Abstract
onfining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.
- 1 Lampson, B.W. Dynamic protection structures. Proc. AFIPS 1969 FJCC, Vol. 35, AFIPS Press, Montvale, N.J., pp. 27-38.Google Scholar
- 2 Schroeder, M.D., and Saltzer, J.H. A Hardware Architecture for implementing protection rings. Comm. ACM 15, 3 (Mar. 1972), 157-170. Google ScholarDigital Library
Recommendations
Data Protection in Healthcare Social Networks
Healthcare social networking sites (HSNSs) provide users with tools and services to easily establish contact with each other around shared problems and utilize the wisdom of crowds to attack disease. The increasing popularity of HSNSs has led to concern ...
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered ...
RFID system with fairness within the framework of security and privacy
ESAS'05: Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor NetworksRadio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In ...
Comments