Abstract
In chapter 8 one of the major problems of resource allocation, that of processes deadlocking, was considered. In this chapter the second major problem will be considered, that of control of access to the resources — that is, controlling who can perform which operations and on which objects.
Preview
Unable to display preview. Download preview PDF.
9.6 References and bibliography
D.E. Denning (1982). Cryptography and Data Security, Addison-Wesley, Reading, Mass.
J.B. Dennis and E.C. Van Horn (1966). ‘Programming Semantics for Multiprogramming Computations’, Communications of the ACM, Vol. 9, pp. 143–55.
R.S. Fabry (1974), ‘Capability Based Addressing’, Communications of the ACM Vol. 17, pp. 403–12
R.M. Graham (1968). ‘Protection in an Information Processing Utility’, Communications of the ACM, Vol. 11, pp. 365–9.
F.T. Grampp and R.H. Morris (1984). ‘UNIX Operating System Security’, AT&T Bell Laboratories Technical journal, No. 63, pp. 1649–72.
E.I. Organick (1972). The MULTICS System, MIT Press, Boston.
M.D. Schroeder and J.H. Salzer (1972). ‘A Hardware Architecture for Implementing Protection Rings’, Communications of the ACM, Vol. 15, pp. 157–70.
W.A. Wulf, R. Levin and S.P. Harbison (1981), Hydra/C.mmp: An Experimental Computer System, McGraw-Hill, New York.
Author information
Authors and Affiliations
Copyright information
© 1993 Colin J. Theaker and Graham R. Brookes
About this chapter
Cite this chapter
Theaker, C.J., Brookes, G.R. (1993). Resource Management — Protection. In: Concepts of Operating Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-11511-2_9
Download citation
DOI: https://doi.org/10.1007/978-1-349-11511-2_9
Publisher Name: Palgrave, London
Print ISBN: 978-0-333-52366-7
Online ISBN: 978-1-349-11511-2
eBook Packages: EngineeringEngineering (R0)