dc.contributor.advisor | Schroeder, Michael D. | en_US |
dc.contributor.author | Bratt, Richard Glenn | en_US |
dc.date.accessioned | 2023-03-29T14:59:42Z | |
dc.date.available | 2023-03-29T14:59:42Z | |
dc.date.issued | 1975-09 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/149450 | |
dc.description.abstract | This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility. | en_US |
dc.relation.ispartofseries | MIT-LCS-TR-156 | |
dc.relation.ispartofseries | MAC-TR-156 | |
dc.title | Minimizing the Naming Facilities Requiring Protection in a Computing Utility | en_US |
dc.identifier.oclc | 02170867 | |