Protection mechanism

Known as: Computer protection, Protection, Protection mechanisms 
In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… (More)
Is this relevant?
2008
2008
  • S.N. Alsagoff
  • International Symposium on Information Technology
  • 2008
Any software that can disrupt the operation of the PC such as virus, worm or spyware can be defined as a malware. With the advent… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In order to support multimedia applications such as voice and video over the wireless medium, a contention-based channel access… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
It is expected that MPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. To… (More)
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The trend towards extensible software architectures and component-based software development demands safe, efficient, and easy-to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1976
Highly Cited
1976
A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1975
Highly Cited
1975
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel. These mechanisms… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 3.1
  • figure 3.2
Is this relevant?
Highly Cited
1973
Highly Cited
1973
This paper describes the design of mechanisms to control sharing of information in the Multics system. Seven design principles… (More)
Is this relevant?
Highly Cited
1971
Highly Cited
1971
The protection mechanisms of computer systems control the access to objects, especially information objects. The range of… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?