Protection in operating systems
From MaRDI portal
Publication:4092978
DOI10.1145/360303.360333zbMath0327.68041OpenAlexW2053741629MaRDI QIDQ4092978
Jeffrey D. Ullman, Walter L. Ruzzo, Michael A. Harrison
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360303.360333
Formal languages and automata (68Q45) General topics in the theory of software (68N01) Algorithms in computer science (68W99)
Related Items (26)
Dynamic role authorization in multiparty conversations ⋮ Component-Based Security Policy Design with Colored Petri Nets ⋮ Logic in Access Control (Tutorial Notes) ⋮ Information flow control in software DB units based on formal verification ⋮ A new method for the detection of protection faults in capability-based protection systems ⋮ Leftist Grammars Are Non-primitive Recursive ⋮ Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic ⋮ A novel logic-based automatic approach to constructing compliant security policies ⋮ Theft and conspiracy in the Take-Grant protection model ⋮ A Logical Approach to Dynamic Role-Based Access Control ⋮ Policy analysis for administrative role-based access control ⋮ Undecidability of safety for the schematic protection model with cyclic creates ⋮ On complexity of grammars related to the safety problem ⋮ Controlling file access with types ⋮ Unnamed Item ⋮ Statistical anomaly detection via httpd data analysis ⋮ Safety in grammatical protection systems ⋮ Graph Transformations for the Specification of Access Control Policies ⋮ On the Decidability of the Safety Problem for Access Control Policies ⋮ Nivat's processing systems: decision problems related to protection and synchronization ⋮ A meta-model of access control in a fibred security language ⋮ Bounded memory protocols ⋮ Safety Analysis of the Dynamic-Typed Access Matrix Model ⋮ High Level Conflict Management Strategies in Advanced Access Control Models ⋮ Creation and reflexive rights in grammatical protection systems ⋮ Decidability of Safety in Graph-Based Models for Access Control
This page was built for publication: Protection in operating systems