Protection mechanism

In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies.[1] A simple definition of a security policy is "to set who may use what information in a computer system".[1]

The access matrix model, first introduced in 1971,[2] is a generalized description of operating system protection mechanisms.[3]

The separation of protection and security is a special case of the separation of mechanism and policy.[4]

Notes

  1. Jones 1975
  2. Lampson 1971
  3. Landwehr 1981
  4. Wulf 74 pp. 337–345
gollark: It actually has a more complex spec than XML!
gollark: Did you know YAML has nine ways to do multiline strings?
gollark: Go is kind of like YAML with the whole "simple" thing - it kind of *looks* simple and easy, but it's a minefield of special cases and weirdness and problems and all the special cases make it more complex than something actually designed to be simple would be.
gollark: In cleaner and more typesafe ways.
gollark: You can use codegen to generate code for repetitive tasks of some sort if they don't need to generalize much or go outside your project, but it's much better to just... not have to do those repetitive tasks, or have the compiler/macros handle them.

References

  • Anita K. Jones, Richard J. Lipton The enforcement of security policies for computation ACM Symposium on Operating Systems Principles. Proceedings of the fifth ACM symposium on Operating systems principles. Austin, Texas, United States. pp. 197–206. 1975
  • Lampson, Butler W. (1971). "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437.
  • Carl E. Landwehr Formal Models for Computer Security Volume 13, Issue 3 (September 1981) pp. 247–278
  • Wulf, W.; E. Cohen; W. Corwin; A. Jones; R. Levin; C. Pierson; F. Pollack (June 1974). "HYDRA: the kernel of a multiprocessor operating system". Communications of the ACM. 17 (6): 337–345. doi:10.1145/355616.364017.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.