• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

The protection of information in computer systems

Cached

  • Download as a PDF

Download Links

  • [cs.unomaha.edu]
  • [www.cs.utsa.edu]
  • [www.cs.utsa.edu]
  • [www.ece.rutgers.edu]
  • [www.cse.unsw.edu.au]
  • [www.cse.unsw.edu.au]
  • [www.diku.dk]
  • [www.cse.unsw.edu.au]
  • [www.cse.unsw.edu.au]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Jerome H. Saltzer , Michael D. Schroeder
Citations:821 - 2 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Saltzer_theprotection,
    author = {Jerome H. Saltzer and Michael D. Schroeder},
    title = {The protection of information in computer systems},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysis of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading. Glossary The following glossary provides, for reference, brief definitions for several terms as used in this paper in the context of protecting information in computers. Access The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians. Access control list A list of principals that are authorized to have access to some object. Authenticate To verify the identity of a person (or other agent external to the protection system) making a request.

Keyphrases

access control list list    brief analysis    protection system    design principle    section iii    desired function    protected object    several term    computer system    modern protection architecture    tutorial paper    section ii    access control list system    information protection    computer-stored information    current research project    first section    unauthorized use    brief definition    descriptor-based computer architecture    elementary protection    capability system    protected subsystem    main section    second section    authentication mechanism    architectural structure   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University