Protection mechanism

From HandWiki
Revision as of 18:50, 6 February 2024 by Rtexter1 (talk | contribs) (simplify)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies.[1] A simple definition of a security policy is "to set who may use what information in a computer system".[1] The access matrix model, first introduced in 1971,[2] is a generalized description of operating system protection mechanisms.[3]

The separation of protection and security is a special case of the separation of mechanism and policy.[4]

Notes

  1. 1.0 1.1 Jones 1975
  2. Lampson 1971
  3. Landwehr 1981
  4. Wulf 74 pp. 337–345

References

  • Anita K. Jones, Richard J. Lipton The enforcement of security policies for computation ACM Symposium on Operating Systems Principles. Proceedings of the fifth ACM symposium on Operating systems principles. Austin, Texas, United States. pp. 197–206. 1975
  • Lampson, Butler W. (1971). "Protection". pp. 437. 
  • Carl E. Landwehr Formal Models for Computer Security [1] Volume 13, Issue 3 (September 1981) pp. 247–278
  • Wulf, W.; E. Cohen; W. Corwin; A. Jones; R. Levin; C. Pierson; F. Pollack (June 1974). "HYDRA: the kernel of a multiprocessor operating system". Communications of the ACM 17 (6): 337–345. doi:10.1145/355616.364017.  [2]