{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:47:38Z","timestamp":1763466458374},"reference-count":23,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":5203,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1992,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The original UNIX system was designed to be small and intelligible, achieving power by generality rather than by a profusion of features. In this spirit we have designed and implemented IX, a multilevel\u2010secure variant of the Bell Labs research system. IX aims at sound, practical security, suitable for private\u2010and public\u2010sector uses other than critical national\u2010security applications. The major security features are: private paths for safe cooperation among privileged processes, structured management of privilege, and security labels to classify information for purposes of privacy and integrity. The labels of flies and processes are checked at every system call that involves data flow and are adjusted dynamically to assure that labels on outputs reflect labels on inputs.<\/jats:p>","DOI":"10.1002\/spe.4380220805","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T20:02:41Z","timestamp":1163793761000},"page":"673-694","source":"Crossref","is-referenced-by-count":53,"title":["Multilevel security in the UNIX tradition"],"prefix":"10.1002","volume":"22","author":[{"given":"M. D.","family":"McIlroy","sequence":"first","affiliation":[]},{"given":"J. A.","family":"Reeds","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","first-page":"M74","volume-title":"Secure computer systems: mathematical foundations and model","author":"Bell D. E.","year":"1973"},{"key":"e_1_2_1_3_2","unstructured":"Department of Defense Computer Security Center.Department of Defense Trusted Computer System Evaluation Criteria. Fort George G. Meade. MD 20755 (15 August 1983)."},{"key":"e_1_2_1_4_2","unstructured":"M. D.McLlroyandJ. A.Reeds \u201cMultilevel security with fewer fetters \u201dProc. Spring I988 EUUG Conf. pp.117\u2013122 European UNIX Users Group. London (April 1988). Also Proc. UNIX Security Workshop. pp.24\u201331. Portland (August1988)."},{"key":"e_1_2_1_5_2","volume-title":"Design of IX, a multilevel secure UNIX system","author":"McLlroy M. D.","year":"1991"},{"key":"e_1_2_1_6_2","volume-title":"Cryptography and Distributed Computing","author":"Reeds J.","year":"1991"},{"key":"e_1_2_1_7_2","unstructured":"J. C.Harris. \u2018Brer Rabbit. Brer Fox and the Tar\u2010baby.\u2019 Atlanta Constitution (November 15 1879). Republished in many collections of Harris stories as \u201cThe wonderful Tar\u2010Baby story\u201d."},{"key":"e_1_2_1_8_2","unstructured":"D.Bendet J.Ferrigno G. B.Green M.Hondo E.Lund andC. A.Salemi \u2018Challenges of trust: enhanced security for UNIX System V \u2019Proceedings Winter Uniforum Conference(1989)."},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1988.tb00631.x"},{"key":"e_1_2_1_9_3","unstructured":"Also Winter 1989Usenix Technical Conference pp.53\u201364. San Diego (1989)."},{"key":"e_1_2_1_10_2","volume-title":"Cryptography and Data Security","author":"Denning D. E. R.","year":"1982"},{"key":"e_1_2_1_11_2","unstructured":"K. J.Biba \u2018Integrity considerations for secure computer systems \u2019 ESD\u2010TR\u201076\u2013372 USAF Electronic Systems Division. Bedford MA (April 1977)."},{"key":"e_1_2_1_12_2","unstructured":"UNIX System Laboratories UNIX System V Release 4.1 B2 Enhanced Security User's Guide. (1991)."},{"key":"e_1_2_1_13_2","unstructured":"W. E.BoebertandR. Y.Kain \u2018A practical alternative to hierarchical integrity policies.\u2019 inLock: Selected Papers. 1985\u20131988. Secure Computing Technology Center 2855 Anthony Lane South. Suite 130 St. Anthony MN (1988)."},{"issue":"1","key":"e_1_2_1_14_2","first-page":"S1\/3","article-title":"Interprocess communication in the ninth edition UNIX system","volume":"20","author":"Presotto D. L.","year":"1990","journal-title":"Software\u2014Practice ami Experience"},{"key":"e_1_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00056.x"},{"key":"e_1_2_1_16_2","volume-title":"UNIX Research System Programmer's Manual","year":"1990"},{"key":"e_1_2_1_17_2","first-page":"429","volume-title":"Winter 1989 Usenix Technical Conference","author":"Smith\u2010Thomas. B.","year":"1989"},{"key":"e_1_2_1_18_2","unstructured":"M. A.SchatterandG.Walsh \u2018LOCK\/ix: on implementing UNIX on the Lock TCB.\u2019 inLock: Selected Papers 1985\u20131988 Secure Computing Technology Center 2855 Anthony Lane South. Suite 130 St. Anthony MN (1988)."},{"key":"e_1_2_1_19_2","article-title":"Experience with viruses on UNIX systems","volume":"2","author":"Duff T.","year":"1989","journal-title":"Computing Systems"},{"key":"e_1_2_1_20_2","doi-asserted-by":"crossref","unstructured":"J. P. L.Woodward \u2018Exploiting the dual nature of sensitivity labels.\u2019Proceedings. Symposium on Security and Privacy pp.23\u201330. IEEE. Oakland (1987).","DOI":"10.1109\/SP.1987.10016"},{"key":"e_1_2_1_21_2","unstructured":"M. E.Carson J.Liang G. L.Luckenbaugh andD. H.Yakov \u2018Secure windows for UNIX \u2019Winter 1989 Usenix Technical Conference pp.441\u2013455. Usenix Association. San Diego (1989)."},{"key":"e_1_2_1_22_2","volume-title":"Proceedings, Symposium on Security and Privacy","author":"Clark D. D.","year":"1987"},{"key":"e_1_2_1_23_2","unstructured":"J.Steiner C.Neuman andJ. I.Schiller \u2018Kerberos: an authentication service for open network systems.\u2019Winter Conference Proceedings Usenix Association Dallas (February 1988)."}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380220805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380220805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T11:47:03Z","timestamp":1698061623000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380220805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,8]]},"references-count":23,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1992,8]]}},"alternative-id":["10.1002\/spe.4380220805"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380220805","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,8]]}}}