Protection
-
Protection requirements
-
Two mode protection model
-
The needs of multiprogramming
-
Protection Domains
-
Access Matrix
Implementation Schemes and their comparison
-
Global Access Matrix as a table
of triples
-
Access List per object
-
Capability List per domain
-
Combining access lists and capabilities
Switching the Domains
Revocation of Rights