The enforcement of security policies for computation
作者:
Highlights:
•
摘要
Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap between them with the concept of soundness: whether a protection mechanism enforces a policy. Different sound protection mechanisms for the same policy can then be compared. We also show that the “union” of mechanisms for the same program produces a more “complete” mechanism. Although a “maximal” mechanism exists, it cannot necessarily be constructed.
论文关键词:
论文评审过程:Received 19 February 1976, Revised 10 November 1977, Available online 3 December 2003.
论文官网地址:https://doi.org/10.1016/0022-0000(78)90033-8