Protection
- 1 January 1974
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 8 (1) , 18-24
- https://doi.org/10.1145/775265.775268
Abstract
Models are given which reflect the properties of most existing mechanisms for enforcing protection or access control, together with some possible implementations. The properties of existing systems are explicated in terms of the model and implementations.Keywords
This publication has 6 references indexed in Scilit:
- The nucleus of a multiprogramming systemCommunications of the ACM, 1970
- Implementations of the SHARER2 time-sharing systemCommunications of the ACM, 1968
- Protection in an information processing utilityCommunications of the ACM, 1968
- Programming semantics for multiprogrammed computationsCommunications of the ACM, 1966
- A user machine in a time-sharing systemProceedings of the IEEE, 1966
- Segmentation and the Design of Multiprogrammed Computer SystemsJournal of the ACM, 1965