Abstract :
A method of implementing access control for computer resources is presented, along with examples and possible enhancements. An appropriate application for such resource control can be found in computer operating systems. Thus, the need for resource control is described first, followed by descriptions of some common implementations and the impetus for their development. In light of this discussion, the alternative implementation proposed is presented, followed by a discussion of what improvements over the classical implementations are offered. This done, a series of possible extensions are presented
Keywords :
authorisation; multiprogramming; operating systems (computers); resource allocation; access control; computer operating systems; computer resources; resource control; Access control; Application software; Authentication; Computer security; Control systems; Cryptography; Interactive systems; Operating systems; Protection; User interfaces;