Protection systems and protection implementations
@inproceedings{Needham1972ProtectionSA, title={Protection systems and protection implementations}, author={Roger M. Needham}, booktitle={AFIPS '72 (Fall, part I)}, year={1972} }
The paper discusses the nature of systems for protection of information in the central memory of a computer, describing the potentialities and limitations of a variety of approaches. It is based upon work done in the course of a current project on protection systems at the Computer Laboratory, Cambridge, and outlines a system which is being developed to the point of hardware implementation in the Laboratory.
Figures from this paper
40 Citations
An extensible file system for hydra
- Computer ScienceICSE '78
- 1978
The design and implementation of the Hydra File System is treated and its implications for subsystem design and Implementation are reflected on.
The protection of information in computer systems
- Computer ScienceProceedings of the IEEE
- 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification by examining in depth the principles of modern protection architectures and the relation between capability systems and access control list systems.
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
- Computer ScienceArXiv
- 2021
It is argued that the challenge of future runtime isolation is best met by embracing the multi-principle nature of applications, rethinking process architecture for fast and extensible intra-process isolation and the Endokernel Architecture exposes an essential set of abstractions for realizing this.
The need for capability policies
- Computer ScienceFTfJP@ECOOP
- 2013
It is argued that current specification methodologies cannot adequately capture all aspects of the capability policies required to support object-capability systems.
Towards Capability Policy Specification and Verification
- Computer Science
- 2013
It is argued that the policies intended by programs using object capabilities should be made explicit and written separately from the code implementing them, and that the specification of such capability policies requires concepts that go beyond the features of current specification languages.
The Need for Capability Policies Position Paper
- Computer Science
- 2013
It is argued that current specification methodologies cannot adequately capture all aspects of the capability policies required to support object-capability systems.
End-to-end arguments in the internet: principles, practices, and theory
- Law
- 2010
This thesis elaborates the end-to-end arguments by putting them into a meaningful context of other principles as well as the current realities of the Internet, and argues for a revised normative take on the endto- end arguments that emphasizes the importance of edge redundancy as a crucial means of extending their scope beyond the classic considerations of data integrity alone.
BASIC PRINCIPLES OF INFORMATION PROTECTION A . Considerations Surrounding the Study of
- 2007
Design of the SPEEDOS operating system kernel
- Computer Science
- 2005
In the prototype implementation it is shown that the virtual memory model used to describe the module structure can be mapped efficiently to the current page-based memory architecture implemented by the standard processor architectures available today.