Resource Management — Protection

  • Colin J. Theaker
  • Graham R. Brookes
Chapter
Part of the Macmillan Computer Science Series book series (COMPSS)

Abstract

In chapter 8 one of the major problems of resource allocation, that of processes deadlocking, was considered. In this chapter the second major problem will be considered, that of control of access to the resources — that is, controlling who can perform which operations and on which objects.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9.6 References and bibliography

  1. D.E. Denning (1982). Cryptography and Data Security, Addison-Wesley, Reading, Mass.Google Scholar
  2. J.B. Dennis and E.C. Van Horn (1966). ‘Programming Semantics for Multiprogramming Computations’, Communications of the ACM, Vol. 9, pp. 143–55.CrossRefGoogle Scholar
  3. R.S. Fabry (1974), ‘Capability Based Addressing’, Communications of the ACM Vol. 17, pp. 403–12CrossRefGoogle Scholar
  4. R.M. Graham (1968). ‘Protection in an Information Processing Utility’, Communications of the ACM, Vol. 11, pp. 365–9.CrossRefGoogle Scholar
  5. F.T. Grampp and R.H. Morris (1984). ‘UNIX Operating System Security’, AT&T Bell Laboratories Technical journal, No. 63, pp. 1649–72.Google Scholar
  6. E.I. Organick (1972). The MULTICS System, MIT Press, Boston.Google Scholar
  7. M.D. Schroeder and J.H. Salzer (1972). ‘A Hardware Architecture for Implementing Protection Rings’, Communications of the ACM, Vol. 15, pp. 157–70.CrossRefGoogle Scholar
  8. W.A. Wulf, R. Levin and S.P. Harbison (1981), Hydra/C.mmp: An Experimental Computer System, McGraw-Hill, New York.Google Scholar

Copyright information

© Colin J. Theaker and Graham R. Brookes 1993

Authors and Affiliations

  • Colin J. Theaker
    • 1
  • Graham R. Brookes
    • 2
  1. 1.Staffordshire UniversityUK
  2. 2.Hull UniversityUK

Personalised recommendations