Protection systems and protection implementations

@inproceedings{Needham1972ProtectionSA,
  title={Protection systems and protection implementations},
  author={Roger M. Needham},
  booktitle={AFIPS '72 (Fall, part I)},
  year={1972}
}
  • R. Needham
  • Published in AFIPS '72 (Fall, part I) 30 December 1899
  • Computer Science
The paper discusses the nature of systems for protection of information in the central memory of a computer, describing the potentialities and limitations of a variety of approaches. It is based upon work done in the course of a current project on protection systems at the Computer Laboratory, Cambridge, and outlines a system which is being developed to the point of hardware implementation in the Laboratory. 

Figures from this paper

An extensible file system for hydra
TLDR
The design and implementation of the Hydra File System is treated and its implications for subsystem design and Implementation are reflected on.
The protection of information in computer systems
TLDR
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification by examining in depth the principles of modern protection architectures and the relation between capability systems and access control list systems.
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
TLDR
It is argued that the challenge of future runtime isolation is best met by embracing the multi-principle nature of applications, rethinking process architecture for fast and extensible intra-process isolation and the Endokernel Architecture exposes an essential set of abstractions for realizing this.
The need for capability policies
TLDR
It is argued that current specification methodologies cannot adequately capture all aspects of the capability policies required to support object-capability systems.
Towards Capability Policy Specification and Verification
TLDR
It is argued that the policies intended by programs using object capabilities should be made explicit and written separately from the code implementing them, and that the specification of such capability policies requires concepts that go beyond the features of current specification languages.
The Need for Capability Policies Position Paper
TLDR
It is argued that current specification methodologies cannot adequately capture all aspects of the capability policies required to support object-capability systems.
End-to-end arguments in the internet: principles, practices, and theory
TLDR
This thesis elaborates the end-to-end arguments by putting them into a meaningful context of other principles as well as the current realities of the Internet, and argues for a revised normative take on the endto- end arguments that emphasizes the importance of edge redundancy as a crucial means of extending their scope beyond the classic considerations of data integrity alone.
BASIC PRINCIPLES OF INFORMATION PROTECTION A . Considerations Surrounding the Study of
  • 2007
Design of the SPEEDOS operating system kernel
TLDR
In the prototype implementation it is shown that the virtual memory model used to describe the module structure can be mapped efficiently to the current page-based memory architecture implemented by the standard processor architectures available today.
...
...

References

Time-sharing computer systems