Penetrating an operating system: a study of VM/370 integrity

IBM Systems Journal(1976)

引用 77|浏览0
暂无评分
摘要
The virtual machine architecture embodied in wm/370 greatly simplifies an operating system in most areas and hence increases the probability of correct implementation and resistance to penetration. The control program is not concerned with user files or multiple access methods. It simulates a machine with a fixed number of buttons and instructions that require interpretation. The choice of System/370 Principles of Operation as a user interface provides a well understood and well documented interface. The result is a system that is smaller and simpler, with fewer opportunities for error. The simplicity enhances the probability of obtaining security. The exception area is the support of input/output.
更多
查看译文
关键词
possible greater data security,penetration effort,relative design simplicity,operating system design flaw,greatest protection,particular version,system design technique,study team,operating system
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要