In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system".

The access matrix model, first introduced in 1971, is a generalized description of operating system protection mechanisms.

The separation of protection and security is a special case of the separation of mechanism and policy.

Notes

  • Anita K. Jones, Richard J. Lipton ACM Symposium on Operating Systems Principles. Proceedings of the fifth ACM symposium on Operating systems principles. Austin, Texas, United States. pp. 197–206. 1975
  • Lampson, Butler W. (1971). "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437.
  • Carl E. Landwehr Volume 13, Issue 3 (September 1981) pp. 247–278
  • Wulf, W.; E. Cohen; W. Corwin; A. Jones; R. Levin; C. Pierson; F. Pollack (June 1974). . Communications of the ACM. 17 (6): 337–345. doi:. S2CID .