The protection of information in computer systems

@article{Saltzer1975ThePO,
  title={The protection of information in computer systems},
  author={Jerome H. Saltzer and Michael D. Schroeder},
  journal={Proceedings of the IEEE},
  year={1975},
  volume={63},
  pages={1278-1308}
}
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures-whether hardware or software-that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be… Expand
Operating system security a tutorial of current research
This tutorial is extracted from the recently completed monograph, Computer Security: Its Problems and Solutions [3], and is intended as a technical review of research in the areas of operating systemExpand
Operating System Structures to Support Security and Reliable Software
TLDR
This survey focuses on two system structuring concepts that support security: small protection domains and extended-type objects and explains one approach toward implementing these concepts thoroughly and efficiently. Expand
Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS)
TLDR
The workshop established a foundation for further progress in defining a model for information integrity and proposed a proposal by the National Bureau of Standards for continuing the effort to define an integrity policy. Expand
An Overview of Computer Security
Presented is an overview of computer security, including concepts, techniques, and measures relating to the protection of computing systems and the information they maintain against deliberate orExpand
Information storage in a decentralized computer system
TLDR
A complete model of the architecture for shared information storage in a decentralized computer system is presented, which describes the interface to the facilities provided, and describes in detail the proposed mechanisms for implementing them. Expand
Integrity in Automated Information Systems
TLDR
It is concluded that although some gaps in understanding still exist, it is possible to begin to standardize integrity properties of systems. Expand
Principles of Computer System Design: An Introduction
This text identifies, examines, and illustrates fundamental concepts in computer system design that are common across operating systems, networks, database systems, distributed systems, programmingExpand
Adaptive Management of Protection Processes of the Information from the Non-Authorized Access in Computing Systems
The main idea of this article is recombined protection systems in computing systems. The given data testify that the danger of the non-authorized actions above the information is not simply real, butExpand
Unrestricted Secure Computing
TLDR
This paper proposes a model in which both the software agents and the usage restrictions take place at the network level rather than at the level of the end-user computer, thereby freeing the end of user computer from the clutches of IT and releasing it into the wild to be used to its fullest by the end user. Expand
Protection in a distributed document processing system
TLDR
The ability to audit the processing of a document was found to effect the choice of access control mechanism, and access control lists were found to be more suitable than capability-based schemes. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 184 REFERENCES
Security Controls for Computer Systems
Abstract : With the advent of resource-sharing computer systems that distribute the capabilities and components of the machine configuration among several users or several tasks, a new dimension hasExpand
Dynamic protection structures
TLDR
This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Expand
Ongoing research and development on information protection
TLDR
The report begins with a brief summary of the different kinds of activities being pursued, with references to the later, more explicit project descriptions. Expand
Information Security in a Multi-User Computer Environment
TLDR
The chapter shows that there is no single set of measures that can be taken to obtain “instant security” and that information security is a problem of providing sufficient barriers and controls to force a prospective penetrator into attacks that carry a high risk of detection and/or have a very large work factor. Expand
Protection systems and protection implementations
  • R. Needham
  • Computer Science
  • AFIPS '72 (Fall, part I)
  • 1972
TLDR
The paper outlines a system which is being developed to the point of hardware implementation in the Computer Laboratory, Cambridge, and outlines the potentialities and limitations of a variety of approaches to protection systems. Expand
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
TLDR
A new design is proposed, which provides both type extension and revocation through the definition of generalized sealing of capabilities, and it is demonstrated that it would be workable and acceptable economically. Expand
A hardware architecture for implementing protection rings
TLDR
Hardware processor mechanisms for implementing concentric rings of protection that allow cross-ring calls and subsequent returns to occur without trapping to the supervisor are described. Expand
Computer and data security: a comprehensive annotated bibliography.
Abstract : The report is an attempt to produce a bibliography covering all aspects of computer and data security, and having annotations that more than superficially describe each article's content.Expand
Synthesis of a software security system
TLDR
This paper describes an ongoing Air Force sponsored project at The MITRE Corporation to develop provably effective security (access) controls for computer systems and touches briefly on the components of the software engineering technique and the methodology for proving the correctness of the system. Expand
A user authentication scheme not requiring secrecy in the computer
TLDR
A password scheme is presented which does not require secrecy in the computer and is based on using a function H which the would-be intruder is unable to invert. Expand
...
1
2
3
4
5
...