@inbook{7335a14371674f6c8f61f88a0e6a76df,
title = "Computational paradigms and protection",
abstract = "We investigate how protection requirements may be specified and implemented using the imperative, availability and coercion paradigms. Conventional protection mechanisms generally follow the imperative paradigm, requiring explicit and often centralized control over the sequencing and the mediation of security critical operations. This paper illustrates how casting protection in the availability and/or coercion styles provides the basis for more flexible and potentially distributed control over the sequencing and mediation of these operations.",
keywords = "Condensed graphs, Functional and dataflow programming, Imperative, Protection mechanisms, Security models",
author = "Foley, \{Simon N.\} and Morrison, \{John P.\}",
year = "2001",
doi = "10.1145/508172.508173",
language = "English",
series = "Proceedings New Security Paradigms Workshop",
publisher = "Association for Computing Machinery (ACM)",
pages = "3--11",
booktitle = "Proceedings New Security Paradigms Workshop",
note = "2001 New Security Paradigms Workshop, NSPW 2001 ; Conference date: 10-09-2001 Through 13-09-2001",
}