{"id":"https://openalex.org/W2165986112","doi":"https://doi.org/10.1145/1478559.1478563","title":"Dynamic protection structures","display_name":"Dynamic protection structures","publication_year":1969,"publication_date":"1969-01-01","ids":{"openalex":"https://openalex.org/W2165986112","doi":"https://doi.org/10.1145/1478559.1478563","mag":"2165986112"},"language":"en","primary_location":{"id":"doi:10.1145/1478559.1478563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1478559.1478563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the November 18-20, 1969, fall joint computer conference on - AFIPS '69 (Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016537999","display_name":"Butler Lampson","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"B. W. Lampson","raw_affiliation_strings":["Berkeley Computer Corporation, Berkeley, California"],"affiliations":[{"raw_affiliation_string":"Berkeley Computer Corporation, Berkeley, California","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5016537999"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":31.848,"has_fulltext":false,"cited_by_count":166,"citation_normalized_percentile":{"value":0.99656099,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8288732767105103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7602621912956238},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6687970161437988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.623712420463562},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5693029761314392},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5043565034866333},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.47902315855026245},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.46245670318603516},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28679928183555603},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.24148064851760864},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2095780372619629}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8288732767105103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7602621912956238},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6687970161437988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.623712420463562},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5693029761314392},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5043565034866333},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.47902315855026245},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.46245670318603516},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28679928183555603},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.24148064851760864},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2095780372619629},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1478559.1478563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1478559.1478563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the November 18-20, 1969, fall joint computer conference on - AFIPS '69 (Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2049336278","https://openalex.org/W2108067096","https://openalex.org/W2113350481","https://openalex.org/W2178204534","https://openalex.org/W2179246790"],"related_works":["https://openalex.org/W2374393728","https://openalex.org/W2392916544","https://openalex.org/W2124367090","https://openalex.org/W1992436224","https://openalex.org/W2386396757","https://openalex.org/W208597096","https://openalex.org/W2056388056","https://openalex.org/W2389258225","https://openalex.org/W2014725146","https://openalex.org/W4232279923"],"abstract_inverted_index":{"A":[0],"very":[1],"general":[2],"problem":[3],"which":[4,28,60,73],"pervades":[5],"the":[6,14,30,58,64,71],"entire":[7],"field":[8],"of":[9,16,32,57,66],"operating":[10],"system":[11,90],"design":[12],"is":[13,96],"construction":[15],"protection":[17,67,75,89],"mechanisms.":[18],"These":[19],"come":[20],"in":[21],"many":[22],"different":[23],"forms,":[24],"ranging":[25],"from":[26],"hardware":[27],"prevents":[29],"execution":[31],"input/output":[33],"instructions":[34],"by":[35],"user":[36],"programs,":[37],"to":[38,98,118],"password":[39],"schemes":[40],"for":[41,85],"identifying":[42],"customers":[43],"when":[44],"they":[45],"log":[46],"onto":[47],"a":[48,87,93],"time-sharing":[49],"system.":[50],"This":[51],"paper":[52],"deals":[53],"with":[54,106],"one":[55],"aspect":[56],"subject,":[59],"might":[61],"be":[62,80],"called":[63],"meta-theory":[65],"systems:":[68],"how":[69,107,113],"can":[70],"information":[72],"specifies":[74],"and":[76,82,112],"authorizes":[77],"access,":[78],"itself":[79],"protected":[81],"manipulated.":[83],"Thus,":[84],"example,":[86],"memory":[88],"decides":[91],"whether":[92],"program":[94],"P":[95,108],"allowed":[97],"store":[99],"into":[100],"location":[101],"T.":[102],"We":[103],"are":[104],"concerned":[105],"obtains":[109],"this":[110],"permission":[111],"he":[114],"passes":[115],"it":[116],"on":[117],"other":[119],"programs.":[120]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":6}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
