{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:47:09Z","timestamp":1725662829796},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540087557"},{"type":"electronic","value":"9783540358800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1007\/3-540-08755-9_6","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T16:33:07Z","timestamp":1330187587000},"page":"228-251","source":"Crossref","is-referenced-by-count":3,"title":["Protection mechanisms and the enforcement of security policies"],"prefix":"10.1007","author":[{"given":"Anita K.","family":"Jones","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"6_CR1","first-page":"291","volume":"42","author":"J. Buzen","year":"1973","unstructured":"Buzen, J. and U. Gagliardi, The Evolution of Virtual Machine Architecture. AFIPS Conference Proceedings, 42, NCC 1973, 291\u2013300.","journal-title":"AFIPS Conference Proceedings"},{"issue":"5","key":"6_CR2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1067629.806532","volume":"9","author":"E. Cohen","year":"1975","unstructured":"Cohen, E. and D. Jefferson, Protection in the Hydra Operating Systems, Proceedings Fifth ACM Symposium on Operating System Principles; ACM Operating Systems Review 9, 5 (November 1975) 141\u2013160.","journal-title":"ACM Operating Systems Review"},{"issue":"7","key":"6_CR3","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D. Denning","year":"1977","unstructured":"Denning, D. and P. Denning, Certification of Programs for Secure Information Flow. CACM, 20, 7 (July 1977) 504\u2013512.","journal-title":"CACM"},{"issue":"3","key":"6_CR4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/365230.365252","volume":"9","author":"J. Dennis","year":"1966","unstructured":"Dennis, J. and E. Van Horn, Programming Semantics for Multiprogrammed Computations. CACM 9, 3 (March 1966) 143\u2013155.","journal-title":"CACM"},{"key":"6_CR5","unstructured":"Dobkin, D., A. K. Jones, R. Lipton, Secure Data Bases: Protection Against User Inference. Transactions on Data Bases, to be published."},{"key":"6_CR6","unstructured":"England, D. M., Architectural Features of System 250. Proceedings International Switching Symposium, 1972."},{"issue":"7","key":"6_CR7","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/361011.361070","volume":"17","author":"R. S. Fabry","year":"1974","unstructured":"Fabry, R. S., Capability Based Addressing. CACM, 17, 7 (July 1974) 403\u2013412.","journal-title":"CACM"},{"key":"6_CR8","unstructured":"Ferrie, J., D. Kaiser, D. Lanciaux, and B. Martin, An Extensible Structure for Protected System Design. Proceedings IRIA International Workshop on Protection in Operating Systems, France, 1974."},{"issue":"7","key":"6_CR9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TC.1973.5009130","volume":"C2","author":"E. A. Feustel","year":"1973","unstructured":"Feustel, E. A., On the Advantages of Tagged Architecture IEEE Transactions on Computers, C2, 7, 1973, 644\u2013656.","journal-title":"IEEE Transactions on Computers"},{"key":"6_CR10","unstructured":"Gold, B., R. Linde, M. Schaefer, and J. Scheid, Final Report: Periods Processing versus KVM\/370. System Development Corporation Technical Report, May 1977."},{"key":"6_CR11","first-page":"417","volume":"40","author":"G. S. Graham","year":"1972","unstructured":"Graham, G. S. and P. J. Denning, Protection\u2014Principles and Practice. AFIPS Conference Proceedings, 40, SJCC 1972, 417\u2013429.","journal-title":"AFIPS Conference Proceedings"},{"key":"6_CR12","unstructured":"Habermann, A. N., Introduction to Operating System Design. SRA, 1976."},{"key":"6_CR13","unstructured":"Hoffman, L. J., Modern Methods for Computer Security and Privacy. Prentice Hall, 1977."},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1002\/spe.4380050403","volume":"5","author":"A. K. Jones","year":"1975","unstructured":"Jones, A. K. and W. A. Wulf, Towards the Design of Secure Systems. Software\u2014Practice and Experience, 5 (October\u2013December 1975) 321\u2013336.","journal-title":"Software\u2014Practice and Experience"},{"key":"6_CR15","unstructured":"Jones, A. K. and R. J. Lipton, The Enforcement of Security Policies for Computation. Carnegie-Mellon University Department of Computer Science Technical Report, May 75."},{"issue":"4","key":"6_CR16","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TSE.1976.233833","volume":"SE-2","author":"A. K. Jones","year":"1976","unstructured":"Jones, A. K. and B. H. Liskov, A Language Extension for Controlling Access to Shared Data. IEEE IEEE Transactions on Software Engineering, SE-2, 4 (December 1976) 277\u2013284.","journal-title":"IEEE IEEE Transactions on Software Engineering"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Jones, A. K., R. J. Chansler, Jr., I. Durham, P. Feiler, and K. Schwans, Software Management of Cm\u2014A Multiple Microprocessor. AFIPS Conference Proceedings, NCC 1977.","DOI":"10.1145\/1499402.1499517"},{"key":"6_CR18","unstructured":"Moore, C. G., Potential Capabilities in ALGOL-like Programs. Cornell Department of Computer Science Technical Report (September 1974)."},{"key":"6_CR19","unstructured":"Lampson, B. W., Protection. Proceedings Fifth Annual Princeton Conference on Information Sciences and Systems (1971) 437\u2013443. Reprinted in ACM Operating Systems Review (January 1974)."},{"issue":"10","key":"6_CR20","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. W. Lampson","year":"1973","unstructured":"Lampson, B. W., A Note on the Confinement Problem. CACM, 16, 10 (October 1973) 613\u2013615.","journal-title":"CACM"},{"issue":"5","key":"6_CR21","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/360051.360074","volume":"19","author":"B. W. Lampson","year":"1976","unstructured":"Lampson, B. W. and H. Sturgis, Reflections on an Operating System Design. CACM 19, 5 (May 1976), 251\u2013266.","journal-title":"CACM"},{"issue":"4","key":"6_CR22","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1145\/356678.356682","volume":"8","author":"T. A. Linden","year":"1976","unstructured":"Linden, T. A., Operating System Structures to Support Security and Reliable Software. ACM Computing Surveys, 8, 4 (December 1976) 409\u2013445.","journal-title":"ACM Computing Surveys"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Liskov, B. and S. Zilles, Specification Techniques for Data Abstractions. Proceedings of the International Conference on Reliable Software, SIGPLAN Notices 12, 3 (1975).","DOI":"10.1145\/800027.808426"},{"issue":"1","key":"6_CR24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/361932.361937","volume":"16","author":"J. H. Morris Jr.","year":"1973","unstructured":"Morris, J. H., Jr., Protection in Programming Languages. CACM, 16, 1 (January 1973) 15\u201321.","journal-title":"CACM"},{"key":"6_CR25","unstructured":"Needham, R. M. and R. D. H. Walker, Protection and Process Management in the CAP Computer, Proceedings IRIA International Workshop on Protection in Operating Systems, France (1974) 155\u2013160."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Popek, G., Protection Structures. Computer (June 1974) 22\u201333.","DOI":"10.1109\/MC.1974.6323580"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Popek, G. and C. Kline, Verifiable Secure Operating Software. AFIPS Conference Proceedings 43, NCC (1974).","DOI":"10.1145\/1500175.1500204"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Popek, G. and D. Farber, A Model for Verification of Security in Operating Systems. CACM, to be published.","DOI":"10.1145\/359588.359597"},{"key":"6_CR29","unstructured":"Radin, G. and P. Schneider, An Architecture for an Extended Machine with Protected Addressing. IBM Research TR 00.2757, May 1976."},{"key":"6_CR30","unstructured":"Redell, D. R. and R. S. Fabry, Selective Revocation of Capabilities. IRIA International Workshop on Protection in Operating Systems, France (1974) 197\u2013210."},{"issue":"9","key":"6_CR31","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. H. Saltzer","year":"1975","unstructured":"Saltzer, J. H. and M. Schroeder, The Protection of Information in Computer Systems, Proceedings of the IEEE, 63, 9 (September 1975) 1278\u20131308.","journal-title":"Proceedings of the IEEE"},{"key":"6_CR32","unstructured":"Saltzer, J. H., Private Communication."},{"key":"6_CR33","unstructured":"Schroeder, M., Cooperation of Mutually Suspicious Subsystems in a Computer Utility, Doctoral Thesis, MIT Technical Report, 1972."},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Schroeder, M, D. Clark, and J. Saltzer, The Multics Kernel Design. Sixth Symposium on Operating System Principles (November 1977).","DOI":"10.1145\/800214.806546"},{"issue":"6","key":"6_CR35","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","volume":"17","author":"W. A. Wulf","year":"1974","unstructured":"Wulf, W. A., et al, Hydra: The Kernel of a Multiprocessor Operating System. CACM [17], 6 (June 1974) 337\u2013345.","journal-title":"CACM"}],"container-title":["Lecture Notes in Computer Science","Operating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-08755-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:53Z","timestamp":1605643193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-08755-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"ISBN":["9783540087557","9783540358800"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/3-540-08755-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1978]]}}}