Filters








2,315,547 Hits in 3.7 sec

On protection in operating systems

Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
A model of protection mechanisms in computing systems is presented and its appropriateness is demonstrated.  ...  In restricted cases, one can show that this problem is decidable, i. e., there is an algorithm to determine whether a system in a particular configuration is safe.  ...  Acknowledgement The authors thank one of the referees for simplifying the proof of Theorem 2.  ... 
doi:10.1145/800213.806517 dblp:conf/sosp/HarrisonRU75 fatcat:r6xf6vurpvabbbwoa7gilhdboq

On protection in operating systems

Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman
1975 ACM SIGOPS Operating Systems Review  
A model of protection mechanisms in computing systems is presented and its appropriateness is demonstrated.  ...  In restricted cases, one can show that this problem is decidable, i. e., there is an algorithm to determine whether a system in a particular configuration is safe.  ...  Acknowledgement The authors thank one of the referees for simplifying the proof of Theorem 2.  ... 
doi:10.1145/1067629.806517 fatcat:r3svizwpkvekxhr5tddtervde4

Protection in the Hydra Operating System

Ellis Cohen, David Jefferson
1975 Proceedings of the fifth symposium on Operating systems principles - SOSP '75  
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel.  ...  In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.  ...  Protection Problems Mutual Suspicion In most operating systems, whenever one user calls a program belonging to another user, or even a utility belonging to the operating system, he takes a risk.  ... 
doi:10.1145/800213.806532 dblp:conf/sosp/CohenJ75 fatcat:fdyicwflgzhytbct5quximkimq

The transfer of information and authority in a protection system

Matt Bishop, Lawrence Snyder
1979 Proceedings of the seventh symposium on Operating systems principles - SOSP '79  
In the context of a capability-based protection system, the term "transfer" is used (here) to refer to the situation where a user receives information when he does not initially have a direct "right" to  ...  The Take-Grant Protection Model, which already models de jure transfers, is extended with four rewriting rules to model de facto transfer.  ...  We emphasize that we are basing our study of de facto transfer on the protection graph --an abstraction of the authority relations in the system.  ... 
doi:10.1145/800215.806569 dblp:conf/sosp/BishopS79 fatcat:cjtbvq552zbf7dqi3s5llkc3be

Protection and control of information sharing in multics

Jerome H. Saltzer
1973 Proceedings of the fourth symposium on Operating system principles - SOSP '73  
The paper ends with a discussion of several known weaknesses in the current protection mechanism design.  ...  The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs.  ...  Arriving card decks are read in and held in on-line storage by a system process, for which an operator is responsible.  ... 
doi:10.1145/800009.808059 dblp:conf/sosp/Saltzer73 fatcat:qoqh5xlorbbn5iuotnhbbws45y

Protection in an information processing utility

Robert M. Graham
1967 Proceedings of the ACM symposium on Operating System Principles - SOSP '67  
One of the critical problems in the design of an information processing utility which permits flexible sharing of user information is that of privacy.  ...  This paper discusses one solution for this problem.  ...  The system will~ of coursej operate in a multi-programming mode and have more than one central processor.  ... 
doi:10.1145/800001.811674 fatcat:h5h4hdit4fh6fhiqxmqhzxkfly

Sharing and protection in a single-address-space operating system

Jeffrey S. Chase, Henry M. Levy, Michael J. Feeley, Edward D. Lazowska
1994 ACM Transactions on Computer Systems  
in a compati- ble way alongside current operating systems on current wide-address proces- sors.  ...  and Protection in a Single Address Space . 301 operating system objects addressed via capabilities.  ... 
doi:10.1145/195792.195795 fatcat:hhjn7pyovzdzriqetsgqhagpzi

Impact of line length on the operation of overvoltage protection in LV networks

J. Ribič
2015 Electric power systems research  
This paper deals with analysing the impact of LV lines impedance on the operation of overvoltage protection, especially on the operation of gas discharge arresters.  ...  Some additional measures are also proposed for achieving the proper operation of overvoltage protection.  ...  There was also a discussion on the operations of overvoltage protection systems, both with MO surge arrester and gas discharge arrester, as shown in Fig. 2 .  ... 
doi:10.1016/j.epsr.2014.11.012 fatcat:3vuk7izh3rbe7jxci264ehp4zm

Systems of Electronic Overcurrent Protection in Pulse Power Generator Operating on Plasma Load

Dmitriy V. Godun, Sergey. V. Bordusov, Anatoliy P. Dostanko
2013 Acta Polytechnica  
Operating threshold of current protection in this case must be set to the maximum value of current in the secondary circuit.  ...  First of all modules of electronic protection should be integrated into the control driver system of IGBT modules and must provide a quick disconnect power switches in excess of the allowable values of  ...  Conclusion A fast-acting complex protection system of a pulse power generator operating on the plasma load has been elaborated.  ... 
doaj:85927d1244f64c6f8d36b86289710d99 fatcat:pvqzil7wvvaw7djzu7cmsao534

Protection in Grasshopper: A Persistent Operating System [chapter]

Alan Dearie, Rex di Bona, James Farrow, Frans Henskens, David Hulse, Anders Lindström, Stephen Norris, John Rosenberg, Francis Vaughan
1995 Persistent Object Systems  
This paper describes the capability-based protection mechanism employed in Grasshopper, a new operating system specifically designed to support persistent systems on a conventional workstation platform  ...  In a monolingual system this protection can be provided by the type system of the programming language; in systems which support multiple persistent languages a separate protection mechanism must be supported  ...  Acknowledgments The work described in this paper is supported by Australian Research Council grant A49130439 and by an equipment grant under the Alpha Innovators Program from Digital Equipment Corporation  ... 
doi:10.1007/978-1-4471-2122-0_6 dblp:conf/pos/DearleBFHLNRV94 fatcat:ymfw6had5zhdzciz5j5hb5iqfa

Special Issue on Advances and Technologies in High Voltage Power Systems Operation, Control, Protection, and Security

Hassan Haes Alhelou, Pierluigi Siano
2020 Applied Sciences  
The electrical demands in several countries around the world are increasing due to the huge energy requirements of prosperous economies and the human activities of modern life [...]  ...  Published Papers This special issue contains 10 highly qualified papers related to the latest advances and technologies in Power Systems Operation, Control, Protection, and Security.  ...  This study in [8] has focused on one such application.  ... 
doi:10.3390/app11010274 fatcat:vmufjdpj4ngmpmloqga4cep7ga

Development of Offers on Perfection of System of Maintenance of Automated Systems of Protection in Readiness for Use in Post-Warranty Period of Operation

Vitaliy Grigorievich Ivanenko, Vladimir Leonovich Evseev
2014 Bezopasnostʹ Informacionnyh Tehnologij  
and protection systems in general.  ...  and the factors of maintaining efficiency are below the values set in the tactical and technical requirements on systems, so it is necessary to evaluate the technical condition of ASO.  ...  and protection systems in general.  ... 
doaj:50b928fca3d9429991ba7966fed46d8a fatcat:moibg37svngivpyfznzcbr4ttq

Protection and communication abstractions for web browsers in MashupOS

Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson
2007 Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles - SOSP '07  
However, the protection and communication abstractions offered by today's browsers remain suitable only for a single-principal system-either no trust through complete isolation between principals (sites  ...  in a single page at the browser.  ...  Microbenchmark on MSEP Overhead We found a JavaScript and DHTML script performance benchmark called BenchJS [2]. The benchmark contains the following 7 JavaScript and DHTML tests.  ... 
doi:10.1145/1294261.1294263 dblp:conf/sosp/WangFHJ07 fatcat:lzbh4m7ep5ekrpitfmkwy2nj3y

Supporting dynamic update and resource protection in an embedded operating system

Mei-Ling Chiang, Hsiang-Yu Hsu
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
Recently, many researches focus on providing dynamic update functionality in embedded systems since dynamic update allows a system to enhance or update its functionality even without the need of rebooting  ...  In this paper, we have implemented a platform which supports a remote component update mechanism for dynamically upgrading an embedded operating system at run time.  ...  BACKGROUND AND RELATED WORKS This section introduces some related works on embedded operating systems. Section 2.1 introduces LyraOS embedded operating system.  ... 
doi:10.1145/1982185.1982316 dblp:conf/sac/ChiangH11 fatcat:smerkwsqm5c4vbxn2azcjakney

Study on Operational Characteristics of Protection Relay with Fault Current Limiters in an LVDC System

Lee Hyeong-Jin, Kim Jin-Seok, Kim Jae-Chul, Yun Sang-Yun, Cho Sung-Min
2020 Electronics  
As the application of low-voltage-direct-current system increases, fault analysis in the low-voltage-direct-current system has essential because the fault response has different from the conventional AC  ...  Especially, the fault current by the discharge current of the capacitor in the low-voltage-direct-current distribution system has very large compared with the conventional AC distribution system.  ...  The fault current on the LVDC system was limited through applying SFCL, but this causes a problem in the operational characteristics of the protection relay.  ... 
doi:10.3390/electronics9020322 fatcat:t4ty737d6bfglnjkhz6vhmla5e
« Previous Showing results 1 — 15 out of 2,315,547 results