Protection Analysis: Final Report
The Protection Analysis project was initiated at ISI by ARPA IPTO to further understand operating system security vulnerabilities and, where possible, identify automatable techniques for detecting such vulnerabilities in existing system software. The primary goal of the project was to make protectio...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BisbeyII , Richard Hollingworth, Dennis |
description | The Protection Analysis project was initiated at ISI by ARPA IPTO to further understand operating system security vulnerabilities and, where possible, identify automatable techniques for detecting such vulnerabilities in existing system software. The primary goal of the project was to make protection evaluation both more effective and more economical by decomposing it into more manageable and methodical subtasks so as to drastically reduce the requirement for protection expertise and make it as independent as possible of the skills and motivation of the actual individuals involved. The project focused on near-term solutions to the problem of improving the security of existing and future operating systems in an attempt to have some impact on the security of the systems which would be in use over the next ten years. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA056816</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA056816</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA0568163</originalsourceid><addsrcrecordid>eNrjZFAMKMovSU0uyczPU3DMS8ypLM4stlJwywQyFYJSC_KLSngYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujgamZhaGZMQFpAAFhIqM</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Protection Analysis: Final Report</title><source>DTIC Technical Reports</source><creator>BisbeyII , Richard ; Hollingworth, Dennis</creator><creatorcontrib>BisbeyII , Richard ; Hollingworth, Dennis ; UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION SCIENCES INST</creatorcontrib><description>The Protection Analysis project was initiated at ISI by ARPA IPTO to further understand operating system security vulnerabilities and, where possible, identify automatable techniques for detecting such vulnerabilities in existing system software. The primary goal of the project was to make protection evaluation both more effective and more economical by decomposing it into more manageable and methodical subtasks so as to drastically reduce the requirement for protection expertise and make it as independent as possible of the skills and motivation of the actual individuals involved. The project focused on near-term solutions to the problem of improving the security of existing and future operating systems in an attempt to have some impact on the security of the systems which would be in use over the next ten years.</description><language>eng</language><subject>ACCESS ; COMPUTER COMMUNICATIONS ; Computer Hardware ; Computer Systems ; CONTROL ; DATA PROCESSING SECURITY ; ERROR ANALYSIS ; MULTIPROCESSORS ; Non-radio Communications ; PROTECTION ; SECURE COMMUNICATIONS ; SYSTEMS MANAGEMENT ; TIME SHARING ; VULNERABILITY</subject><creationdate>1978</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA056816$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BisbeyII , Richard</creatorcontrib><creatorcontrib>Hollingworth, Dennis</creatorcontrib><creatorcontrib>UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION SCIENCES INST</creatorcontrib><title>Protection Analysis: Final Report</title><description>The Protection Analysis project was initiated at ISI by ARPA IPTO to further understand operating system security vulnerabilities and, where possible, identify automatable techniques for detecting such vulnerabilities in existing system software. The primary goal of the project was to make protection evaluation both more effective and more economical by decomposing it into more manageable and methodical subtasks so as to drastically reduce the requirement for protection expertise and make it as independent as possible of the skills and motivation of the actual individuals involved. The project focused on near-term solutions to the problem of improving the security of existing and future operating systems in an attempt to have some impact on the security of the systems which would be in use over the next ten years.</description><subject>ACCESS</subject><subject>COMPUTER COMMUNICATIONS</subject><subject>Computer Hardware</subject><subject>Computer Systems</subject><subject>CONTROL</subject><subject>DATA PROCESSING SECURITY</subject><subject>ERROR ANALYSIS</subject><subject>MULTIPROCESSORS</subject><subject>Non-radio Communications</subject><subject>PROTECTION</subject><subject>SECURE COMMUNICATIONS</subject><subject>SYSTEMS MANAGEMENT</subject><subject>TIME SHARING</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1978</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZFAMKMovSU0uyczPU3DMS8ypLM4stlJwywQyFYJSC_KLSngYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujgamZhaGZMQFpAAFhIqM</recordid><startdate>197805</startdate><enddate>197805</enddate><creator>BisbeyII , Richard</creator><creator>Hollingworth, Dennis</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>197805</creationdate><title>Protection Analysis: Final Report</title><author>BisbeyII , Richard ; Hollingworth, Dennis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA0568163</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1978</creationdate><topic>ACCESS</topic><topic>COMPUTER COMMUNICATIONS</topic><topic>Computer Hardware</topic><topic>Computer Systems</topic><topic>CONTROL</topic><topic>DATA PROCESSING SECURITY</topic><topic>ERROR ANALYSIS</topic><topic>MULTIPROCESSORS</topic><topic>Non-radio Communications</topic><topic>PROTECTION</topic><topic>SECURE COMMUNICATIONS</topic><topic>SYSTEMS MANAGEMENT</topic><topic>TIME SHARING</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>BisbeyII , Richard</creatorcontrib><creatorcontrib>Hollingworth, Dennis</creatorcontrib><creatorcontrib>UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION SCIENCES INST</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BisbeyII , Richard</au><au>Hollingworth, Dennis</au><aucorp>UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION SCIENCES INST</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Protection Analysis: Final Report</btitle><date>1978-05</date><risdate>1978</risdate><abstract>The Protection Analysis project was initiated at ISI by ARPA IPTO to further understand operating system security vulnerabilities and, where possible, identify automatable techniques for detecting such vulnerabilities in existing system software. The primary goal of the project was to make protection evaluation both more effective and more economical by decomposing it into more manageable and methodical subtasks so as to drastically reduce the requirement for protection expertise and make it as independent as possible of the skills and motivation of the actual individuals involved. The project focused on near-term solutions to the problem of improving the security of existing and future operating systems in an attempt to have some impact on the security of the systems which would be in use over the next ten years.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA056816 |
source | DTIC Technical Reports |
subjects | ACCESS COMPUTER COMMUNICATIONS Computer Hardware Computer Systems CONTROL DATA PROCESSING SECURITY ERROR ANALYSIS MULTIPROCESSORS Non-radio Communications PROTECTION SECURE COMMUNICATIONS SYSTEMS MANAGEMENT TIME SHARING VULNERABILITY |
title | Protection Analysis: Final Report |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T06%3A26%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Protection%20Analysis:%20Final%20Report&rft.au=BisbeyII%20,%20Richard&rft.aucorp=UNIVERSITY%20OF%20SOUTHERN%20CALIFORNIA%20MARINA%20DEL%20REY%20INFORMATION%20SCIENCES%20INST&rft.date=1978-05&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA056816%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |