- ...platform.
- This work was supported by Rome
Laboratory contracts F30602-95-C-0047 and F30602-96-C-0210.
Portions of the DTOS Overview found in Section 4
appeared in [SKTC96].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...flexibility.
- Performance seemed to a
natural criterion to include. Unfortunately, the performance data
is incomplete. Despite this problem, the authors have chosen to
include partial data although it is somewhat inconclusive.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...Enforcement
- A thumbnail
sketch of Type Enforcement describes it as a type of mandatory
access control policy in which each object has a security attribute
known as a type and each subject has an attribute known as a
domain. Subjects are granted access to read, write, or
execute objects based on the domain-type pair. Roles can be
constructed for users by forming sets of domains in which users may
have subjects operating.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.