Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/800213.806517acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article
Free access

On protection in operating systems

Published: 01 November 1975 Publication History

Abstract

A model of protection mechanisms in computing systems is presented and its appropriateness is demonstrated. The “safety” problem for protection systems under our model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, one can show that this problem is decidable, i.e., there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, one cannot decide if a situation is safe. Various implications of this fact are discussed.

References

[1]
G. R. Andrews, "COPS - A Protection Mechanism for Computer Systems," Ph. D. Thesis and Technical Report 74-07-12, Computer Science Program, Univ. of Washington, Seattle, Wash., July, 1974.
[2]
D. E. Bell and L. J. LaPadula, "Secure Computer Systems, Vol. I. Mathematical Foundations and Vol. II. A Mathematical Model," MITRE Corp. Technical Report MTR-2547, 1973.
[3]
J. B. Dennis and E. C. Van Horn, "Programming Semantics for Multiprogrammed Computations," CACM, Vol. 9, pp 143-155, 1966.
[4]
R. M. Graham, "Protection in an Information Processing Utility," CACM, Vol. 11, pp. 365-369, 1968.
[5]
G. S. Graham and P. J. Denning, "Protection - Principles and Practice," Proc. 1972 SJCC, Vol. 40, pp. 417-429, AFIPS Press, 1972.
[6]
J. E. Hopcroft and J. D. Ullman, Formal Languages and Their Relation to Automata, Addison Wesley, 1969.
[7]
A. K. Jones, "Protection in Programmed Systems," Ph.D. Thesis, Department of Computer Science, Carnegie-Mellon University, Pittsburgh, Pa., June 1973.
[8]
A. K. Jones and W. Wulf, "Towards the Design of Secure Systems," in Protection in Operating Systems, Colloques IRIA, Rocquencourt, France, pp. 121-136, 1974.
[9]
B. W. Lampson, "Protection," Proc. Fifth Princeton Symp. on Information Sciences and Systems, Princeton University, March 1971, pp. 437-443. Reprinted in Operating Systems Review, Vol. 8, No.1, pp. 18-24, January 1974.
[10]
B. W. Lampson, "A Note on the Confinement Problem," CACM, Vol. 16, pp. 613-615, 1973.
[11]
R. M. Needham, "Protection Systems and Protection Implementations," Proc. 1972 FJCC, Vol. 41, pp. 571-578, AFIPS Press, 1972.
[12]
G. J. Popek, "Correctness in Access Control," Proc. ACM National Computer Conference, pp. 236-241, 1974.
[13]
D. M. Ritchie and K. Thompson, "The UNIX Time Sharing System," CACM, Vol. 17, pp. 365-375, 1974.
[14]
J. H. Saltzer, "Protection and the Control of Information Sharing in MULTICS," CACM, Vol. 17, pp. 388-402, 1974.

Cited By

View all
  • (2018)Representation and Validation of Enterprise Security Requirements—A Multigraph ModelAdvanced Computing and Systems for Security10.1007/978-981-10-8183-5_10(153-167)Online publication date: 27-May-2018
  • (2015)A rewriting framework and logic for activities subject to regulationsMathematical Structures in Computer Science10.1017/S096012951500016X27:03(332-375)Online publication date: 2-Jun-2015
  • (2014)Bounded memory Dolev-Yao adversaries in collaborative systemsInformation and Computation10.1016/j.ic.2014.07.011238:C(233-261)Online publication date: 1-Nov-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SOSP '75: Proceedings of the fifth ACM symposium on Operating systems principles
November 1975
222 pages
ISBN:9781450378635
DOI:10.1145/800213
  • cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 9, Issue 5
    November 1975
    222 pages
    ISSN:0163-5980
    DOI:10.1145/1067629
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1975

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Decidability
  2. Operating system
  3. Protection
  4. Protection system
  5. Turing machine

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 174 of 961 submissions, 18%

Upcoming Conference

SOSP '25
ACM SIGOPS 31st Symposium on Operating Systems Principles
October 13 - 16, 2025
Seoul , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)118
  • Downloads (Last 6 weeks)33
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Representation and Validation of Enterprise Security Requirements—A Multigraph ModelAdvanced Computing and Systems for Security10.1007/978-981-10-8183-5_10(153-167)Online publication date: 27-May-2018
  • (2015)A rewriting framework and logic for activities subject to regulationsMathematical Structures in Computer Science10.1017/S096012951500016X27:03(332-375)Online publication date: 2-Jun-2015
  • (2014)Bounded memory Dolev-Yao adversaries in collaborative systemsInformation and Computation10.1016/j.ic.2014.07.011238:C(233-261)Online publication date: 1-Nov-2014
  • (2014)Bounded memory protocolsComputer Languages, Systems and Structures10.1016/j.cl.2014.05.00340:3(137-154)Online publication date: 1-Oct-2014
  • (2013)MohawkACM Transactions on Information and System Security10.1145/2445566.244557015:4(1-28)Online publication date: 1-Apr-2013
  • (2013)Real-Time Access Control Rule Fault Detection Using a Simulated Logic CircuitProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.76(494-501)Online publication date: 8-Sep-2013
  • (2013)Bounded Memory Protocols and Progressing Collaborative SystemsComputer Security – ESORICS 201310.1007/978-3-642-40203-6_18(309-326)Online publication date: 2013
  • (2012)Security Analysis of Role-Based Access Control through Program VerificationProceedings of the 2012 IEEE 25th Computer Security Foundations Symposium10.1109/CSF.2012.28(113-125)Online publication date: 25-Jun-2012
  • (2011)Automatic error finding in access-control policiesProceedings of the 18th ACM conference on Computer and communications security10.1145/2046707.2046727(163-174)Online publication date: 17-Oct-2011
  • (2011)SEALProceedings of the 16th ACM symposium on Access control models and technologies10.1145/1998441.1998454(83-92)Online publication date: 15-Jun-2011
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media