Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap between them with the concept of soundness: whether a protection mechanism enforces a policy. Different sound protection mechanisms for the same policy can then be compared. We also show that the "union" of mechanisms for the same program produces a more "complete" mechanism. Although a "maximal" mechanism exists, it cannot necessarily be constructed.
CITATION STYLE
Jones, A. K., & Lipton, R. J. (1975). The enforcement of security policies for computation. In Proceedings of the 5th ACM Symposium on Operating Systems Principles, SOSP 1975 (pp. 197–206). Association for Computing Machinery, Inc. https://doi.org/10.1145/800213.806538
Mendeley helps you to discover research relevant for your work.