메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 119-126

Thirty years later: Lessons from the Multics security evaluation

Author keywords

Application software; Communication standards; Communication system security; Computer security; Data security; Grid computing; Internet; Microcomputers; Operating systems; Protection

Indexed keywords

APPLICATION PROGRAMS; GRID COMPUTING; INTERNET; INTRUSION DETECTION; MALWARE; MICROCOMPUTERS; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84948969398     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2002.1176285     Document Type: Conference Paper
Times cited : (41)

References (46)
  • 1
    • 84949043130 scopus 로고    scopus 로고
    • Broward officials want students to try hacking mock election
    • 16 August: Ft. Lauderdale, FL
    • Broward Officials Want Students to Try Hacking Mock Election, in Assoc. Press 16 August 2001: Ft. Lauderdale, FL. URL: http://www.wtsp.com/news/2001-08/16-mock-election.htm
    • (2001) Assoc. Press
  • 3
    • 84948983514 scopus 로고
    • CSC-EPL-85/003 (releasable only to US Government and their contractors), 1 September, National Computer Security Center: Ft. George G. Meade, MD
    • Final Evaluation Report of Multics, MR11.0, CSC-EPL-85/003 (releasable only to US Government and their contractors), 1 September 1985, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/fers/tcsec-fers.html
    • (1985) Final Evaluation Report of Multics, MR11 0
  • 6
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • 8 November
    • Aleph One, Smashing the Stack for Fun and Profit. Phrack, 8 November 1996. 7(49). URL: http://www.phrack.org/show.php?p=49&a=14
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 7
    • 84867290201 scopus 로고
    • Waiting for the great computer rip-off
    • Alexander, T., Waiting for the Great Computer Rip-off. Fortune, 1974. XC(1): p. 142-150
    • (1974) Fortune , vol.40 , Issue.1 , pp. 142-150
    • Alexander, T.1
  • 9
    • 0025443276 scopus 로고
    • Compartmented mode workstation: Prototype highlights
    • June
    • Berger, J.L., J. Picciotto, et al., Compartmented Mode Workstation: Prototype Highlights. IEEE Transactions on Software Engineering, June 1990. 16(6): p. 608-618
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 608-618
    • Berger, J.L.1    Picciotto, J.2
  • 11
    • 84941520546 scopus 로고
    • SE/VMS: Implementing mandatory security in VAX/VMS
    • 15-18 September, Gaithersburg, MD National Bureau of Standards
    • Blotcky, S., K. Lynch, et al. SE/VMS: Implementing Mandatory Security in VAX/VMS. in Proceedings of the 9th National Computer Security Conference. 15-18 September 1986, Gaithersburg, MD National Bureau of Standards. p. 47-54
    • (1986) Proceedings of the 9th National Computer Security Conference , pp. 47-54
    • Blotcky, S.1    Lynch, K.2
  • 12
    • 0034502932 scopus 로고    scopus 로고
    • A national-scale authentication infrastructure
    • December
    • Butler, R., V. Welch, et al., A National-Scale Authentication Infrastructure. Computer, December 2000. 33(12): p. 60-66
    • (2000) Computer , vol.33 , Issue.12 , pp. 60-66
    • Butler, R.1    Welch, V.2
  • 13
    • 84948975437 scopus 로고    scopus 로고
    • The hot hand in the ASP game
    • 15 January
    • Carr, D.F., The Hot Hand in the ASP Game. Internet World, 15 January 2000. 6(2): p. 53. URL: http://www.internetworld.com/magazine.php?inc=011500/1.15c over-story.html
    • (2000) Internet World , vol.6 , Issue.2 , pp. 53
    • Carr, D.F.1
  • 14
    • 84949043131 scopus 로고    scopus 로고
    • Who says paranoia doesn't pay off?
    • 20 September
    • Cooper, C., Who says paranoia doesn't pay off? CNET News.com, 20 September 2002. URL: http://news.com.com/2010-1071-958721.html
    • (2002) CNET News.com
    • Cooper, C.1
  • 15
    • 84890034254 scopus 로고
    • PL/I As a tool for system programming
    • May
    • Corbató, F.J., PL/I As a Tool for System Programming. Datamation, May 1969. 15(5): p. 68-76. URL: http://home.nycap.rr.com/pflass/plisprg.htm
    • (1969) Datamation , vol.15 , Issue.5 , pp. 68-76
    • Corbató, F.J.1
  • 16
    • 85060818077 scopus 로고
    • Introduction and overview of the multics system
    • Washington, DC Vol. AFIPS Conference Proceedings Vol
    • Corbató, F.J. and V.A. Vyssotsky. Introduction and Overview of the Multics System. in Fall Joint Computer Conference. 1965, Washington, DC Vol. AFIPS Conference Proceedings Vol
    • (1965) Fall Joint Computer Conference
    • Corbató, F.J.1    Vyssotsky, V.A.2
  • 17
    • 84949043132 scopus 로고    scopus 로고
    • Spartan Books. p. 185-196. URL: http://www.multicians.org/fjcc1.html
    • Spartan Books , pp. 185-196
  • 18
    • 0002582136 scopus 로고    scopus 로고
    • Buffer overflows: Attacks and defenses for the vulnerability of the decade
    • 25-27 January, Hilton Head Island, SC
    • Cowan, C., P. Wagle, et al. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. in DARPA Information Survivability Conference and Expo (DISCEX). 25-27 January 2000, Hilton Head Island, SC Vol. 2. p. 119-129. URL: http://www.immunix.org/StackGuard/discex00.pdf
    • (2000) DARPA Information Survivability Conference and Expo (DISCEX) , vol.2 , pp. 119-129
    • Cowan, C.1    Wagle, P.2
  • 19
    • 85034991363 scopus 로고
    • Some thoughts about the social implications of accessible computing
    • Washington, DC Vol. AFIPS Conference Proceedings, Spartan Books
    • David, E.E., Jr. and R.M. Fano. Some Thoughts About the Social Implications of Accessible Computing. in Fall Joint Computer Conference. 1965, Washington, DC Vol. AFIPS Conference Proceedings Vol. 27 Spartan Books. p. 243-247. URL: http://www.multicians.org/fjcc6.html
    • (1965) Fall Joint Computer Conference , vol.27 , pp. 243-247
    • David, E.E.1    Fano, R.M.2
  • 20
    • 84862450041 scopus 로고    scopus 로고
    • CERT® Advisory CA-2002-24, 2 August, CERT Coordination Center, Carnegie Mellon University: Pittsburgh, PA
    • Dougherty, C., Trojan Horse OpenSSH Distribution, CERT® Advisory CA-2002-24, 2 August 2002, CERT Coordination Center, Carnegie Mellon University: Pittsburgh, PA. URL: http://www.cert.org/advisories/CA-2002-24.html
    • (2002) Trojan Horse OpenSSH Distribution
    • Dougherty, C.1
  • 21
    • 84948966549 scopus 로고
    • Patterns of security violations: Multiple references to arguments
    • D.D. Clark, Editor, June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
    • Forsdick, H.C. and D.P. Reed, Patterns of Security Violations: Multiple References to Arguments, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 34-49
    • (1977) Ancillary Reports: Kernel Design Project , pp. 34-49
    • Forsdick, H.C.1    Reed, D.P.2
  • 23
    • 84948955225 scopus 로고    scopus 로고
    • 30 July, IBM Corp., T. J. Watson Research Center: Hawthorne, NY
    • Jaeger, T., Personal Communication, 30 July 2002, IBM Corp., T. J. Watson Research Center: Hawthorne, NY
    • (2002) Personal Communication
    • Jaeger, T.1
  • 24
    • 3943093761 scopus 로고
    • June, Program on Information Resources Policy, Harvard University: Cambridge, MA. URL
    • Jelen, G.F., Information Security: An Elusive Goal, P-85-8, June 1985, Program on Information Resources Policy, Harvard University: Cambridge, MA. URL: http://www.pirp.harvard.edu/publications/pdf-blurb.asp?id=238
    • (1985) Information Security: An Elusive Goal , pp. 85-88
    • Jelen, G.F.1
  • 25
    • 84949043133 scopus 로고
    • ESD-TR-74-193. June, HQ Electronic Systems Division: Hanscom AFB, MA
    • Karger, P.A. and R.R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, June 1974, HQ Electronic Systems Division: Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/karg74.pdf
    • (1974) Multics Security Evaluation: Vulnerability Analysis , vol.2
    • Karger, P.A.1    Schell, R.R.2
  • 26
    • 0026254933 scopus 로고
    • A retrospective on the VAX VMM security kernel
    • November
    • Karger, P.A., M.E. Zurko, et al., A Retrospective on the VAX VMM Security Kernel. IEEE Transactions on Software Engineering, November 1991. 17(11): p. 1147-1165
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.11 , pp. 1147-1165
    • Karger, P.A.1    Zurko, M.E.2
  • 27
    • 84911522531 scopus 로고
    • Computer Science Press: Potomoc, MD, 185
    • Logsdon, T., Computers & Social Controversy, 1980, Computer Science Press: Potomoc, MD. p. 170-175, 185
    • (1980) Computers & Social Controversy , pp. 170-175
    • Logsdon, T.1
  • 29
    • 84948970972 scopus 로고
    • Repaired security bugs in multics
    • D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
    • Saltzer, J.H., Repaired Security Bugs in Multics, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 1-4
    • (1977) Ancillary Reports: Kernel Design Project , pp. 1-4
    • Saltzer, J.H.1
  • 30
    • 84948977630 scopus 로고
    • Some recently repaired security holes of multics
    • D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
    • Saltzer, J.H. and D. Hunt, Some Recently Repaired Security Holes of Multics, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 28-33
    • (1977) Ancillary Reports: Kernel Design Project , pp. 28-33
    • Saltzer, J.H.1    Hunt, D.2
  • 31
    • 84948979994 scopus 로고
    • Some multics security holes which were closed by 6180 hardware
    • D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
    • Saltzer, J.H., P. Jansen, et al., Some Multics Security Holes Which Were Closed by 6180 Hardware, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 22-27
    • (1977) Ancillary Reports: Kernel Design Project , pp. 22-27
    • Saltzer, J.H.1    Jansen, P.2
  • 32
    • 3943108716 scopus 로고
    • Computer security: The achilles' heel of the electronic air force?
    • January-February
    • Schell, R.R. Computer security: the Achilles' heel of the electronic Air Force? in Air University Review. January-February 1979, Vol. 30 p. 16-33. URL: http://www.airpower.maxwell.af.mil/airchronicles/aureview/197 9/jan-feb/schell.html
    • (1979) Air University Review , vol.30 , pp. 16-33
    • Schell, R.R.1
  • 33
    • 0011319414 scopus 로고
    • Designing the GEMSOS security kernel for security and performance
    • 30 September-3 October, Gaithersburg, MD DoD Computer Security Center and National Bureau of Standards
    • Schell, R.R., T.F. Tao, et al. Designing the GEMSOS Security Kernel for Security and Performance. in Proceedings of the 8th National Computer Security Conference. 30 September-3 October 1985, Gaithersburg, MD DoD Computer Security Center and National Bureau of Standards. p. 108-119
    • (1985) Proceedings of the 8th National Computer Security Conference , pp. 108-119
    • Schell, R.R.1    Tao, T.F.2
  • 37
    • 84948966649 scopus 로고    scopus 로고
    • New software quietly diverts sales commissions
    • 27 September
    • Schwartz, J. and B. Tedeschi, New Software Quietly Diverts Sales Commissions. The New York Times, 27 September 2002: p. C1-C4. URL: http://www.nytimes.com/2002/09/27/technology/27FREE.html
    • (2002) The New York Times , pp. C1-C4
    • Schwartz, J.1    Tedeschi, B.2
  • 38
    • 33748161983 scopus 로고    scopus 로고
    • NAI Labs Report #02-007, June, NAI Labs: Glenwood, MD
    • Smalley, S., Configuring the SELinux Policy, NAI Labs Report #02-007, June 2002, NAI Labs: Glenwood, MD. URL: http://www.nsa.gov/selinux/policy2-abs.html
    • (2002) Configuring the SELinux Policy
    • Smalley, S.1
  • 39
    • 84949043135 scopus 로고
    • ESD-TR-76-368, November, Honeywell Information Sys-tems, Inc., McLean, VA, HQ Electronic Systems Division: Hanscom AFB, MA
    • Stern, J., Multics Security Kernel Top Level Specification, ESD-TR-76-368, November 1976, Honeywell Information Sys-tems, Inc., McLean, VA, HQ Electronic Systems Division: Hanscom AFB, MA
    • (1976) Multics Security Kernel Top Level Specification
    • Stern, J.1
  • 40
    • 33846334286 scopus 로고
    • On trusting trust
    • November
    • Thompson, K., On Trusting Trust. Unix Review, November 1989. 7(11): p. 70-74
    • (1989) Unix Review , vol.7 , Issue.11 , pp. 70-74
    • Thompson, K.1
  • 41
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • August
    • Thompson, K., Reflections on Trusting Trust. Communications of the ACM, August 1984. 27(8): p. 761-763
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 42
    • 84948967042 scopus 로고
    • A census of ring 0
    • D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
    • Voydock, V.L., A Census of Ring 0, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 5-27
    • (1977) Ancillary Reports: Kernel Design Project , pp. 5-27
    • Voydock, V.L.1
  • 44
    • 84948984900 scopus 로고
    • Trapdoors and trojan horses
    • Thomas Y. Crowell Co.: New York
    • Whiteside, T., Trapdoors and Trojan Horses, in Computer Capers. 1978, Thomas Y. Crowell Co.: New York. p. 115-126
    • (1978) Computer Capers , pp. 115-126
    • Whiteside, T.1
  • 45
    • 77952249782 scopus 로고
    • ESD-TR-74-176, December, Honeywell Information Systems, Inc., HQ Electronic Systems Division: Hanscom AFB, MA
    • Whitmore, J., A. Bensoussan, et al., Design for Multics Security Enhancements, ESD-TR-74-176, December 1973, Honeywell Information Systems, Inc., HQ Electronic Systems Division: Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/whit74.pdf
    • (1973) Design for Multics Security Enhancements
    • Whitmore, J.1    Bensoussan, A.2
  • 46
    • 84949043136 scopus 로고    scopus 로고
    • T.H. Van Vleck, Editor. 20 October
    • Zemmin, F., B. Henk, et al., Multics Site History: GM, T.H. Van Vleck, Editor, 20 October 1998. URL: http://www.multicians.org/site-gm.html
    • (1998) Multics Site History: GM
    • Zemmin, F.1    Henk, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.