The logic of protection

  • L. Kohout
  • B. R. Gaines
Betriebsysteme II
Part of the Lecture Notes in Computer Science book series (LNCS, volume 34)


This paper presents a brief exposition of the role of various mathematical techniques in the development and utilization of resource protection structures for computers. The first section is concerned with the semantics of the problem — the distinction between protection problems in general and those whose complexity necessitates deeper theoretical treatment. The second section considers the roles of algebraic, topological, and modal/multi-valued logic, techniques in the analysis of protection. Finally we give an analysis of a current protection model to illustrate the problems and techniques.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9. References

  1. 1.
    R.M. Fano, "The MAC system: a progress report", in M.A. Fass and W.D. Wilkinson (eds) Computer Augmentation of Human Reasoning, Washington: Spartan Books, pp. 131–150, 1965.Google Scholar
  2. 2.
    E.I. Organick, The Multics System, MIT Press, 1972.Google Scholar
  3. 3.
    E.E. David and R.M. Fano, "Some thoughts about the social implications of accessible computing", AFIPS FJCC, vol. 27, pp. 243–247, Washington: Spartan Books, 1965.Google Scholar
  4. 4.
    A. Westin, Privacy and Freedom, New York: Atheneum, 1968.Google Scholar
  5. 5.
    A. Miller, The Assault on Privacy, University of Michigan Press, 1971.Google Scholar
  6. 6.
    E.W. Djikstra, "Cooperating sequential processes", in F. Genuys (ed.) Programming Languages, London: Academic Press, 1968.Google Scholar
  7. 7.
    J.B. Dennis, "Modularity", in F.L. Bauer (ed.) Advanced Course in Software Engineering, Lecture Notes in Economics and Mathematical Systems, vol. 81, pp. 128–182, Berlin, Springer-Verlag, 1973.Google Scholar
  8. 8.
    O.J. Dahl, E.W. Djikstra and C.A.R. Hoare, Structured Programming, London: Academic Press, 1972.Google Scholar
  9. 9.
    G.E. Hughes and M.J. Creswell, An Introduction to Modal Logic, London: Methuen, 1968.Google Scholar
  10. 10.
    D.P. Synder, Modal Logic, New York: Van Nostrand, 1971.Google Scholar
  11. 11.
    B.R. Gaines, P.V. Facey, F.K. Williamson and J.A. Maine, "Design objectives for a descriptor-organised minicomputer", Proc. EUROCOMP 74, pp. 29–45, London: Online Ltd, May 1974.Google Scholar
  12. 12.
    F.K. Williamson, B.R. Gaines, J.A. Maine and P.V. Facey, "A high-level minicomputer", IFIP, Stockholm, August 1974.Google Scholar
  13. 13.
    B.R. Gaines, M. Haynes and D. Hill, "Integration of protection and procedures in a high-level minicomputer", IEE Conf., London, November 1974.Google Scholar
  14. 14.
    L. Kohout, "The Pinkava many-valued complete logic systems and their application to the design of many-valued switching circuits", Proc. Int. Symp. on Multiple-Valued Logic, IEEE, pp. 261–284, May 1974.Google Scholar
  15. 15.
    L. Kohout, "Generalized topologies: works of the Čech topological school and their relevance to general systems", Int. J. General Systems, vol. 2, Jan. 1975, to appear.Google Scholar
  16. 16.
    "The plan for information society", Final Report of the Computerization Committee of the Japan Computer Usage Development Institute, Tokyo, 1972.Google Scholar
  17. 17.
    G.S. Graham and P.J. Denning, "Protection — principles and practice", AFIPS SJCC, vol. 40, pp. 417–429, 1972.Google Scholar
  18. 18.
    G.J. Popek, "Protection structures", Computer, vol. 7, pp. 22–23, June 1974.Google Scholar
  19. 19.
    B.W. Lampson, "Dynamic protection structures", AFIPS FJCC, vol. 35, pp. 27–38, 1969.Google Scholar
  20. 20.
    R.M. Needham, "Protection systems and protection implementations", AFIPS FJCC, vol. 41, pp. 572–578, New Jersey: AFIPS Press 1972.Google Scholar
  21. 21.
    D.M. England, "Architectural features of system 250", INFOTECH State of Art Report on Operating Systems, 1972.Google Scholar
  22. 22.
    A.K. Jones, "Protection in programmed systems", Ph.D. thesis, Carnegie-Mellon University, 1973.Google Scholar
  23. 23.
    R.W. Conway, W.L. Maxwell and H.L. Morgan, "On the implementation of security measures in information systems", Comm. ACM, vol. 15, pp. 211–220, 1972.Google Scholar
  24. 24.
    H.L. Morgan, "An interrupt-based organization for management information systems", Comm. ACM, vol. 13, pp. 734–739, 1970.Google Scholar
  25. 25.
    M. Zelkowitz, "Interrupt driven programming", Comm. ACM, vol. 14, pp. 417–418, 1971.Google Scholar
  26. 26.
    E.A. Feustel, "On the advantages of tagged architecture", IEEE Trans. Comp., vol. C-22, pp. 644–656, 1973.Google Scholar
  27. 27.
    G.J. Sussman and D.W. McDermott, "From PLANNER to CONNIVER — a genetic approach", AFIPS FJCC, vol. 41, pp. 1171–1179, New Jersey: AFIPS Press, 1972.Google Scholar
  28. 28.
    R.M. Burstall, J.S. Collins and R.J. Popplestone, Programming in POP-2, Edinburgh University Press, 1971.Google Scholar
  29. 29.
    B. Wegbreit, "The treatment of data types in ELl", Comm. ACM, vol. 17, pp. 251–264, 1974.Google Scholar
  30. 30.
    B.R. Gaines, P.V. Facey and J. Sams, "An interactive, display-based system for gilt-edged security broking", Proc. EUROCOMP 74, pp. 155–169, London: Online Ltd, May 1974.Google Scholar
  31. 31.
    B.R. Gaines and P.V. Facey, "Some experience in interactive systems development and application", Proc. IEEE, June 1975, to appear.Google Scholar
  32. 32.
    E.J. Lemmon, "Algebraic semantics for modal logics I", J. Sym. Logic, vol. 31, pp. 46–65, June 1966.Google Scholar
  33. 33.
    E.J. Lemmon, "Algebraic semantics for modal logics II", J. Sym. Logic, vol. 31, pp. 191–218, June 1966.Google Scholar
  34. 34.
    S. MacLane, Categories for the working mathematician, New York: Springer, 1971.Google Scholar
  35. 35.
    J.A. Goguen, "Semantics of computation", in Proc. 1st Int. Symp. on Category Theory Applied to Computation and Control, Massachusetts, February 1974.Google Scholar
  36. 36.
    A.A. Arbib and E.G. Manes, "Foundations of system theory", Automatica, vol. 10, pp. 285–302, 1974.Google Scholar
  37. 37.
    A. Eilenberg, Automata, Languages and Machines, vol. A, New York: Academic Press, 1974.Google Scholar
  38. 38.
    E. Čech, Topological Spaces, Academia, Prague & J. Wiley, Interscience, New York, 1966.Google Scholar
  39. 39.
    K. Koutský and M. Sekanina, "Modifications of Topologies", In: General Topology and its Relation to Modern Analysis and Algebra 1, (Proceedings of the Symposium Prague 1961). Academic Press, New York & Academia, Prague, 1962.Google Scholar
  40. 40.
    P. Materna, "On problems (semantic study)", Rozpravy Československé Akademie Věd, vol. 80, sešit 8, pp. 1–62, 1970. (Published by Academia, Prague).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1975

Authors and Affiliations

  • L. Kohout
    • 2
    • 1
  • B. R. Gaines
    • 2
  1. 1.University College Hospital Medical SchoolUniversity of LondonU.K.
  2. 2.Man-Machine Systems Laboratory, Dept. of Electrical Engineering ScienceUniversity of EssexColchesterU.K.

Personalised recommendations