Segmentation and the Design of Multiprogrammed Computer Systems
Journal of the ACM (JACM)
A scheduling philosophy for multiprocessing systems
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
Security Typings by Abstract Interpretation
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
Capability Based Tagged Architectures
IEEE Transactions on Computers
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Project SUE as a learning experience
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
Software management of Cm*: a distributed multiprocessor
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
A centralized approach to computer network security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Research in data security: policies and projects
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
The authorization problem in shared files
IBM Systems Journal
Activity-oriented access control for ubiquitous environments
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Data privacy and integrity requirements for online data management systems
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Activity-oriented access control to ubiquitous hospital information and services
Information Sciences: an International Journal
Concerning "Modeling" of computer security
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Access controls for oblivious and anonymous systems
ACM Transactions on Information and System Security (TISSEC)
Role-Based access control for model-driven web applications
ICWE'12 Proceedings of the 12th international conference on Web Engineering
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Hi-index | 0.01 |
A very general problem which pervades the entire field of operating system design is the construction of protection mechanisms. These come in many different forms, ranging from hardware which prevents the execution of input/output instructions by user programs, to password schemes for identifying customers when they log onto a time-sharing system. This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Thus, for example, a memory protection system decides whether a program P is allowed to store into location T. We are concerned with how P obtains this permission and how he passes it on to other programs.