×

A new method for the detection of protection faults in capability-based protection systems. (English) Zbl 0427.68031


MSC:

68N25 Theory of operating systems
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] S. Antonelli, G. Iazeolla,Some algebraic properties of capability-based protection systems, Report S-75-12, Istituto di Scienze dell’Informazione, University of Pisa, (1975). · Zbl 0427.68031
[2] C. Berge,Principles of combinatorics (1971), Academic Press, New York. · Zbl 0227.05002
[3] P. J. Denning, G. S. Graham,Protection, principles and practice, Proc. AFIPS, SJCC (1972), 417–429.
[4] R. S. Fabry,Capability-based addressing, Comm. ACM (7)17 (1974), 403–411. · doi:10.1145/361011.361070
[5] R. M. Graham,Protection in an information processing utility, Comm. ACM (5)11 (1968), 365–369. · doi:10.1145/363095.363146
[6] A. M. Harrison, W. L. Ruzzo, J. D. Ullman,On protection in operating systems, University of California, Berkeley (1974). · Zbl 0327.68041
[7] G. Iazeolla,A set theoretic model of protection, International workshop on protection in operating systems, IRIA, France (Aug. 1974).
[8] H. T. Kung, F. Luccio, F. P. Preparata,On finding the maxima of a set of vectors, J. ACM (4)22 (1975), 469–476. · Zbl 0316.68030 · doi:10.1145/321906.321910
[9] B. W. Lampson,A note on the confinement problem, Comm. ACM (10)16 (1973), 613–615. · doi:10.1145/362375.362389
[10] F. P. Preparata, R. T. Yeh,Introduction to discrete structures (1973) Addison Wesley, New York.
[11] D. E. Rutherford,Introduction to lattice theory (1965), Hofner, New York. · Zbl 0127.24904
[12] J. H. Saltzer,Protection and the control of information sharing in Multics. Comm. ACM (7)17 (1974), 388–402. · doi:10.1145/361011.361067
[13] M. V. Wilkes,Time sharing computer systems (1971), Mc Donald Elsevier, London. · Zbl 0191.46305
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.