Protection in operating systems
From MaRDI portal
Publication:4092978
DOI10.1145/360303.360333zbMath0327.68041MaRDI QIDQ4092978
Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360303.360333
68Q45: Formal languages and automata
68N01: General topics in the theory of software
68W99: Algorithms in computer science
Related Items
Unnamed Item, Graph Transformations for the Specification of Access Control Policies, Decidability of Safety in Graph-Based Models for Access Control, On the Decidability of the Safety Problem for Access Control Policies, Safety Analysis of the Dynamic-Typed Access Matrix Model, Dynamic role authorization in multiparty conversations, A novel logic-based automatic approach to constructing compliant security policies, Policy analysis for administrative role-based access control, Nivat's processing systems: decision problems related to protection and synchronization, Statistical anomaly detection via httpd data analysis, A meta-model of access control in a fibred security language, Creation and reflexive rights in grammatical protection systems, A new method for the detection of protection faults in capability-based protection systems, Theft and conspiracy in the Take-Grant protection model, Undecidability of safety for the schematic protection model with cyclic creates, Controlling file access with types, Information flow control in software DB units based on formal verification, Bounded memory protocols, On complexity of grammars related to the safety problem, High Level Conflict Management Strategies in Advanced Access Control Models, Component-Based Security Policy Design with Colored Petri Nets, Logic in Access Control (Tutorial Notes), Safety in grammatical protection systems, Leftist Grammars Are Non-primitive Recursive, Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic, A Logical Approach to Dynamic Role-Based Access Control