Protection in operating systems
From MaRDI portal
Publication:4092978
DOI10.1145/360303.360333zbMATH Open0327.68041OpenAlexW2053741629MaRDI QIDQ4092978FDOQ4092978
Authors: Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360303.360333
General topics in the theory of software (68N01) Formal languages and automata (68Q45) Algorithms in computer science (68W99)
Cited In (26)
- Statistical anomaly detection via httpd data analysis
- Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
- Graph transformations for the specification of access control policies
- On the decidability of the safety problem for access control policies
- A Logical Approach to Dynamic Role-Based Access Control
- Title not available (Why is that?)
- Bounded memory protocols
- Controlling file access with types
- High level conflict management strategies in advanced access control models
- Logic in Access Control (Tutorial Notes)
- Safety in grammatical protection systems
- On complexity of grammars related to the safety problem
- A new method for the detection of protection faults in capability-based protection systems
- A novel logic-based automatic approach to constructing compliant security policies
- Dynamic role authorization in multiparty conversations
- Safety analysis of the dynamic-typed access matrix model
- Leftist Grammars Are Non-primitive Recursive
- A meta-model of access control in a fibred security language
- Nivat's processing systems: decision problems related to protection and synchronization
- Decidability of safety in graph-based models for access control
- Information flow control in software DB units based on formal verification
- Undecidability of safety for the schematic protection model with cyclic creates
- Component-Based Security Policy Design with Colored Petri Nets
- Policy analysis for administrative role-based access control
- Creation and reflexive rights in grammatical protection systems
- Theft and conspiracy in the Take-Grant protection model
This page was built for publication: Protection in operating systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4092978)