Cryptography – Cryptanalysis
Patent
1994-01-24
1996-04-02
Cangialosi, Salvatore
Cryptography
Cryptanalysis
380 25, H04L 900
Patent
active
055048145
ABSTRACT:
A computer security mechanism including an access control table specifying the predetermined access rights of each of a plurality of predetermined security subjects relative to predetermined security objects; a collection of mutually exclusive execution domains for each of the security subjects so that the executing processes of a security subject can only directly access code and data contained within the collection of domains of such security subject; a collection of mutually exclusive domains for a plurality of security object type managers, each of which is the sole owner of the right and ability to create and control access to security objects of a predetermined type, such that the only interaction between the execution environment of a security subject and the execution environment of another security subject is through operations on security objects performed through the services of the type managers; an object table for storing entries identifying the nature and location of security objects; and unforgeable access descriptors created by the security type managers by reference to the access control table for validation of access rights and utilized to allow access by security subjects to security objects via the object table, each access descriptor containing an index to the object table entry for the associated security object and identification of the access rights of the security subject with which the access descriptor is associated, whereby use of an access descriptor allows for efficient validation and mechanization of a requested access.
REFERENCES:
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4731734 (1988-03-01), Gruner et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 4993068 (1991-02-01), Pionsenka et al.
patent: 5018096 (1991-05-01), Aoyama
patent: 5029206 (1991-07-01), Marino, Jr. et al.
patent: 5057996 (1991-10-01), Cutler et al.
patent: 5113442 (1992-05-01), Moir
patent: 5276735 (1994-01-01), Boebert et al.
"Computer Security Technology Planning Study", J. P. Anderson, ESD-TR-73-51, vol. 1, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, Mass, Oct. 1972.
Building a Secure Computer System, M. Gasser, Van Nostrand Reinhold Company, New York 1988, pp. 26-37, 59, 107-108, and 201.
"Secure Computer Systems: Unified Exposition and Multics Interpretation", D. E. Bell et al., MTR-2997, The MITRE Corp. Bedford, MA, Mar. 1976.
"On the Inability of an Unmodified Capability Machine to Enforce the *-Property", W. E. Boebert, Proceedings of the Seventh DoD/NBS Computer Security Conference, Gaithersburg, MD 1984.
"The Role of `System Build` in Trusted Embedded Systems", J. P. Alstad, et al., Proceeding of the 13th National Computer Security Conference, Washington, D.C., Oct. 1990.
"Department of Defense Trusted Computer System Evaluation Criteria", DOD 5200.28.STD, Dec. 1985.
"i960 .TM. Programmer's Reference Manual", Intel Corporation, 1991.
Alkov Leonard A.
Cangialosi Salvatore
Denson-Low W. K.
Hughes Aircraft Company
LandOfFree
Efficient security kernel for the 80960 extended architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Efficient security kernel for the 80960 extended architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Efficient security kernel for the 80960 extended architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2022597