Thumbnail
Access Restriction
Subscribed

Author Lampson, Butler W.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Privacy ♦ Confinement ♦ Proprietary program ♦ Leakage of data ♦ Security ♦ Protection
Abstract onfining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.
Description Affiliation: Xerox Palo Alto Research Center, Palo Alto, CA (Lampson, Butler W.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 16
Issue Number 10
Page Count 3
Starting Page 613
Ending Page 615


Open content in new tab

   Open content in new tab
Source: ACM Digital Library