Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
726 Nov 2014 - 10:16ThomasMisa 
603 Oct 2013 - 14:40norqu036? 
506 May 2013 - 10:22NicLewis 
427 Mar 2013 - 09:17NicLewis 
319 Mar 2013 - 12:53NicLewis 
225 Feb 2013 - 10:25NicLewis 
121 Feb 2013 - 08:47NicLewis 

Render style:     Context:

 History: r7 < r6 < r5 < r4 < r3
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Mechanisms>MechanismsReferenceMonitor (26 Nov 2014, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Reference Monitor


Introduced in James P. Anderson's 1972 Computer Security Planning Study for the United States Air Force, a reference monitor defines a set of design requirements on a reference validation mechanism for computer operating systems. The reference validation mechanism enforces an access control policy over the user's ability to perform operations on objects, including files and sockets, on a system. On an operating system, a reference validation mechanism must always be invoked to prevent violations of the security policy, must be tamperproof to ensure the security policy is correctly enforced, and must be small enough to be subject to tests and analyses to ensure its completeness.(1)(2)

Additional resources:

  • lock Paul Karger and Roger Schell: Multics Security Evaluation: Vulnerability Analysis (1974 | PDF) (Log-in Required).


1 : lock Cynthia E. Irvine, "The Reference Monitor Concept as a Unifying Principle in Computer Security Education," In Proceedings of the IFIP TC11 WG 11.8 First World Conference on Information Security Education (1999), 1-2. (Log-in Required)

2 : R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (New York: John Wiley, 2008; 2nd ed.).

Topic revision: r7 - 26 Nov 2014 - 10:16:58 - ThomasMisa
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback