Skip to main content
Log in

Abstrakte Modelle zur Untersuchung von sicheren Systemen

Abstract models for examining secure systems

  • Published:
Computing Aims and scope Submit manuscript

Zusammenfassung

Ausgehend von Systemen, die sich durch Subjekte, Objekte und die beiden Subjekt-Objekt-Beziehungen „Lesen” und „Modifizieren” darstellen lassen, wird mittels abstrakter Modelle untersucht, welche Strukturen in einem System möglich sind, das die Geheimhaltung von Daten gegen unbefugten Zugriff garantiert. Anhand von Beispielen wird die Beziehung Modell—Realität aufgezeigt.

Abstract

By means of abstract models we consider systems, that are represented by subjects, objects and the two subject-object-relations “read” and “modify”. The possible structures in a system, that guarantees the privacy of data, are examined. The relation between the models and the real world is shown by some examples.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Dennis, J. B., van Horn, E. C.: Programming semantics for multiprogrammed computations. CACM9, 143–155 (1966).

    Google Scholar 

  2. Lampson, B. W.: Dynamic protection structures. AFIPS Conf. Proc. 35, Fall Joint Computer Conference 1969, pp. 27–38.

  3. Lampson, B. W.: Protection. Proc. 5th Princeton Conf. Information Sciences and Systems (1971), pp. 437–443.

  4. Graham, G. S., Denning, P. J.: Protection — Principles and Practice. Proc. 1972 SJCC, pp. 417–429.

  5. Popek, G. J., Kline, C. S.: A verifiable protection system. Proc. Int. Conf. of Reliable Software, Los Angeles, Calif. (April 1975).

  6. Schroeder, M. D., Saltzer, J. H.: A hardware architecture for implementing protection rings. CACM15, 157–170 (1972).

    Google Scholar 

  7. Saltzer, J. M.: Protection and the Control of Information Sharing in Multics. CACM17, 388–402 (1974).

    Google Scholar 

  8. Spier, M. J., Hastings, T. N., Cutler, D. N.: A storage mapping technique for the implementation of protective domains. Software — Practice and Experience4, 215–230 (1974).

    Google Scholar 

  9. Wulf, W. A., et al.: Hydra. The kernel of a multiprocessor operating system. CACM17, 337–345 (1974).

    Google Scholar 

  10. Redell, D. D.: Naming and protection in extendible operating systems. NTIS AD/A-001721.

  11. Walter, K. G., et al.: Primitive models for computer security. NTIS AD/3-778467.

  12. Walter, K. G., et al.: Structured spezification of a security kernel. Proc. Int. Conf. of Reliable Software, Los Angeles, Calif. (April 1975).

  13. Bell, D. E., La Padula, L. J.: Secure computer systems: Mathematical foundations. NTIS AD-770768.

  14. Bell, D. E., La Padula, L. J.: Secure computer systems: A mathematical model. NTIS AD-771543.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

vor der Brück, H. Abstrakte Modelle zur Untersuchung von sicheren Systemen. Computing 19, 15–28 (1977). https://doi.org/10.1007/BF02260738

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02260738

Navigation