Skip to main content
Log in

An operation-control scheme for authorization in computer systems

  • Published:
International Journal of Computer & Information Sciences Aims and scope Submit manuscript

Abstract

The access-control authorization scheme, which is being used for the protection of operating systems, is found to be inadequate in other areas, such as in databases and information systems. A new authorization scheme, which is a natural extension of access control, is proposed. The new scheme, which is called “operation control,” is shown to be superior to the accesscontrol scheme in a number of ways. In particular, it facilitates more natural and efficient representations of policies, particularly the type of complex policies that appear in information systems, it facilitates enforcement by compile-time validation due to a greater stability of authority states, and it reduces the need for revocation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Cohen and D. Jefferson, “Protection in the Hydra Operating System,” inProceedings of the Fifth Symposium on Operational System Principles (November, 1975).

  2. O. J. Dahl and C. A. R. Hoare, “Hierarchical Program Structures,” inStructured Programming, Dahl, Dijkstra, and Hoare, eds. (New York, Academic Press, 1972).

    Google Scholar 

  3. G. S. Graham and P. J. Denning, “Protection-Principle and Practice,” inProceedings of the 1972 SJCC (AFIPS Press, 1972).

  4. M. H. Harrison,et al., “On Protection in Operating Systems,”Proceedings of the Fifth Annual SIGOPS Conference (1975).

  5. A. K. Jones and W. A. Wulf, “Towards the design of secure systems,”Software Pract. Exper. 321–336 (1975).

  6. A. K. Jones and B. Liskov, “An Access Control Facility for Programming Languages,” Technical Report, Carnegie Mellon University (1976).

  7. B. Lampson, “Protection,” inProceedings of the Fifth Princeton Symposium on Information Science and Systems (March 1971), pp. 437–443.

  8. B. Lampson and S. Sturgis, “Reflections on an operating-system design,”Commun. ACM (May, 1976).

  9. T. A. Linden, “Operating system structures to support security and reliable software,”Sum. ACM, to be published.

  10. B. Liskov and S. Zilles, “Programming with abstract data types,”SIGPLAN Not. (April, 1974).

  11. N. Minsky, “Intentional resolution of privacy protection in database systems,”Commun. ACM (March, 1976).

  12. N. Minsky, “An Activator-Based Protection Scheme,” Rutgers Technical Report (July, 1976).

  13. M. Rosenblit and N. Minsky, “On the Decidability Problem of the Safety of Protection Systems,” Rutgers University Technical Report (February, 1976).

  14. G. Popek and C. S. Kline, “Verifiable Secure Operating System Software” [AFIPS (1974NCC), 145–151],Proceedings of the 1974 NCC (AFIPS Press, 1972), pp. 145–151.

  15. D. Redell, “Naming and Protection in Extendible Operating Systems,” Ph.D. thesis, University of California, Berkeley (1974).

    Google Scholar 

  16. J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,”Proc. IEEE 63(9) (September, 1975).

  17. C. Weissman, “Security controls in the ADEPT-50 time-sharing system,” in1969 AFIPS Conference Proceedings, Vol. 35, pp. 119–133.

  18. W. Wulf, “HYDRA: The kernel of a multiprocessor operating system,”Commun. ACM 17:337–345 (June, 1974).

    Google Scholar 

  19. W. A. Wulf, “ALPHARD: Towards a Language to Support Structured Programs,” CMU Technical Report (April, 1974).

Download references

Author information

Authors and Affiliations

Authors

Additional information

This work was partially supported by Grant DAHCIS-73-G6 of the Advanced Research Project Agency of the US government. This paper is a modified version of the paper “An Activator-based protection scheme,” July 1976 (SOSAP-TR-25).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Minsky, N. An operation-control scheme for authorization in computer systems. International Journal of Computer and Information Sciences 7, 157–191 (1978). https://doi.org/10.1007/BF00975884

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00975884

Key words

Navigation