Skip to main content

The logic of protection

  • Betriebsysteme II
  • Conference paper
  • First Online:
GI — 5. Jahrestagung (GI 1975)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 34))

Included in the following conference series:

Abstract

This paper presents a brief exposition of the role of various mathematical techniques in the development and utilization of resource protection structures for computers. The first section is concerned with the semantics of the problem — the distinction between protection problems in general and those whose complexity necessitates deeper theoretical treatment. The second section considers the roles of algebraic, topological, and modal/multi-valued logic, techniques in the analysis of protection. Finally we give an analysis of a current protection model to illustrate the problems and techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9. References

  1. R.M. Fano, "The MAC system: a progress report", in M.A. Fass and W.D. Wilkinson (eds) Computer Augmentation of Human Reasoning, Washington: Spartan Books, pp. 131–150, 1965.

    Google Scholar 

  2. E.I. Organick, The Multics System, MIT Press, 1972.

    Google Scholar 

  3. E.E. David and R.M. Fano, "Some thoughts about the social implications of accessible computing", AFIPS FJCC, vol. 27, pp. 243–247, Washington: Spartan Books, 1965.

    Google Scholar 

  4. A. Westin, Privacy and Freedom, New York: Atheneum, 1968.

    Google Scholar 

  5. A. Miller, The Assault on Privacy, University of Michigan Press, 1971.

    Google Scholar 

  6. E.W. Djikstra, "Cooperating sequential processes", in F. Genuys (ed.) Programming Languages, London: Academic Press, 1968.

    Google Scholar 

  7. J.B. Dennis, "Modularity", in F.L. Bauer (ed.) Advanced Course in Software Engineering, Lecture Notes in Economics and Mathematical Systems, vol. 81, pp. 128–182, Berlin, Springer-Verlag, 1973.

    Google Scholar 

  8. O.J. Dahl, E.W. Djikstra and C.A.R. Hoare, Structured Programming, London: Academic Press, 1972.

    Google Scholar 

  9. G.E. Hughes and M.J. Creswell, An Introduction to Modal Logic, London: Methuen, 1968.

    Google Scholar 

  10. D.P. Synder, Modal Logic, New York: Van Nostrand, 1971.

    Google Scholar 

  11. B.R. Gaines, P.V. Facey, F.K. Williamson and J.A. Maine, "Design objectives for a descriptor-organised minicomputer", Proc. EUROCOMP 74, pp. 29–45, London: Online Ltd, May 1974.

    Google Scholar 

  12. F.K. Williamson, B.R. Gaines, J.A. Maine and P.V. Facey, "A high-level minicomputer", IFIP, Stockholm, August 1974.

    Google Scholar 

  13. B.R. Gaines, M. Haynes and D. Hill, "Integration of protection and procedures in a high-level minicomputer", IEE Conf., London, November 1974.

    Google Scholar 

  14. L. Kohout, "The Pinkava many-valued complete logic systems and their application to the design of many-valued switching circuits", Proc. Int. Symp. on Multiple-Valued Logic, IEEE, pp. 261–284, May 1974.

    Google Scholar 

  15. L. Kohout, "Generalized topologies: works of the Čech topological school and their relevance to general systems", Int. J. General Systems, vol. 2, Jan. 1975, to appear.

    Google Scholar 

  16. "The plan for information society", Final Report of the Computerization Committee of the Japan Computer Usage Development Institute, Tokyo, 1972.

    Google Scholar 

  17. G.S. Graham and P.J. Denning, "Protection — principles and practice", AFIPS SJCC, vol. 40, pp. 417–429, 1972.

    Google Scholar 

  18. G.J. Popek, "Protection structures", Computer, vol. 7, pp. 22–23, June 1974.

    Google Scholar 

  19. B.W. Lampson, "Dynamic protection structures", AFIPS FJCC, vol. 35, pp. 27–38, 1969.

    Google Scholar 

  20. R.M. Needham, "Protection systems and protection implementations", AFIPS FJCC, vol. 41, pp. 572–578, New Jersey: AFIPS Press 1972.

    Google Scholar 

  21. D.M. England, "Architectural features of system 250", INFOTECH State of Art Report on Operating Systems, 1972.

    Google Scholar 

  22. A.K. Jones, "Protection in programmed systems", Ph.D. thesis, Carnegie-Mellon University, 1973.

    Google Scholar 

  23. R.W. Conway, W.L. Maxwell and H.L. Morgan, "On the implementation of security measures in information systems", Comm. ACM, vol. 15, pp. 211–220, 1972.

    Google Scholar 

  24. H.L. Morgan, "An interrupt-based organization for management information systems", Comm. ACM, vol. 13, pp. 734–739, 1970.

    Google Scholar 

  25. M. Zelkowitz, "Interrupt driven programming", Comm. ACM, vol. 14, pp. 417–418, 1971.

    Google Scholar 

  26. E.A. Feustel, "On the advantages of tagged architecture", IEEE Trans. Comp., vol. C-22, pp. 644–656, 1973.

    Google Scholar 

  27. G.J. Sussman and D.W. McDermott, "From PLANNER to CONNIVER — a genetic approach", AFIPS FJCC, vol. 41, pp. 1171–1179, New Jersey: AFIPS Press, 1972.

    Google Scholar 

  28. R.M. Burstall, J.S. Collins and R.J. Popplestone, Programming in POP-2, Edinburgh University Press, 1971.

    Google Scholar 

  29. B. Wegbreit, "The treatment of data types in ELl", Comm. ACM, vol. 17, pp. 251–264, 1974.

    Google Scholar 

  30. B.R. Gaines, P.V. Facey and J. Sams, "An interactive, display-based system for gilt-edged security broking", Proc. EUROCOMP 74, pp. 155–169, London: Online Ltd, May 1974.

    Google Scholar 

  31. B.R. Gaines and P.V. Facey, "Some experience in interactive systems development and application", Proc. IEEE, June 1975, to appear.

    Google Scholar 

  32. E.J. Lemmon, "Algebraic semantics for modal logics I", J. Sym. Logic, vol. 31, pp. 46–65, June 1966.

    Google Scholar 

  33. E.J. Lemmon, "Algebraic semantics for modal logics II", J. Sym. Logic, vol. 31, pp. 191–218, June 1966.

    Google Scholar 

  34. S. MacLane, Categories for the working mathematician, New York: Springer, 1971.

    Google Scholar 

  35. J.A. Goguen, "Semantics of computation", in Proc. 1st Int. Symp. on Category Theory Applied to Computation and Control, Massachusetts, February 1974.

    Google Scholar 

  36. A.A. Arbib and E.G. Manes, "Foundations of system theory", Automatica, vol. 10, pp. 285–302, 1974.

    Google Scholar 

  37. A. Eilenberg, Automata, Languages and Machines, vol. A, New York: Academic Press, 1974.

    Google Scholar 

  38. E. Čech, Topological Spaces, Academia, Prague & J. Wiley, Interscience, New York, 1966.

    Google Scholar 

  39. K. Koutský and M. Sekanina, "Modifications of Topologies", In: General Topology and its Relation to Modern Analysis and Algebra 1, (Proceedings of the Symposium Prague 1961). Academic Press, New York & Academia, Prague, 1962.

    Google Scholar 

  40. P. Materna, "On problems (semantic study)", Rozpravy Československé Akademie Věd, vol. 80, sešit 8, pp. 1–62, 1970. (Published by Academia, Prague).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

J. Mülbacher

Rights and permissions

Reprints and permissions

Copyright information

© 1975 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kohout, L., Gaines, B.R. (1975). The logic of protection. In: Mülbacher, J. (eds) GI — 5. Jahrestagung. GI 1975. Lecture Notes in Computer Science, vol 34. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-07410-4_672

Download citation

  • DOI: https://doi.org/10.1007/3-540-07410-4_672

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-07410-6

  • Online ISBN: 978-3-540-37929-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics