Protection in operating systems
From MaRDI portal
Publication:4092978
DOI10.1145/360303.360333zbMath0327.68041OpenAlexW2053741629MaRDI QIDQ4092978
Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360303.360333
Formal languages and automata (68Q45) General topics in the theory of software (68N01) Algorithms in computer science (68W99)
Related Items
Dynamic role authorization in multiparty conversations, Component-Based Security Policy Design with Colored Petri Nets, Logic in Access Control (Tutorial Notes), Information flow control in software DB units based on formal verification, A new method for the detection of protection faults in capability-based protection systems, Leftist Grammars Are Non-primitive Recursive, Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic, A novel logic-based automatic approach to constructing compliant security policies, Theft and conspiracy in the Take-Grant protection model, A Logical Approach to Dynamic Role-Based Access Control, Policy analysis for administrative role-based access control, Undecidability of safety for the schematic protection model with cyclic creates, On complexity of grammars related to the safety problem, Controlling file access with types, Unnamed Item, Statistical anomaly detection via httpd data analysis, Safety in grammatical protection systems, Graph Transformations for the Specification of Access Control Policies, On the Decidability of the Safety Problem for Access Control Policies, Nivat's processing systems: decision problems related to protection and synchronization, A meta-model of access control in a fibred security language, Bounded memory protocols, Safety Analysis of the Dynamic-Typed Access Matrix Model, High Level Conflict Management Strategies in Advanced Access Control Models, Creation and reflexive rights in grammatical protection systems, Decidability of Safety in Graph-Based Models for Access Control