The enforcement of security policies for computation

29Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap between them with the concept of soundness: whether a protection mechanism enforces a policy. Different sound protection mechanisms for the same policy can then be compared. We also show that the "union" of mechanisms for the same program produces a more "complete" mechanism. Although a "maximal" mechanism exists, it cannot necessarily be constructed.

Cite

CITATION STYLE

APA

Jones, A. K., & Lipton, R. J. (1975). The enforcement of security policies for computation. In Proceedings of the 5th ACM Symposium on Operating Systems Principles, SOSP 1975 (pp. 197–206). Association for Computing Machinery, Inc. https://doi.org/10.1145/800213.806538

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free