Check out the new USENIX Web site.
...platform.
This work was supported by Rome Laboratory contracts F30602-95-C-0047 and F30602-96-C-0210. Portions of the DTOS Overview found in Section 4 appeared in [SKTC96].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...flexibility.
Performance seemed to a natural criterion to include. Unfortunately, the performance data is incomplete. Despite this problem, the authors have chosen to include partial data although it is somewhat inconclusive.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...Enforcement
A thumbnail sketch of Type Enforcement describes it as a type of mandatory access control policy in which each object has a security attribute known as a type and each subject has an attribute known as a domain. Subjects are granted access to read, write, or execute objects based on the domain-type pair. Roles can be constructed for users by forming sets of domains in which users may have subjects operating.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Brian Loe
Tue Dec 9 09:16:53 CST 1997