Correctness in access control

  title={Correctness in access control},
  author={Gerald J. Popek},
  booktitle={ACM Annual Conference},
A number of approaches have been developed to modularize parts of multiuser computer systems so that access to each part can be controlled. The devices of rings and capabilities are two examples. However, today's systems are notably incomplete and subject to defeat by determined and clever users. A point of view is presented here which allows proving that a logical design of an access control system is correct relative to a designer-specified set of criteria. Implementation questions are also… CONTINUE READING