The protection of information in computer systems
- 1 January 1975
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 63 (9), 1278-1308
- https://doi.org/10.1109/proc.1975.9939
Abstract
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures-whether hardware or software-that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysts of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading.Keywords
This publication has 50 references indexed in Scilit:
- A high security log-in procedureCommunications of the ACM, 1974
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974
- Protection and the control of information sharing in multicsCommunications of the ACM, 1974
- The UNIX time-sharing systemCommunications of the ACM, 1974
- Dynamic verification of operating system decisionsCommunications of the ACM, 1973
- Protection in programming languagesCommunications of the ACM, 1973
- The Multics virtual memoryCommunications of the ACM, 1972
- On the implementation of security measures in information systemsCommunications of the ACM, 1972
- A hardware architecture for implementing protection ringsCommunications of the ACM, 1972
- Segmentation and the Design of Multiprogrammed Computer SystemsJournal of the ACM, 1965