Protection in operating systems

From MaRDI portal
Publication:4092978

DOI10.1145/360303.360333zbMath0327.68041OpenAlexW2053741629MaRDI QIDQ4092978

Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison

Publication date: 1976

Published in: Communications of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/360303.360333




Related Items (26)

Dynamic role authorization in multiparty conversationsComponent-Based Security Policy Design with Colored Petri NetsLogic in Access Control (Tutorial Notes)Information flow control in software DB units based on formal verificationA new method for the detection of protection faults in capability-based protection systemsLeftist Grammars Are Non-primitive RecursiveSpecifying Intrusion Detection and Reaction Policies: An Application of Deontic LogicA novel logic-based automatic approach to constructing compliant security policiesTheft and conspiracy in the Take-Grant protection modelA Logical Approach to Dynamic Role-Based Access ControlPolicy analysis for administrative role-based access controlUndecidability of safety for the schematic protection model with cyclic createsOn complexity of grammars related to the safety problemControlling file access with typesUnnamed ItemStatistical anomaly detection via httpd data analysisSafety in grammatical protection systemsGraph Transformations for the Specification of Access Control PoliciesOn the Decidability of the Safety Problem for Access Control PoliciesNivat's processing systems: decision problems related to protection and synchronizationA meta-model of access control in a fibred security languageBounded memory protocolsSafety Analysis of the Dynamic-Typed Access Matrix ModelHigh Level Conflict Management Strategies in Advanced Access Control ModelsCreation and reflexive rights in grammatical protection systemsDecidability of Safety in Graph-Based Models for Access Control




This page was built for publication: Protection in operating systems