[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Protection

Published: 01 January 1974 Publication History

Abstract

Abstract models are given which reflect the properties of most existing mechanisms for enforcing protection or access control, together with some possible implementations. The properties of existing systems are explicated in terms of the model and implementations.

References

[1]
P. A. Crisman, ed., The Compatible Time-Sharing System: A Programmer's Guide, second edition, M.I.T. Press, Cambridge, Mass., 1965.
[2]
Dennis, J. B., "Segmentation and the Design of Multiprogrammed Computer Systems," J. ACM 12, 4 (Oct. 1965), p. 589.
[3]
Dennis, J. B. and van Horn, E., "Programming Semantics for Multiprogrammed Computation," Comm. ACM 9, 3 (March 1966), p. 143.
[4]
Graham, R. M., "Protection in an Information Processing Utility," Comm. ACM 11, 5 (May 1968), p. 365.
[5]
Hansen, P. B., "The Nucleus of a Multi-programming System," Comm. ACM 13, 4 (April 1970), p. 238.
[6]
Harrison, M. C., "Implementation of the SHARER2 Time-Sharing System," Comm. ACM 11, 12 (Dec. 1968), p. 845.
[7]
Iliffe, J. K., Basic Machine Principles, American Elsevier, New York, 1968.
[8]
Lampson, B. W. et al, "A User Machine in a Time-Sharing System," Proc. IEEE 54, 12 (Dec. 1966), p. 1766.
[9]
Lampson, B. W., "Dynamic Protection Structures," Proc. AFIPS Conf. 35 (1969 FJCC), p. 27.
[10]
Lampson, B. W., "On Reliable and Extendable Operating Systems," Working Material, Second NATO Conference on Software Engineering, Rome, Oct. 1969.
[11]
Linde, R. R. et al, "The ADEPT-50 Time-Sharing System," Proc. AFIPS Conf. 35 (1969 FJCC), p. 39.
[12]
Molho, L., "Hardware Aspects of Secure Computing," Proc. AFIPS Confo 36 (1970 FJCC), p. 135.
[13]
Vanderbilt, D. H., "Controlled Information Sharing in a Computer Utility,", MAC TR-67, M.I.T., Cambridge, Mass., Oct. 1969.
[14]
Weissman, C., "Security Controls in the ADEPT-50 Time-Sharing System," Proc. AFIPS Conf. 35, (1969 FJCC), p. 39.
[15]
Wilkes, M. V., Time-Sharing Computer Systems, American Elsevier, New York, 1968.

Cited By

View all
  • (2024)Secure EHR access in the cloud: an alloy-based formalization of ABAC in ‎‎collaborative and non-collaborative models‎STUDIES IN ENGINEERING AND EXACT SCIENCES10.54021/seesv5n2-5905:2(e11282)Online publication date: 29-Nov-2024
  • (2024)Cloud-Based Access Control Including Time and LocationElectronics10.3390/electronics1314281213:14(2812)Online publication date: 17-Jul-2024
  • (2024)Blockchain-Aided Secure Access Control for UAV Computing NetworksIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.332463911:6(5267-5279)Online publication date: Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 8, Issue 1
January 1974
30 pages
ISSN:0163-5980
DOI:10.1145/775265
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1974
Published in SIGOPS Volume 8, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,034
  • Downloads (Last 6 weeks)152
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Secure EHR access in the cloud: an alloy-based formalization of ABAC in ‎‎collaborative and non-collaborative models‎STUDIES IN ENGINEERING AND EXACT SCIENCES10.54021/seesv5n2-5905:2(e11282)Online publication date: 29-Nov-2024
  • (2024)Cloud-Based Access Control Including Time and LocationElectronics10.3390/electronics1314281213:14(2812)Online publication date: 17-Jul-2024
  • (2024)Blockchain-Aided Secure Access Control for UAV Computing NetworksIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.332463911:6(5267-5279)Online publication date: Nov-2024
  • (2024)Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679435(241-246)Online publication date: 2-Sep-2024
  • (2024)The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.339264226:4(2914-2960)Online publication date: Dec-2025
  • (2024)Implementing the principle of least administrative privilege on operating systems: challenges and perspectivesAnnals of Telecommunications10.1007/s12243-024-01033-579:11-12(857-880)Online publication date: 16-May-2024
  • (2024)The Security and Privacy Concerns on MetaverseComputer Networks and IoT10.1007/978-981-97-1332-5_23(287-305)Online publication date: 3-Apr-2024
  • (2024)Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case StudyTechnological Innovation for Human-Centric Systems10.1007/978-3-031-63851-0_13(192-203)Online publication date: 28-Jun-2024
  • (2023)MultiviewProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620657(7499-7516)Online publication date: 9-Aug-2023
  • (2023)Improving logging to reduce permission over-granting mistakesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620261(409-426)Online publication date: 9-Aug-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media