIFIED
Caveats: NONE

My bad.  I didn't realize that Project MAC would identify the OS. I don'
know nuthin bout birthin no computers.

> -----Original Message-----
> From: American Dialect Society
> [mailto:ADS-L at LISTSERV.UGA.EDU] On Behalf Of Joel S. Berson
> Sent: Wednesday, April 23, 2008 12:23 PM
> To: ADS-L at LISTSERV.UGA.EDU
> Subject: Re: firewall antedatings
>
> ---------------------- Information from the mail header
> -----------------------
> Sender:       American Dialect Society <ADS-L at LISTSERV.UGA.EDU>
> Poster:       "Joel S. Berson" <Berson at ATT.NET>
> Subject:      Re: firewall antedatings
> --------------------------------------------------------------
> -----------------
>
> At 4/23/2008 01:11 PM, Mullins, Bill AMRDEC wrote:
> >Classification:  UNCLASSIFIED
> >Caveats: NONE
> >
> >Not really.  Here is the relevant section of the article:
>
> Well, yes it does (identify the operating system).  I thought
> so.  Project MAC developed the Multics operating system --
> many concepts far in advance of its time, including how to
> prevent people from walking off with CDs of classified or
> private, personal information, or from downloading such
> information to their home computers.  I have some of its
> technical reports, which I have been hoping for some time to
> go through for antedatings of computer terms.  When
> higher-priority requirements and more interesting desires permit.
>
> Joel
>
>
> >*************Quote starts**************
> >
> >
> >A Hardware Model for Protection
> >Leo J. Rotenberg from Project MAC, MIT, presented his
> conceptual model
> >for secure operating system hardware.
> >The model was based on separated domains and capabilities with
> >processes executing within these domains. Processes are made up of
> >programs which are implemented in program segments and descriptor
> >segments. Programs act upon data segments. Cross domain calls are
> >all'owed but must be carefully controlled by proper passing of
> >arguments in both directions. This implementation is to be done with
> >hardware stacks and binding registers, active domain tables found in
> >associative memory, memory erasing hardware, and virtual memory
> >controlling hardware. The operating system would be embedded in one
> >domain called the fir'ewall domain containing the active'
> domain table
> >and descriptor segments for all processes in the system. Its
> function
> >would be to control the protection mechanism of the system. This
> >includes authorizing capabilities, controlling, cross-domain calls,
> >memory management, and process control. New hardware would
> be utilized
> >for these functions.
> >Discussion of this model included passing of large data argumints by
> >creating new sharable data segments for the arguments and
> then passing
> >capabilities for them in the stack. The need for certifying all
> >prog'rams running within the firewall domain was noted. The need for
> >effective and efficient implementation of a protection model even
> >within an effective hardware protection system was discussed.
> >
> >
> >*********Quote ends*************
> >
> > > -----Original Message-----
> > > From: American Dialect Society
> > > [mailto:ADS-L at LISTSERV.UGA.EDU] On Behalf Of Joel S. Berson
> > > Sent: Wednesday, April 23, 2008 12:03 PM
> > > To: ADS-L at LISTSERV.UGA.EDU
> > > Subject: Re: stealth and firewall antedatings (UNCLASSIFIED)
> > >
> > > ---------------------- Information from the mail header
> > > -----------------------
> > > Sender:       American Dialect Society <ADS-L at LISTSERV.UGA.EDU>
> > > Poster:       "Joel S. Berson" <Berson at ATT.NET>
> > > Subject:      Re: stealth and firewall antedatings (UNCLASSIFIED)
> > > --------------------------------------------------------------
> > > -----------------
> > >
> > > Bill, is this description about a particular operating
> system, and
> > > if so which one?
> > >
> > > Joel
> > >
> > > At 4/23/2008 12:32 PM, Mullins, Bill AMRDEC wrote:
> > > >Firewall (OED has 1974)
> > > >
> > > >Branstan, D.K.; "Privacy and Protection in Operating Systems"
> > > >_Computer_ Volume 6,  Issue 1,  Jan. 1973 p. 46 col 1.
> > > >"The operating system would be embedded in one domain called the
> > > >firewall domain containing the active domain table and
> descriptor
> > > >segments for all processes in the system."
> > >
> > > ------------------------------------------------------------
> > > The American Dialect Society - http://www.americandialect.org
> > >
> > >
> >Classification:  UNCLASSIFIED
> >Caveats: NONE
> >
> >------------------------------------------------------------
> >The American Dialect Society - http://www.americandialect.org
>
> ------------------------------------------------------------
> The American Dialect Society - http://www.americandialect.org
>
>
Classification:  UNCLASSIFIED
Caveats: NONE

------------------------------------------------------------
The American Dialect Society - http://www.americandialect.org



More information about the Ads-l mailing list