请输入您要查询的百科知识:

 

词条 Protection mechanism
释义

  1. Notes

  2. References

In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies.[1] A simple definition of a security policy is "to set who may use what information in a computer system".[1]

The access matrix model, first introduced in 1971,[2] is a generalized description of operating system protection mechanisms.[3]

The separation of protection and security is a special case of the separation of mechanism and policy.[4]

Notes

1. ^Jones 1975
2. ^Lampson 1971
3. ^Landwehr 1981
4. ^Wulf 74 pp. 337–345

References

  • Anita K. Jones, Richard J. Lipton The enforcement of security policies for computation ACM Symposium on Operating Systems Principles. Proceedings of the fifth ACM symposium on Operating systems principles. Austin, Texas, United States. pp. 197–206. 1975
  • {{ cite conference | first = Butler W. | last = Lampson | authorlink = Butler W. Lampson | title = Protection | booktitle = Proceedings of the 5th Princeton Conference on Information Sciences and Systems | year = 1971 | pages = 437 }}
  • Carl E. Landwehr Formal Models for Computer Security   Volume 13, Issue 3 (September 1981) pp. 247–278
  • {{cite journal |last=Wulf |first=W. |authorlink=William Wulf |author2=E. Cohen |author3=W. Corwin |author4=A. Jones |author5=R. Levin |author6=C. Pierson |author7=F. Pollack |date=June 1974 |title=HYDRA: the kernel of a multiprocessor operating system |journal=Communications of the ACM |volume=17 |issue=6 |pages=337–345 |url=http://portal.acm.org/citation.cfm?id=364017&coll=portal&dl=ACM |doi=10.1145/355616.364017 }} [https://web.archive.org/web/20070926161655/http://www.cs.virginia.edu/papers/p337-wulf.pdf]

2 : Computer security models|Computer security procedures

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/23 15:20:41