Question: Conclude with a personal statement recommending what an IT professional should do with this information. An essential part of a general - purpose computer utility
Conclude with a personal statement recommending what an IT professional should do with this information. An essential part of a generalpurpose computer utility system is a set of protection mechanisms which control the transfer of information among the users of the utility. The Multics system a prototype computer utility~ serves as a useful case study of the protection mechanisms needed to permit controlled sharing of information in an online, generalpurposes informationstoring system. This paper provides a survey of the various techniques currently used in Multics to provide controlled sharing, user authentication, interuser isolation, supervisoruser protection, userwritten proprietary programs, and control of special privileges. Controlled sharing of information was a goal in the initial specifications of Multics ii and thus has influenced every stage of the system design, starting with the hardware modifications to the General Electric computer which produced the original GE base for Multics. As a result, information protection is more thoroughly integrated into the basic design of Multics than is the case for those commercial systems whose original specifications did not include comprehensive consideration of information protection. Multics is an evolving system, so any case study must be a snapshot taken at some specific time. The time chosen for this snapshot is summer, ~ at which time Multics is operating at MI.T using the Honeywell computer system. Rather than trying to document every detail of changing environments this paper concentrates on the protection strategy of Multics, with the goal of communicating those ideas which can be applied or adapted to other operating systems
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
