Show simple item record

dc.contributor.authorAndrews, Gregory R.en_US
dc.date.accessioned2007-04-23T17:50:22Z
dc.date.available2007-04-23T17:50:22Z
dc.date.issued1975-05en_US
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR75-241en_US
dc.identifier.urihttps://hdl.handle.net/1813/7004
dc.description.abstractTHe confinement problem is concerned with preventing a computaitonal service from divulging information entrusted to it. A model of computer protection is presented and used to formally define the problem and its relation to protection mechanisms. Two types of confinement, one concerned with preventing the direct sending of messages and the other with also preventing the use of covert channels, are explored. For both types, conditions sufficient to insure confinement in terms of the capabilities of computations are presented. The conditions make it possible to identify exactly those objects, if any, which can serve as potential channels. Means for plugging the potential channels are also discussed.en_US
dc.format.extent1279408 bytes
dc.format.extent367846 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titleConcepts and Conditions for Confinementen_US
dc.typetechnical reporten_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Statistics