Skip to main content

Part of the book series: Macmillan Computer Science Series ((COMPSS))

  • 11 Accesses

Abstract

This chapter is intended to introduce to the reader the concept of the ‘protected subsystem’. These subsystems may be used to provide protection in a wide variety of applications. An example of their use is in the protection of the registry databases. A simple tutorial is presented to demonstrate the way in which a protected subsystem may be created.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Administering Your Domain System, Apollo Computer Inc, Order Number 001746.

    Google Scholar 

Download references

Authors

Copyright information

© 1988 B. G. Blundell and C. N. Daskalakis

About this chapter

Cite this chapter

Brennan, G. (1988). Protected Subsystems. In: Using and Administering an Apollo Network. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-10308-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-10308-9_8

  • Publisher Name: Palgrave, London

  • Print ISBN: 978-0-333-46804-3

  • Online ISBN: 978-1-349-10308-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics