Networking Secure UNIX(R)
01 January 1989
This paper sketches a design for a network of computers running the McIlroy-Reeds 'Secure UNIX' system. The emphasis is on modularity and decentralization; security does not rely much on central key distribution. It assumes that there are multiple overlapping domains of authority, and relies only loosely on an ultimate common organizational loyalty. This work is speculative. It is heavily influenced by the design of the Research 10th Edition UNIX system and by the datakit networking setup found in the Information Sciences Research Division at Bell Labs, in particular by Dave Presotto's IPC scheme. The proposed network is not the same as Pike and Thompson's 'plan 9'.