Protection mechanism

In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies.Jones 1975 A simple definition of a security policy is "to set who may use what information in a computer system".

The access matrix model, first introduced in 1971,Lampson 1971 is a generalized description of operating system protection mechanisms.Landwehr 1981

The separation of protection and security is a special case of the separation of mechanism and policy.Wulf 74 pp. 337–345

Notes

{{Reflist}}

References

  • Anita K. Jones, Richard J. Lipton [http://doi.acm.org/10.1145/800213.806538 The enforcement of security policies for computation] ACM Symposium on Operating Systems Principles. Proceedings of the fifth ACM symposium on Operating systems principles. Austin, Texas, United States. pp. 197–206. 1975
  • {{ cite conference | first = Butler W. | last = Lampson | author-link = Butler W. Lampson | title = Protection | book-title = Proceedings of the 5th Princeton Conference on Information Sciences and Systems | year = 1971 | pages = 437 }}
  • Carl E. Landwehr [http://crypto.stanford.edu/~ninghui/courses/Fall03/papers/landwehr_survey.pdf Formal Models for Computer Security] [http://doi.acm.org/10.1145/356850.356852] Volume 13, Issue 3 (September 1981) pp. 247–278
  • {{cite journal |last=Wulf |first=W. |author-link=William Wulf |author2=E. Cohen |author3=W. Corwin |author4=A. Jones |author5=R. Levin |author6=C. Pierson |author7=F. Pollack |date=June 1974 |title=HYDRA: the kernel of a multiprocessor operating system |journal=Communications of the ACM |volume=17 |issue=6 |pages=337–345 |doi=10.1145/355616.364017 |s2cid=8011765 |doi-access=free }} [https://web.archive.org/web/20070926161655/http://www.cs.virginia.edu/papers/p337-wulf.pdf]

Category:Computer security models

Category:Computer security procedures

{{computer-security-stub}}