The protection of information in computer systems

@article{Saltzer1975ThePO,
  title={The protection of information in computer systems},
  author={J. H. Saltzer and M. Schroeder},
  journal={Proceedings of the IEEE},
  year={1975},
  volume={63},
  pages={1278-1308}
}
  • J. H. Saltzer, M. Schroeder
  • Published 1975
  • Computer Science
  • Proceedings of the IEEE
  • This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures-whether hardware or software-that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be… CONTINUE READING

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 178 REFERENCES
    Security Controls for Computer Systems
    • 62
    Dynamic protection structures
    • 179
    • Highly Influential
    Ongoing research and development on information protection
    • 15
    • Open Access
    Information Security in a Multi-User Computer Environment
    • 46
    • Highly Influential
    Protection systems and protection implementations
    • 40
    • Highly Influential
    • Open Access
    NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
    • 87
    • Highly Influential
    A hardware architecture for implementing protection rings
    • 164
    • Open Access
    Synthesis of a software security system
    • 8
    A user authentication scheme not requiring secrecy in the computer
    • 182
    • Open Access