Access Restriction

Author Saltzer, Jerome H.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Access control ♦ Privacy ♦ Virtual memory ♦ Multics ♦ Authentication ♦ Proprietary programs ♦ Time-sharing systems ♦ Computer utilities ♦ Descriptors ♦ Security ♦ Protection ♦ Protected subsystems
Abstract The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs. The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection. The paper ends with a discussion of several known weaknesses in the current protection mechanism design.
Description Affiliation: Massachusetts Institute of Technology, Cambridge (Saltzer, Jerome H.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 17
Issue Number 7
Page Count 15
Starting Page 388
Ending Page 402

Open content in new tab

   Open content in new tab
Source: ACM Digital Library