ABSTRACT
A very general problem which pervades the entire field of operating system design is the construction of protection mechanisms. These come in many different forms, ranging from hardware which prevents the execution of input/output instructions by user programs, to password schemes for identifying customers when they log onto a time-sharing system. This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Thus, for example, a memory protection system decides whether a program P is allowed to store into location T. We are concerned with how P obtains this permission and how he passes it on to other programs.
- P A Crisman editor The compatible time-sharing system: A programmer's guide MIT Press 2nd ed Cambridge Mass 1965Google Scholar
- J P Dennis Segmentation and the design of multi-programmed computer systems J ACM Vol 12 Oct 1965 589 Google ScholarDigital Library
- J B Dennis E C Van Horn Programming semantics for multiprogrammed computation CACM Vol 8 No 3 March 1966 143 Google ScholarDigital Library
- R M Graham Protection in an information processing utility CACM Vol 11 No 5 May 1968 368 Google ScholarDigital Library
- B W Lampson A scheduling philosophy for multi-processing systems CACM Vol 11 No 5 May 1968 347 Google ScholarDigital Library
- B W Lampson et al A user machine in a time-sharing system Proc IEEE Vol 54 No 12 Dec 1966Google Scholar
Recommendations
Dynamic permission access control model based on privacy protection
AbstractAccess control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing ...
Differentiated quality-of-protection in survivable WDM mesh networks using p-structures
In this paper, we develop a design methodology of survivable Wavelength Division Multiplexing (WDM) networks based on pre-configured protection structures (p-structures) to support multiple classes of Quality-of-Protection (QoP). We elaborate a generic ...
Mondrian memory protection
Special Issue: Proceedings of the 10th annual conference on Architectural Support for Programming Languages and Operating SystemsMondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple protection domains to flexibly share memory and export protected services. In contrast to earlier page-based systems, MMP allows arbitrary permissions control at ...
Comments