On the implementation of security measures in information systems
- 1 April 1972
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 15 (4) , 211-220
- https://doi.org/10.1145/361284.361287
Abstract
The security of an information system may be represented by a model matrix whose elements are decision rules and whose row and column indices are users and data items respectively. A set of four functions is used to access this matrix at translation and execution time. Distinguishing between data dependent and data independent decision rules enables one to perform much of the checking of security only once at translation time rather than repeatedly at execution time. The model is used to explain security features of several existing systems, and serves as a framework for a proposal for general security system implementation within today's languages and operating systems.Keywords
This publication has 4 references indexed in Scilit:
- Introduction to “feature analysis of generalized data base management systems”Communications of the ACM, 1971
- Computers and Privacy: A SurveyACM Computing Surveys, 1969
- Protection in an information processing utilityCommunications of the ACM, 1968
- SECURITY TECHNIQUES FOR EDP OF MULTILEVEL CLASSIFIED INFORMATIONPublished by Defense Technical Information Center (DTIC) ,1965