hyrarx operating system

computer internal security
notes on an hierarchy of confidences

The current mode of internet computer-internal security operates with file and folder distinctions among the owner, a group, and the public. But intrinsic security exists widely among the programmatic entities:

The hyrarx (operating system hierarchy) is concerned with the responsibility and reliability of requests: Something akin to a law of auto-managing computics: The well-constructed system shall not deprive the authorized user of its computational responsibility, reliability, and resourcibility: the user-computer interface general attributes.

Common technology follows two regimes: the organizational and the interactional: The former defines which pieces are sent where, to perform; The latter defines pieces as performing entities with capabilities, of performance.

But the results are not directly compatible [not used both together] in format and process, though essentially equivalent - such anomaly being classified meta-political and not in the scope of this article. [In mathematics and sciences we generally learn both methods]


Program memory-storage is usually given a parity (one) bit check, which can catch spurious single values, with the expectation that it will do so before a double-bit can pass uncaught (a parity bit being simple binary-modulus count of memory).

But a simple furtherance to 2-bit or more, can check both the occasions of spurious double-bit values, as are quite possible in very large memories, and other types of spurious values, such as tied bits, and especially program zoning: catching a mislocated program jump in very large memory storage:

Akin to the four-color-map theorem-construction: by setting each program it's own parity-scheme, a jump out-of-range would land to execute in inconsistent parity,- and in short order, find itself: Each program or segment would need its own parity rule (masked ex'or).

[under construction] . . .

A premise discovery under the title,

Grand-Admiral Petry
'Majestic Service in a Solar System'
Nuclear Emergency Management

© 2001 GrandAdmiralPetry@Lanthus.net