Protection in operating systems

From MaRDI portal
Revision as of 07:32, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4092978

DOI10.1145/360303.360333zbMath0327.68041OpenAlexW2053741629MaRDI QIDQ4092978

Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison

Publication date: 1976

Published in: Communications of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/360303.360333



Related Items

Dynamic role authorization in multiparty conversations, Component-Based Security Policy Design with Colored Petri Nets, Logic in Access Control (Tutorial Notes), Information flow control in software DB units based on formal verification, A new method for the detection of protection faults in capability-based protection systems, Leftist Grammars Are Non-primitive Recursive, Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic, A novel logic-based automatic approach to constructing compliant security policies, Theft and conspiracy in the Take-Grant protection model, A Logical Approach to Dynamic Role-Based Access Control, Policy analysis for administrative role-based access control, Undecidability of safety for the schematic protection model with cyclic creates, On complexity of grammars related to the safety problem, Controlling file access with types, Unnamed Item, Statistical anomaly detection via httpd data analysis, Safety in grammatical protection systems, Graph Transformations for the Specification of Access Control Policies, On the Decidability of the Safety Problem for Access Control Policies, Nivat's processing systems: decision problems related to protection and synchronization, A meta-model of access control in a fibred security language, Bounded memory protocols, Safety Analysis of the Dynamic-Typed Access Matrix Model, High Level Conflict Management Strategies in Advanced Access Control Models, Creation and reflexive rights in grammatical protection systems, Decidability of Safety in Graph-Based Models for Access Control