Concepts of Operating Systems pp 125-140 | Cite as
Resource Management — Protection
Chapter
Abstract
In chapter 8 one of the major problems of resource allocation, that of processes deadlocking, was considered. In this chapter the second major problem will be considered, that of control of access to the resources — that is, controlling who can perform which operations and on which objects.
Preview
Unable to display preview. Download preview PDF.
9.6 References and bibliography
- D.E. Denning (1982). Cryptography and Data Security, Addison-Wesley, Reading, Mass.Google Scholar
- J.B. Dennis and E.C. Van Horn (1966). ‘Programming Semantics for Multiprogramming Computations’, Communications of the ACM, Vol. 9, pp. 143–55.CrossRefGoogle Scholar
- R.S. Fabry (1974), ‘Capability Based Addressing’, Communications of the ACM Vol. 17, pp. 403–12CrossRefGoogle Scholar
- R.M. Graham (1968). ‘Protection in an Information Processing Utility’, Communications of the ACM, Vol. 11, pp. 365–9.CrossRefGoogle Scholar
- F.T. Grampp and R.H. Morris (1984). ‘UNIX Operating System Security’, AT&T Bell Laboratories Technical journal, No. 63, pp. 1649–72.Google Scholar
- E.I. Organick (1972). The MULTICS System, MIT Press, Boston.Google Scholar
- M.D. Schroeder and J.H. Salzer (1972). ‘A Hardware Architecture for Implementing Protection Rings’, Communications of the ACM, Vol. 15, pp. 157–70.CrossRefGoogle Scholar
- W.A. Wulf, R. Levin and S.P. Harbison (1981), Hydra/C.mmp: An Experimental Computer System, McGraw-Hill, New York.Google Scholar
Copyright information
© Colin J. Theaker and Graham R. Brookes 1993