You may not have heard of B1 security, but I would suppose you have heard
of Common Criteria which also performs covert channel analysis.

Lou

--
Artificial Intelligence is no match for Natural Stupidity
  - Unknown

On Mon, Dec 4, 2017 at 6:55 AM, Peter Relson <[email protected]> wrote:

> One of the terms bandied about w/r/t B1 security was "covert channels" --
> an unauthorized user is not supposed to be able to know anything about
> another user.
> "Communication" in this case would include, but would not be limited to,
> in-memory data.
>
> "Another user" would usually not be the same as "a subsequent step in the
> same job" but conceivably could be thought of as such.
>
> You can decide for yourself to what extent (if any) z/OS Unix could be
> thought to allow such channels. Maybe Unix (not just on z) brought about
> the demise of B1 security, I have no idea; I have not heard B1 security
> mentioned in a long time (that doesn't mean its concepts were bad).
>
> Peter Relson
> z/OS Core Technology Design
>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to