Abstract
We have already alluded several times to the fact that processes within a computing system must be protected from each other’s activities. We have introduced mechanisms at various points in our paper operating system which ensure that the memory, files, and resources belonging to a process cannot be accessed by another process except in a controlled manner. The mechanisms have been distributed throughout the system in such places as the memory addressing hardware, file directories, and resource allocation procedures, and have functioned more or less independently of each other. In this chapter we take a closer look at the subject of protection as a whole and indicate how it is possible to implement protection mechanisms on a unified system-wide basis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1993 A. M. Lister and R. D. Eager
About this chapter
Cite this chapter
Lister, A.M., Eager, R.D. (1993). Protection. In: Fundamentals of Operating Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-2252-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-4757-2252-9_9
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-2254-3
Online ISBN: 978-1-4757-2252-9
eBook Packages: Springer Book Archive