A Linear Time Algorithm for Deciding Subject Security
Journal of the ACM (JACM)
Protection in operating systems
Communications of the ACM
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
The Cambridge CAP computer and its protection system
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
On the synthesis and analysis of protection systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
The transfer of information and authority in a protection system
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Protection in programmed systems.
Protection in programmed systems.
Problems, mechanisms and solutions.
Problems, mechanisms and solutions.
Formal languages and their relation to automata
Formal languages and their relation to automata
A Linear time algorithm for deciding security
SFCS '76 Proceedings of the 17th Annual Symposium on Foundations of Computer Science
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
A Logic of Composition for Information Flow Predicates
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Kernel design for isolation and assurance of physical memory
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Isolating untrusted software extensions by custom scoping rules
Computer Languages, Systems and Structures
Capability-based delegation model in RBAC
Proceedings of the 15th ACM symposium on Access control models and technologies
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 14.99 |
The role of formal modeling in the study of capability- based protection systems is explained. Historical background is presented and a model of a computer science department's computer system is presented. A survey of several important capability-based models is given including the Harrison, Ruzzo, Ullman model, the Take-Grant model, and grammatical models. These models are presented in a unified manner with consistent terminology. The main results of the models are given. These results are compared, contrasted, and interpreted in the context of numerous examples.