Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
An Assessment of Techniques for Proving Program Correctness
ACM Computing Surveys (CSUR)
On the implementation of security measures in information systems
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Protection in operating systems
Communications of the ACM
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Hi-index | 0.02 |
A number of approaches have been developed to modularize parts of multiuser computer systems so that access to each part can be controlled. The devices of rings and capabilities are two examples. However, today's systems are notably incomplete and subject to defeat by determined and clever users. A point of view is presented here which allows proving that a logical design of an access control system is correct relative to a designer-specified set of criteria. Implementation questions are also discussed.