Lines Matching full:system
56 update other major components of the system, as well as to offer
69 audit the existing security features of the system, particularly
87 There have been several changes in the system that were included
135 The use of this facility has allowed improvements in the file system's
138 Fat Fast File System
140 The 4.2 fast file system [McKusick84]
219 of the IEEE POSIX P1003.1 system interface standard.
222 P1003.6 (security), P1003.7 (system administration), and P1003.8
226 POSIX related changes to the BSD system have included a new terminal
244 system.
294 Toward a Compatible File System Interface
296 The most critical shortcoming of the 4.3BSD UNIX system was in the
299 there is no single distributed file system
302 file system protocols, just as it is necessary to run several
306 several stylized interfaces between the file system implementation
308 Among these are Sun Microsystems' Virtual File System interface (VFS)
310 Digital Equipment's Generic File System (GFS) architecture [Rodriguez86],
311 AT&T's File System Switch (FSS) [Rifkin86],
312 the LOCUS distributed file system [Walker85],
313 and Masscomp's extended file system [Cole85].
316 notably the network file system in the Eighth Edition UNIX
317 system [Weinberger84] and two different file systems used at Carnegie Mellon
324 Each design attempts to isolate file system-dependent details
332 and having selected a different set of file system primitive operations.
340 framework. We have studied the various file system interfaces to determine
342 and are currently working on a file system interface
347 toward convergence on a standard compatible file system interface.
352 System Security
356 safeguards built into the system.
358 weaknesses in the system access mechanisms, rather than actively
360 When we are notified of a problem or loophole in a system utility
369 We will make a complete audit of the system
370 utilities and network servers to find unintended system access mechanisms.
372 As a part of the work to make the system more resistant to attack
374 additional documentation on the configuration and operation of the system.
377 and control of privileged operations such as file system backups.
393 A major shortcoming of the present system is that authentication
397 on a UNIX system,
410 the X window system, and the mail system within an authentication
413 with the network authentication system.
425 ``An Implementation of an Extended File System for UNIX,''
432 ``Trusted Computer System Evaluation Criteria,''
438 ``Towards a Compatible File System Interface,''
444 ``Vnodes: An Architecture for Multiple File System Types in Sun UNIX,''
455 ``A Fast File System for UNIX'',
483 ``The Generic File System,''
489 ``Design and Implementation of the Sun Network File System,''
495 ``The ITC Distributed File System: Principles and Design,''
505 Walker, B.J. and S.H. Kiser, ``The LOCUS Distributed File System,''
506 \fIThe LOCUS Distributed System Architecture\fP,
510 Weinberger, P.J., ``The Version 8 Network File System,''