Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Protection in operating systems

Protection in operating systems A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

Loading next page...
 
/lp/association-for-computing-machinery/protection-in-operating-systems-up0DlIKWzK

References (16)

Publisher
Association for Computing Machinery
Copyright
Copyright © 1976 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/360303.360333
Publisher site
See Article on Publisher Site

Abstract

A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed.

Journal

Communications of the ACMAssociation for Computing Machinery

Published: Aug 1, 1976

There are no references for this article.