Access Restriction

Author Morgan, H. L. ♦ Maxwell, W. L. ♦ Conway, R. W.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Privacy ♦ Data banks ♦ Access control confidentiality ♦ Operating systems ♦ Access management ♦ Management information systems ♦ Security
Abstract The security of an information system may be represented by a model matrix whose elements are decision rules and whose row and column indices are users and data items respectively. A set of four functions is used to access this matrix at translation and execution time. Distinguishing between data dependent and data independent decision rules enables one to perform much of the checking of security only once at translation time rather than repeatedly at execution time. The model is used to explain security features of several existing systems, and serves as a framework for a proposal for general security system implementation within today's languages and operating systems.
Description Affiliation: Cornell Univ., Ithaca, NY (Conway, R. W.; Maxwell, W. L.; Morgan, H. L.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 15
Issue Number 4
Page Count 10
Starting Page 211
Ending Page 220

Open content in new tab

   Open content in new tab
Source: ACM Digital Library