An approach to computer security

dc.contributor.authorWoolsey, James Richarden_US
dc.date.accessioned2024-08-15T20:18:35Z
dc.date.available2024-08-15T20:18:35Z
dc.date.copyright1985en_US
dc.date.issued1985
dc.degree.departmentDepartment of Computer Science
dc.degree.levelMaster of Science M.Sc.en
dc.description.abstractNo general purpose computer operating system can com­pletely prevent illegal or illicit access of data that it controls. An illegal system access can be an accidental or deliberate attack on the system, and is usually due to carelessness of users or to flaws in the design of the system. Systems are flawed because they, and the assump­tions on which system security is based, are not well understood. Our ideas of system security are based on the finite state machine model, which can be defined in a pre­cise, formal manner. To enable large systems with many states to be described, we use the mode class model. Using the concept of a finite state machine, we define what a system is, what entities are with respect to a sys­tem, and what it means for an entity to be independent in a system. We are then able to describe what it means for a system to be secure. As well, we describe how the parts of systems, such as programmes and processes, can be defined as entities. These concepts permit us to describe how secure systems can be designed. As a practical exam­ple of the theory, we show how a UNIX-like system that does not have many of the same security and allocation problems as current UNIX and UNIX-like systems can be pro­duced.
dc.format.extent105 pages
dc.identifier.urihttps://hdl.handle.net/1828/20193
dc.rightsAvailable to the World Wide Weben_US
dc.titleAn approach to computer securityen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
WOOLSEY_James_Richard_MSC_1985_93692.pdf
Size:
24.5 MB
Format:
Adobe Portable Document Format