Ramifications of Integrity {See (last) and (integ) also.}
{arcane}Notes on "Operating System Structures to Support Security and Reliable Software"
Designing, Describing and Implementing Security Policies
Secure Communications
We assume that the key is protected in the terminals by locking them up. For each terminal n we construct a domain Dn that executes DES and holds the same key as the terminal.
Transmission Control for Keys (The Guard)
Secret References to Unsecret Things
Other Security-related Parts of the Manual
See (revoke) about rescindable capabilities.
See (confine) about confinement and motivation for factories.
See (escrow) for some {possibly} more general ideas than factories.
See (p2,term-sec) about some terminal problems.