Skip to main content

Protection mechanisms and the enforcement of security policies

  • Chapter 3.: Issues And Results In The Design Of Operating Systems
  • Chapter
  • First Online:
Book cover Operating Systems

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 60))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7. References

  • Buzen, J. and U. Gagliardi, The Evolution of Virtual Machine Architecture. AFIPS Conference Proceedings, 42, NCC 1973, 291–300.

    Google Scholar 

  • Cohen, E. and D. Jefferson, Protection in the Hydra Operating Systems, Proceedings Fifth ACM Symposium on Operating System Principles; ACM Operating Systems Review 9, 5 (November 1975) 141–160.

    Google Scholar 

  • Denning, D. and P. Denning, Certification of Programs for Secure Information Flow. CACM, 20, 7 (July 1977) 504–512.

    Google Scholar 

  • Dennis, J. and E. Van Horn, Programming Semantics for Multiprogrammed Computations. CACM 9, 3 (March 1966) 143–155.

    Google Scholar 

  • Dobkin, D., A. K. Jones, R. Lipton, Secure Data Bases: Protection Against User Inference. Transactions on Data Bases, to be published.

    Google Scholar 

  • England, D. M., Architectural Features of System 250. Proceedings International Switching Symposium, 1972.

    Google Scholar 

  • Fabry, R. S., Capability Based Addressing. CACM, 17, 7 (July 1974) 403–412.

    Google Scholar 

  • Ferrie, J., D. Kaiser, D. Lanciaux, and B. Martin, An Extensible Structure for Protected System Design. Proceedings IRIA International Workshop on Protection in Operating Systems, France, 1974.

    Google Scholar 

  • Feustel, E. A., On the Advantages of Tagged Architecture IEEE Transactions on Computers, C2, 7, 1973, 644–656.

    Google Scholar 

  • Gold, B., R. Linde, M. Schaefer, and J. Scheid, Final Report: Periods Processing versus KVM/370. System Development Corporation Technical Report, May 1977.

    Google Scholar 

  • Graham, G. S. and P. J. Denning, Protection—Principles and Practice. AFIPS Conference Proceedings, 40, SJCC 1972, 417–429.

    Google Scholar 

  • Habermann, A. N., Introduction to Operating System Design. SRA, 1976.

    Google Scholar 

  • Hoffman, L. J., Modern Methods for Computer Security and Privacy. Prentice Hall, 1977.

    Google Scholar 

  • Jones, A. K. and W. A. Wulf, Towards the Design of Secure Systems. Software—Practice and Experience, 5 (October–December 1975) 321–336.

    Google Scholar 

  • Jones, A. K. and R. J. Lipton, The Enforcement of Security Policies for Computation. Carnegie-Mellon University Department of Computer Science Technical Report, May 75.

    Google Scholar 

  • Jones, A. K. and B. H. Liskov, A Language Extension for Controlling Access to Shared Data. IEEE IEEE Transactions on Software Engineering, SE-2, 4 (December 1976) 277–284.

    Google Scholar 

  • Jones, A. K., R. J. Chansler, Jr., I. Durham, P. Feiler, and K. Schwans, Software Management of Cm—A Multiple Microprocessor. AFIPS Conference Proceedings, NCC 1977.

    Google Scholar 

  • Moore, C. G., Potential Capabilities in ALGOL-like Programs. Cornell Department of Computer Science Technical Report (September 1974).

    Google Scholar 

  • Lampson, B. W., Protection. Proceedings Fifth Annual Princeton Conference on Information Sciences and Systems (1971) 437–443. Reprinted in ACM Operating Systems Review (January 1974).

    Google Scholar 

  • Lampson, B. W., A Note on the Confinement Problem. CACM, 16, 10 (October 1973) 613–615.

    Google Scholar 

  • Lampson, B. W. and H. Sturgis, Reflections on an Operating System Design. CACM 19, 5 (May 1976), 251–266.

    Google Scholar 

  • Linden, T. A., Operating System Structures to Support Security and Reliable Software. ACM Computing Surveys, 8, 4 (December 1976) 409–445.

    Google Scholar 

  • Liskov, B. and S. Zilles, Specification Techniques for Data Abstractions. Proceedings of the International Conference on Reliable Software, SIGPLAN Notices 12, 3 (1975).

    Google Scholar 

  • Morris, J. H., Jr., Protection in Programming Languages. CACM, 16, 1 (January 1973) 15–21.

    Google Scholar 

  • Needham, R. M. and R. D. H. Walker, Protection and Process Management in the CAP Computer, Proceedings IRIA International Workshop on Protection in Operating Systems, France (1974) 155–160.

    Google Scholar 

  • Popek, G., Protection Structures. Computer (June 1974) 22–33.

    Google Scholar 

  • Popek, G. and C. Kline, Verifiable Secure Operating Software. AFIPS Conference Proceedings 43, NCC (1974).

    Google Scholar 

  • Popek, G. and D. Farber, A Model for Verification of Security in Operating Systems. CACM, to be published.

    Google Scholar 

  • Radin, G. and P. Schneider, An Architecture for an Extended Machine with Protected Addressing. IBM Research TR 00.2757, May 1976.

    Google Scholar 

  • Redell, D. R. and R. S. Fabry, Selective Revocation of Capabilities. IRIA International Workshop on Protection in Operating Systems, France (1974) 197–210.

    Google Scholar 

  • Saltzer, J. H. and M. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 63, 9 (September 1975) 1278–1308.

    Google Scholar 

  • Saltzer, J. H., Private Communication.

    Google Scholar 

  • Schroeder, M., Cooperation of Mutually Suspicious Subsystems in a Computer Utility, Doctoral Thesis, MIT Technical Report, 1972.

    Google Scholar 

  • Schroeder, M, D. Clark, and J. Saltzer, The Multics Kernel Design. Sixth Symposium on Operating System Principles (November 1977).

    Google Scholar 

  • Wulf, W. A., et al, Hydra: The Kernel of a Multiprocessor Operating System. CACM [17], 6 (June 1974) 337–345.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

R. Bayer R. M. Graham G. Seegmüller

Rights and permissions

Reprints and permissions

Copyright information

© 1978 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jones, A.K. (1978). Protection mechanisms and the enforcement of security policies. In: Bayer, R., Graham, R.M., Seegmüller, G. (eds) Operating Systems. Lecture Notes in Computer Science, vol 60. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-08755-9_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-08755-9_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-08755-7

  • Online ISBN: 978-3-540-35880-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics