Affiliation:
1. Univ. of California, Irvine, Irvine
Abstract
A protection model is presented for a general purpose computing system based on tags attached as
seals
and
signatures
to values exchanged among processes. A tag attached to a value as a seal does not prevent that value from being propagated to any place within the system; rather, it guarantees that the value and any information derived from it cannot leave the system unless a matching tag is presented. A tag attached to a value as a signature is used by a process to verify the origin of the received data. Solutions to problems from the areas of interprocess communication and proprietary services are given.
Publisher
Association for Computing Machinery (ACM)
Reference14 articles.
1. A study of protection in programming languages
2. Can programming be liberated from the von Neumann style?
3. Bic L. Protection and security in a dataflow system. Ph.D. Thesis Dept. of Information and Computer Science University of California at Irvine. 1978. Available from University Microfilms 300 North Zeeb Rd Ann Arbor Michigan 48106. Bic L. Protection and security in a dataflow system. Ph.D. Thesis Dept. of Information and Computer Science University of California at Irvine. 1978. Available from University Microfilms 300 North Zeeb Rd Ann Arbor Michigan 48106.
4. Protection in the Hydra Operating System