scispace - formally typeset
J

Jerome H. Saltzer

Researcher at Massachusetts Institute of Technology

Publications -  52
Citations -  8839

Jerome H. Saltzer is an academic researcher from Massachusetts Institute of Technology. The author has contributed to research in topics: Ring (mathematics) & Access control. The author has an hindex of 24, co-authored 52 publications receiving 8601 citations. Previous affiliations of Jerome H. Saltzer include University of Cambridge.

Papers
More filters
Proceedings Article

End-to-End Arguments in System Design.

TL;DR: A design principle is presented that helps guide placement of functions among the modules of a distributed computer system and suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level.
Journal ArticleDOI

The protection of information in computer systems

TL;DR: In this article, the authors explore the mechanics of protecting computer-stored information from unauthorized use or modification, focusing on those architectural structures-whether hardware or software-that are necessary to support information protection.
Journal ArticleDOI

End-to-end arguments in system design

TL;DR: The end-to-end argument as discussed by the authors suggests that functions placed at low levels of a distributed computer system may be redundant or of little value when compared with the cost of providing them at that low level.
Journal ArticleDOI

Protection and the control of information sharing in multics

TL;DR: Five design principles help provide insight into the tradeoffs among different possible designs in the Multics system and several known weaknesses in the current protection mechanism design are discussed.
Journal ArticleDOI

Protecting poorly chosen secrets from guessing attacks

TL;DR: The basic idea is to ensure that data available to the attacker is sufficiently unpredictable to prevent an offline verification of whether a guess is successful or not and to examine protocols to detect vulnerabilities to such attacks.