A computer protection mechanism is a set of tools for controlling the actions of computations and safeguarding stored information. This paper describes a new mechanism, COPS, which is a kernel of data structures, primitive operations, and a monitor and is used to specify and enforce the capabilities of actors (processes and procedures). COPS can be used to implement a variety of security policies and systems and to enhance software reliability. Its tools are sufficient to solve problems in the areas of isolation, controlled sharing, restricted access, mutually suspicious interaction, and confinement. Key Words and phrases: protection, kernel, operating system, security, access control
Computer security is a crucial area for any organization based on electronic devices that process da...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
This paper is about a new method of protection code for applications and protection of applications ...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
An important component of a programming language for writing operating systems, or other large para...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
This paper describes a taxonomy that reflects concepts within the area of security which was develop...
The area of computer systems protection has been acclaimed as a very important one, and there is a v...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
Although the indispensibility of access control mechanisms in data secure systems has been recognize...
THe confinement problem is concerned with preventing a computaitonal service from divulging informa...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Computer security is a crucial area for any organization based on electronic devices that process da...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
This paper is about a new method of protection code for applications and protection of applications ...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
An important component of a programming language for writing operating systems, or other large para...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
This paper describes a taxonomy that reflects concepts within the area of security which was develop...
The area of computer systems protection has been acclaimed as a very important one, and there is a v...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
Although the indispensibility of access control mechanisms in data secure systems has been recognize...
THe confinement problem is concerned with preventing a computaitonal service from divulging informa...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Computer security is a crucial area for any organization based on electronic devices that process da...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
This paper is about a new method of protection code for applications and protection of applications ...