[
Home
] [
Tech Library
]
Introduction to KeyKOS Concepts
(KL004-07) Page i
Table of Contents
Introduction
Chapter 1. Introduction to KeyKOS
General Description
Design Objectives
Problems of Existing Architectures
Layered Computing Systems
Protection Between Layers, But Not Within
Authority
Policy
Summary
Chapter 2. KeyKOS Architecture
Objects
Keys
The KeyKOS Trusted Computer Base
Unique Features of KeyKOS
Compatibility with Existing Systems
Chapter 3. Application Development in KeyKOS
The Shape of A Domain
Establishing Connections Between Domains
How Objects Work Together
Chapter 4. Security in KeyKOS
The Trojan Horse Problem
Protecting Proprietary Programs
Protected Entry Points
Mutually Suspicious Users
Trusting Programs and Operators
Auditors
Military Multi-level Security Problem (1)
Military Multi-level Secure Problem (2)
Denial of Resources
Chapter 5. Productivity in KeyKOS
Debugging
Preventing Unintentional Interactions
Reliability Amidst Change
Enforcing Structured Programming Technologies
Distributed Processing
Chapter 6. Performance in KeyKOS
High Performance On-line Transaction Processing
Efficient Management of Disk I/Os
Short Instruction Paths
Overview of KeyKOS Performance Features