skip to main content
10.1145/1478559.1478563acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free Access

Dynamic protection structures

Published:18 November 1969Publication History

ABSTRACT

A very general problem which pervades the entire field of operating system design is the construction of protection mechanisms. These come in many different forms, ranging from hardware which prevents the execution of input/output instructions by user programs, to password schemes for identifying customers when they log onto a time-sharing system. This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Thus, for example, a memory protection system decides whether a program P is allowed to store into location T. We are concerned with how P obtains this permission and how he passes it on to other programs.

References

  1. P A Crisman editor The compatible time-sharing system: A programmer's guide MIT Press 2nd ed Cambridge Mass 1965Google ScholarGoogle Scholar
  2. J P Dennis Segmentation and the design of multi-programmed computer systems J ACM Vol 12 Oct 1965 589 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J B Dennis E C Van Horn Programming semantics for multiprogrammed computation CACM Vol 8 No 3 March 1966 143 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R M Graham Protection in an information processing utility CACM Vol 11 No 5 May 1968 368 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B W Lampson A scheduling philosophy for multi-processing systems CACM Vol 11 No 5 May 1968 347 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B W Lampson et al A user machine in a time-sharing system Proc IEEE Vol 54 No 12 Dec 1966Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    AFIPS '69 (Fall): Proceedings of the November 18-20, 1969, fall joint computer conference
    November 1969
    834 pages
    ISBN:9781450379069
    DOI:10.1145/1478559

    Copyright © 1969 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 November 1969

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader