Skip to main content

Resource Management — Protection

  • Chapter
Concepts of Operating Systems

Part of the book series: Macmillan Computer Science Series ((COMPSS))

  • 65 Accesses

Abstract

In chapter 8 one of the major problems of resource allocation, that of processes deadlocking, was considered. In this chapter the second major problem will be considered, that of control of access to the resources — that is, controlling who can perform which operations and on which objects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9.6 References and bibliography

  • D.E. Denning (1982). Cryptography and Data Security, Addison-Wesley, Reading, Mass.

    Google Scholar 

  • J.B. Dennis and E.C. Van Horn (1966). ‘Programming Semantics for Multiprogramming Computations’, Communications of the ACM, Vol. 9, pp. 143–55.

    Article  Google Scholar 

  • R.S. Fabry (1974), ‘Capability Based Addressing’, Communications of the ACM Vol. 17, pp. 403–12

    Article  Google Scholar 

  • R.M. Graham (1968). ‘Protection in an Information Processing Utility’, Communications of the ACM, Vol. 11, pp. 365–9.

    Article  Google Scholar 

  • F.T. Grampp and R.H. Morris (1984). ‘UNIX Operating System Security’, AT&T Bell Laboratories Technical journal, No. 63, pp. 1649–72.

    Google Scholar 

  • E.I. Organick (1972). The MULTICS System, MIT Press, Boston.

    Google Scholar 

  • M.D. Schroeder and J.H. Salzer (1972). ‘A Hardware Architecture for Implementing Protection Rings’, Communications of the ACM, Vol. 15, pp. 157–70.

    Article  Google Scholar 

  • W.A. Wulf, R. Levin and S.P. Harbison (1981), Hydra/C.mmp: An Experimental Computer System, McGraw-Hill, New York.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 1993 Colin J. Theaker and Graham R. Brookes

About this chapter

Cite this chapter

Theaker, C.J., Brookes, G.R. (1993). Resource Management — Protection. In: Concepts of Operating Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-11511-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-11511-2_9

  • Publisher Name: Palgrave, London

  • Print ISBN: 978-0-333-52366-7

  • Online ISBN: 978-1-349-11511-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics