Access the full text.
Sign up today, get DeepDyve free for 14 days.
Anita Jones (1973)
Protection in programmed systems.
D. Ritchie, K. Thompson (1974)
The UNIX time-sharing systemThe Bell System Technical Journal, 57
B. Lampson (1973)
A note on the confinement problemCommun. ACM, 16
G. Andrews (1974)
Cops--a protection mechanism for computer systems.
A. Aho, J. Hopcroft, J. Ullman (1974)
The Design and Analysis of Computer Algorithms
(1971)
Proc. Fifth Princeton Syrup. on Information Sciences and Systems
R. Graham (1967)
Protection in an information processing utilityProceedings of the first ACM symposium on Operating System Principles
G. Graham, Peter Denning (1972)
Protection: principles and practice
R. Needham (1899)
Protection systems and protection implementations
(1973)
II: A Mathematical Model. MITRE Corp. Tech. Rep. MTR-2547
J. Hopcroft, J. Ullman (1969)
Formal languages and their relation to automata
J. Dennis, E. Horn (1966)
Programming semantics for multiprogrammed computationsCommun. ACM, 9
Anita Jones, W. Wulf (1975)
Towards the design of secure systemsSoftware: Practice and Experience, 5
(1973)
Secure Computer Systems, Vol. I: Mathematical Foundations and Vol. II: A Mathematical Model
J. Saltzer (1974)
Protection and the control of information sharing in multicsCommun. ACM, 17
G. Popek (1973)
Correctness in access control
A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed.
Communications of the ACM – Association for Computing Machinery
Published: Aug 1, 1976
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.