Show simple item record

dc.contributor.advisorSchroeder, Michael D.en_US
dc.contributor.authorBratt, Richard Glennen_US
dc.date.accessioned2023-03-29T14:59:42Z
dc.date.available2023-03-29T14:59:42Z
dc.date.issued1975-09
dc.identifier.urihttps://hdl.handle.net/1721.1/149450
dc.description.abstractThis thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility.en_US
dc.relation.ispartofseriesMIT-LCS-TR-156
dc.relation.ispartofseriesMAC-TR-156
dc.titleMinimizing the Naming Facilities Requiring Protection in a Computing Utilityen_US
dc.identifier.oclc02170867


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record