emks@uokvax.UUCP (12/10/84)
Does anyone know of successful or failed attempts at designing a secure UNIX kernel? I'm curious how the design differed from the vanilla kernel and how software validation/compartmentation happened. Also, was there an attempt to tag each file with its level of sensitivity? Please reply via mail. If enough others are interested, I'll post a summary of the responses. kurt U.S.P.S.: 2420 Bonnybrook Street Norman OK 73071-4324