Protection and Resource Control in Distributed Operating Systems

S.J. Mullender, A.S. Tanenbaum

Research output: Contribution to JournalArticleAcademicpeer-review

54 Downloads (Pure)


Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the user's machine - not the applications programs, not the system kernel, not even the choice of hardware. In this paper we discuss a general method to protect such systems against malicious users without placing any restrictions on the kinds of operating systems that can be constructed. Depending on the details of the hardware, either one-way functions or public key cryptography forms the basis for the protection. As an example of our method, we show how a traditional object-oriented capability system can be implemented on top of the basic protection mechanism, and how a service for accounting and resource control can be constructed. © 1984.
Original languageEnglish
Pages (from-to)421-432
Number of pages12
JournalComputer Networks (1999)
Issue number5-6
Publication statusPublished - 1984


  • Capability
  • Local network
  • Operating system
  • Protection


Dive into the research topics of 'Protection and Resource Control in Distributed Operating Systems'. Together they form a unique fingerprint.

Cite this