Protection in operating systems

From MaRDI portal
Publication:4092978


DOI10.1145/360303.360333zbMath0327.68041MaRDI QIDQ4092978

Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison

Publication date: 1976

Published in: Communications of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/360303.360333


68Q45: Formal languages and automata

68N01: General topics in the theory of software

68W99: Algorithms in computer science


Related Items

Unnamed Item, Graph Transformations for the Specification of Access Control Policies, Decidability of Safety in Graph-Based Models for Access Control, On the Decidability of the Safety Problem for Access Control Policies, Safety Analysis of the Dynamic-Typed Access Matrix Model, Dynamic role authorization in multiparty conversations, A novel logic-based automatic approach to constructing compliant security policies, Policy analysis for administrative role-based access control, Nivat's processing systems: decision problems related to protection and synchronization, Statistical anomaly detection via httpd data analysis, A meta-model of access control in a fibred security language, Creation and reflexive rights in grammatical protection systems, A new method for the detection of protection faults in capability-based protection systems, Theft and conspiracy in the Take-Grant protection model, Undecidability of safety for the schematic protection model with cyclic creates, Controlling file access with types, Information flow control in software DB units based on formal verification, Bounded memory protocols, On complexity of grammars related to the safety problem, High Level Conflict Management Strategies in Advanced Access Control Models, Component-Based Security Policy Design with Colored Petri Nets, Logic in Access Control (Tutorial Notes), Safety in grammatical protection systems, Leftist Grammars Are Non-primitive Recursive, Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic, A Logical Approach to Dynamic Role-Based Access Control