Check out the new USENIX Web site. next up previous
Next: The Browser Architecture Up: SubOS-enabled Operating Systems Previous: SubOS-enabled Operating Systems

Security Mechanism Enforcement

  As we mentioned earlier in Section [*], every time the system accepts an incoming object it associates a sub-user id with it, depending on the credentials the object carries. The sub-user id is permanently saved in the Inode of the file that holds that object, which is now its immutable identity in the system and specifies what permissions it will have. It has essentially the same functionality as a UNIX user id. One can view this as the equivalent of a user logging in to the system.

Figure [*] shows the equivalence of the two mechanisms. In the top part of the figure we see the regular process of a user Bar logging in a UNIX system Foo and getting a user id. In the same way, objects that enter the system through ftp, mail, etc., ``log in'' and are assigned sub-user id's based on their (often cryptographically-verified) source.


  
Figure: In the top part of the Figure we see the regular process of a user Bar logging in a UNIX system Foo and getting a user id. In the same way objects that enter the system through ftp, mail, etc., ``log in'' using a cryptographic token, and are assigned sub-user id's.
\begin{figure}
\centerline{
\psfig {figure=login.eps,height=2.5in,width=3.0in}
}\medskip
\hrule\end{figure}


next up previous
Next: The Browser Architecture Up: SubOS-enabled Operating Systems Previous: SubOS-enabled Operating Systems
Sotiris Ioannidis
4/28/2001