skip to main content
article
Free Access

On the synthesis and analysis of protection systems

Published:01 November 1977Publication History
Skip Abstract Section

Abstract

The design of a protection system for an operating system is seen to involve satisfying the competing properties of richness and integrity. Achieving both requires the interplay of analysis and synthesis. Using a formal model from the literature, three designs are developed whose integrity (with the help of the model) can be shown.

References

  1. 1 A. K. Jones, R. J. Lipton, and L. Snyder. A linear time algorithm for deciding security. Proceedings of the 17th FOCS (1976).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. JACM 24:3 (1977). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. CACM 19:8 (1976). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the synthesis and analysis of protection systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 11, Issue 5
          November 1977
          175 pages
          ISSN:0163-5980
          DOI:10.1145/1067625
          Issue’s Table of Contents
          • cover image ACM Conferences
            SOSP '77: Proceedings of the sixth ACM symposium on Operating systems principles
            November 1977
            180 pages
            ISBN:9781450378673
            DOI:10.1145/800214

          Copyright © 1977 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 1977

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader