Process execution controls as a mechanism to ensure consistency

E. Bacic
{"title":"Process execution controls as a mechanism to ensure consistency","authors":"E. Bacic","doi":"10.1109/CSAC.1989.81040","DOIUrl":null,"url":null,"abstract":"A mechanism for ensuring that the changes to a system and its data occur in a consistent manner is presented. The mechanism, process execution controls, imposes restrictions on the method of access to the data, unlike access controls which impose restrictions upon which users can access the data. This mechanism imposes another layer to the currently existing access control restrictions, but one that is, for the most part, transparent to the user. Although transparent, the system offers the capability of containing viruses within a given domain. The author presents two methods of implementation; extending current access control lists and implementing complementary execution control lists.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"214 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

A mechanism for ensuring that the changes to a system and its data occur in a consistent manner is presented. The mechanism, process execution controls, imposes restrictions on the method of access to the data, unlike access controls which impose restrictions upon which users can access the data. This mechanism imposes another layer to the currently existing access control restrictions, but one that is, for the most part, transparent to the user. Although transparent, the system offers the capability of containing viruses within a given domain. The author presents two methods of implementation; extending current access control lists and implementing complementary execution control lists.<>
流程执行控制作为确保一致性的机制
提出了一种确保系统及其数据的更改以一致的方式发生的机制。进程执行控制机制对访问数据的方法施加了限制,而访问控制对用户访问数据的方式施加了限制。这种机制为当前存在的访问控制限制增加了另一层,但在大多数情况下,这一层对用户是透明的。虽然透明,但该系统提供了在给定域内包含病毒的能力。作者提出了两种实现方法;扩展当前的访问控制列表并实现互补的执行控制列表。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信