Abstract
The Monash Multiprocessor Architecture incorporates a monetary system at the lowest kernel level, integrated with a password capability scheme. Although the capability scheme is quite flexible, providing support for non-hierarchic security and access policies, abstract type management and information confinement, we show that it is possible for service providers to command use-based fees for service. The fee charging protocols must be designed with some care to avoid breaching required information confinement constraints when user and provider are mutually suspicious, but need not be very complicated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, M., Pose R.D. and Wallace, C.S., “A Password-Capability System”, The Computer Journal, Vol. 29, No. 1, 1986, pp. 1–8.
Anderson, M. and Wallace, C.S., “Some Comments on the Implementation of Capabilities”, The Australian Computer Journal, Vol. 20, No. 3, 1988, pp. 122–130.
Wallace, C.S., “A Physically Random Generator”, Computer Systems Science and Engineering, Vol. 5, No. 2, 1990, pp. 82–88.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 British Computer Society
About this paper
Cite this paper
Wallace, C.S., Pose, R.D. (1990). Charging in a Secure Environment. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_6
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3178-6_6
Publisher Name: Springer, London
Print ISBN: 978-3-540-19646-4
Online ISBN: 978-1-4471-3178-6
eBook Packages: Springer Book Archive