Statements (51)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:security_services
|
gptkbp:designed_for |
time-sharing systems
|
gptkbp:developed_by |
gptkb:Bell_Labs
gptkb:MIT |
gptkbp:features |
user authentication
audit trails resource management dynamic linking process isolation segmentation hierarchical file system |
gptkbp:has_historical_significance |
legacy in computing history
foundation for future systems contribution to secure computing influential design principles pioneering security features |
gptkbp:has_impact_on |
data protection laws
network security security policies software engineering practices operating system design |
gptkbp:has_limitations |
complexity
scalability user training requirements resource consumption maintenance challenges |
https://www.w3.org/2000/01/rdf-schema#label |
Multics security system
|
gptkbp:influenced |
gptkb:operating_system
modern operating systems |
gptkbp:introduced_in |
gptkb:1965
|
gptkbp:is_implemented_in |
gptkb:software
gptkb:computer |
gptkbp:is_part_of |
gptkb:Multics_operating_system
|
gptkbp:is_related_to |
data confidentiality
user permissions computer security access control lists system integrity secure computing |
gptkbp:is_used_in |
gptkb:financial_institutions
military applications research institutions government systems |
gptkbp:provides |
access control
encryption authentication |
gptkbp:replaced_by |
in favor of modern systems
|
gptkbp:supports |
multilevel security
|
gptkbp:uses |
ring protection
|
gptkbp:bfsParent |
gptkb:Multics_architecture
|
gptkbp:bfsLayer |
9
|