×

Theft and conspiracy in the Take-Grant protection model. (English) Zbl 0492.68054


MSC:

68R10 Graph theory (including graph drawing) in computer science
68N99 Theory of software
68N25 Theory of operating systems

References:

[1] Harrison, M. A.; Ruzzo, W. L.; Ullman, J. D., Protection in operating systems, Commun. Assoc. Comput. Mach., 19, No. 8 (1976) · Zbl 0327.68041
[2] Lipton, R. J.; Snyder, L., A linear time algorithm for deciding subject security, 24, No. 3, 455-464 (1977) · Zbl 0358.68041
[3] Jones, A. K.; Lipton, R. J.; Snyder, L., A linear time algorithm for deciding security, (Proceedings, 17th FOCS (1976)) · Zbl 0358.68041
[4] Snyder, L., Analysis and synthesis in the Take-Grant system, (Proceedings, 6th SOSP (1977))
[5] Snyder, L., Formal models of capability-based protection systems, IEEE Trans. Comput. (1981) · Zbl 0454.68131
[6] Budd, T.; Lipton, R. J., Inert Rights and Conspirators in the Take/Grant System, Yale Department of Computer Science Technical Report No. 126 (1977)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.