dc.contributor.author | Zeldovich, Nickolai | |
dc.contributor.author | Boyd-Wickizer, Silas | |
dc.contributor.author | Kohler, Eddie | |
dc.contributor.author | Mazieres, David | |
dc.date.accessioned | 2012-10-09T13:57:34Z | |
dc.date.available | 2012-10-09T13:57:34Z | |
dc.date.issued | 2011-11 | |
dc.identifier.issn | 0001-0782 | |
dc.identifier.issn | 1557-7317 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/73665 | |
dc.description.abstract | HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify precise data security policies without unduly limiting the structure of applications. HiStar's security features make it possible to implement a Unix-like environment with acceptable performance almost entirely in an untrusted user-level library. The system has no notion of superuser and no fully trusted code other than the kernel. HiStar's features permit several novel applications, including privacy-preserving, untrusted virus scanners and a dynamic Web server with only a few thousand lines of trusted code. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Cybertrust Award CNS-0716806) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Cybertrust/DARPA Grant CNS-0430425) | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/2018396.2018419 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | Other University Web Domain | en_US |
dc.title | Making information flow explicit in HiStar | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazières. 2011. Making information flow explicit in HiStar. Commun. ACM 54, 11 (November 2011), 93-101. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Zeldovich, Nickolai | |
dc.contributor.mitauthor | Boyd-Wickizer, Silas | |
dc.contributor.mitauthor | Mazieres, David | |
dc.relation.journal | Communications of the ACM | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Zeldovich, Nickolai; Boyd-Wickizer, Silas; Kohler, Eddie; Mazières, David | en |
dc.identifier.orcid | https://orcid.org/0000-0003-0238-2703 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |