1
کامپیوتر و شبکه::
کرنل امنیت
CHAP TER 6 Security Kernels While the Multics project was winding down in the mid-1970s, a number of vendors and researchers gained confidence that a secure operating system could be constructed and that there was a market for such an operating system, within the US government anyway.
, the security kernel).
In this chapter, we examine two of these systems, Scomp and GEMSOS, to demonstrate the design and implementation decisions behind the development of security kernels.
These two systems represent two different implementation platforms for building a security kernel: Scomp uses custom hardware designed for security enforcement, whereas GEMSOS was limited to existing, commercially-popular hardware (i.e.
6.1 THE SECURITY KERNEL
واژگان شبکه مترجمین ایران