You may not have heard of B1 security, but I would suppose you have heard of Common Criteria which also performs covert channel analysis.
Lou -- Artificial Intelligence is no match for Natural Stupidity - Unknown On Mon, Dec 4, 2017 at 6:55 AM, Peter Relson <[email protected]> wrote: > One of the terms bandied about w/r/t B1 security was "covert channels" -- > an unauthorized user is not supposed to be able to know anything about > another user. > "Communication" in this case would include, but would not be limited to, > in-memory data. > > "Another user" would usually not be the same as "a subsequent step in the > same job" but conceivably could be thought of as such. > > You can decide for yourself to what extent (if any) z/OS Unix could be > thought to allow such channels. Maybe Unix (not just on z) brought about > the demise of B1 security, I have no idea; I have not heard B1 security > mentioned in a long time (that doesn't mean its concepts were bad). > > Peter Relson > z/OS Core Technology Design > > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
