Zusammenfassung
Ausgehend von Systemen, die sich durch Subjekte, Objekte und die beiden Subjekt-Objekt-Beziehungen „Lesen” und „Modifizieren” darstellen lassen, wird mittels abstrakter Modelle untersucht, welche Strukturen in einem System möglich sind, das die Geheimhaltung von Daten gegen unbefugten Zugriff garantiert. Anhand von Beispielen wird die Beziehung Modell—Realität aufgezeigt.
Abstract
By means of abstract models we consider systems, that are represented by subjects, objects and the two subject-object-relations “read” and “modify”. The possible structures in a system, that guarantees the privacy of data, are examined. The relation between the models and the real world is shown by some examples.
Literatur
Dennis, J. B., van Horn, E. C.: Programming semantics for multiprogrammed computations. CACM9, 143–155 (1966).
Lampson, B. W.: Dynamic protection structures. AFIPS Conf. Proc. 35, Fall Joint Computer Conference 1969, pp. 27–38.
Lampson, B. W.: Protection. Proc. 5th Princeton Conf. Information Sciences and Systems (1971), pp. 437–443.
Graham, G. S., Denning, P. J.: Protection — Principles and Practice. Proc. 1972 SJCC, pp. 417–429.
Popek, G. J., Kline, C. S.: A verifiable protection system. Proc. Int. Conf. of Reliable Software, Los Angeles, Calif. (April 1975).
Schroeder, M. D., Saltzer, J. H.: A hardware architecture for implementing protection rings. CACM15, 157–170 (1972).
Saltzer, J. M.: Protection and the Control of Information Sharing in Multics. CACM17, 388–402 (1974).
Spier, M. J., Hastings, T. N., Cutler, D. N.: A storage mapping technique for the implementation of protective domains. Software — Practice and Experience4, 215–230 (1974).
Wulf, W. A., et al.: Hydra. The kernel of a multiprocessor operating system. CACM17, 337–345 (1974).
Redell, D. D.: Naming and protection in extendible operating systems. NTIS AD/A-001721.
Walter, K. G., et al.: Primitive models for computer security. NTIS AD/3-778467.
Walter, K. G., et al.: Structured spezification of a security kernel. Proc. Int. Conf. of Reliable Software, Los Angeles, Calif. (April 1975).
Bell, D. E., La Padula, L. J.: Secure computer systems: Mathematical foundations. NTIS AD-770768.
Bell, D. E., La Padula, L. J.: Secure computer systems: A mathematical model. NTIS AD-771543.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
vor der Brück, H. Abstrakte Modelle zur Untersuchung von sicheren Systemen. Computing 19, 15–28 (1977). https://doi.org/10.1007/BF02260738
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/BF02260738