-
1
-
-
0004073139
-
-
New York: Atheneum, (I-A1, SFR)
-
A. Westin, Privacy and Freedom. New York: Atheneum, 1967. (I-A1, SFR)
-
(1967)
Privacy and Freedom
-
-
Westin, A.1
-
2
-
-
0038763194
-
-
Ann Arbor, Mich.: Univ. of Mich. Press, also New York: Signet, 1972, Paperback W4934. (I-A1, SFR)
-
A. Miller, The Assault on Privacy. Ann Arbor, Mich.: Univ. of Mich. Press, 1971; also New York: Signet, 1972, Paperback W4934. (I-A1, SFR)
-
(1971)
The Assault on Privacy
-
-
Miller, A.1
-
3
-
-
0003746860
-
-
Cambridge, Mass.: M.I.T. Press, (I-A1, SFR)
-
Dept. of Health, Education, and Welfare, Records, Computers, and the Rights of Citizens. Cambridge, Mass.: M.I.T. Press, 1973. (I-A1, SFR)
-
(1973)
Records, Computers, and the Rights of Citizens
-
-
-
4
-
-
0016611332
-
Privacy and security in computer systems
-
Mar.–Apr. (I-A1)
-
R. Turn and W. Ware, “Privacy and security in computer systems,” Amer. Scientist, vol. 63, pp. 196–203, Mar.–Apr. 1975. (I-A1)
-
(1975)
Amer. Scientist
, vol.63
, pp. 196-203
-
-
Turn, R.1
Ware, W.2
-
5
-
-
84948590819
-
Security and privacy in computer systems
-
in (I-A1)
-
W. Ware, “Security and privacy in computer systems,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30, pp. 287–290. (I-A1)
-
1967 SJCC, AFIPS Conf. Proc.
, vol.30
, pp. 287-290
-
-
Ware, W.1
-
6
-
-
77956859736
-
Information security in a multi-user computer environment
-
New York: Academic Press (I-A1, SFR)
-
J. Anderson, “Information security in a multi-user computer environment,” in Advances in Computers, vol. 12. New York: Academic Press, 1973, pp. 1–35. (I-A1, SFR)
-
(1973)
Advances in Computers
, vol.12
, pp. 1-35
-
-
Anderson, J.1
-
7
-
-
0011430403
-
-
Englewood Cliffs, N.J.: Prentice-Hall, (I-A1, SFR)
-
J. Martin, Security, Accuracy, and Privacy in Computer Systems. Englewood Cliffs, N.J.: Prentice-Hall, 1973. (I-A1, SFR)
-
(1973)
Security, Accuracy, and Privacy in Computer Systems
-
-
Martin, J.1
-
9
-
-
84938065908
-
Function and design of DOS/360 and TOS/360
-
(I-A2)
-
G. Bender, D. Freeman, and J. Smith “Function and design of DOS/360 and TOS/360,” IBM Syst. J., vol. 6, pp. 2–21, 1967. (I-A2)
-
(1967)
IBM Syst. J.
, vol.6
, pp. 2-21
-
-
Bender, G.1
Freeman, D.2
Smith, J.3
-
10
-
-
0014639551
-
Design considerations for an educational time-sharing system
-
in (I-A2)
-
R. Hargraves and A. Stephenson, “Design considerations for an educational time-sharing system,” in 1969 SJCC, AFIPS Conf. Proc., vol. 34, pp. 657–664. (I-A2)
-
1969 SJCC, AFIPS Conf. Proc.
, vol.34
, pp. 657-664
-
-
Hargraves, R.1
Stephenson, A.2
-
11
-
-
0014929124
-
A virtual machine time-sharing system
-
(I-A2, I-B3, III-A)
-
R. Meyer and L. Seawright “A virtual machine time-sharing system,” IBM Syst. J., vol. 9, pp. 199–218, 1970. (I-A2, I-B3, III-A)
-
(1970)
IBM Syst. J.
, vol.9
, pp. 199-218
-
-
Meyer, R.1
Seawright, L.2
-
12
-
-
84879877754
-
-
2nd ed. Cambridge, Mass.: M.I.T. Press, (I-A2, III-A)
-
M.I.T. Computation Center, CTSS Programmer's Guide, 2nd ed. Cambridge, Mass.: M.I.T. Press, 1965. (I-A2, III-A)
-
(1965)
CTSS Programmer's Guide
-
-
-
13
-
-
84948608849
-
PDP-10 system concepts and capabilities
-
Maynard, Mass: Digital Equipment Corp., undated (ca.) (I-A2)
-
D. Stone, “PDP-10 system concepts and capabilities,” in PDP-10 Applications in Science, vol. II. Maynard, Mass: Digital Equipment Corp., undated (ca. 1970), pp. 32–55. (I-A2)
-
(1970)
PDP-10 Applications in Science
, vol.II
, pp. 32-55
-
-
Stone, D.1
-
14
-
-
4544284713
-
Security controls in the ADEPT-50 time-sharing system
-
in (I-A2, II-C5, III-A, III-B, SFR)
-
C. Weissman, “Security controls in the ADEPT-50 time-sharing system,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35, pp. 119–133. (I-A2, II-C5, III-A, III-B, SFR)
-
1969 FJCC, AFIPS Conf. Proc.
, vol.35
, pp. 119-133
-
-
Weissman, C.1
-
15
-
-
0015316050
-
TENEX, a paged time sharing system for the PDP-10
-
Mar. (I-A2, II-C3)
-
D. Bobrow et al. “TENEX, a paged time sharing system for the PDP-10,” Commun. ACM, vol. 15, pp. 135–143, Mar. 1972. (I-A2, II-C3)
-
(1972)
Commun. ACM
, vol.15
, pp. 135-143
-
-
Bobrow, D.1
-
16
-
-
84983923901
-
Multics-The first seven years
-
in (I-A2)
-
F. Corbató, J. Saltzer, and C. Clingen, “Multics-The first seven years,” in 1972 SJCC, AFIPS Conf. Proc., vol. 40, pp. 571–583. (I-A2)
-
1972 SJCC, AFIPS Conf. Proc.
, vol.40
, pp. 571-583
-
-
Corbató, F.1
Saltzer, J.2
Clingen, C.3
-
17
-
-
84939761725
-
A postmortem for a time sharing system
-
Ph.D. dissertation, Univ. of Calif., Berkeley, (Also available as Xerox Palo Alto Res. Center Tech. Rep. CSL74-1.) (I-A2, II-C2, II-E, III-A, SFR)
-
H. Sturgis, “A postmortem for a time sharing system,” Ph.D. dissertation, Univ. of Calif., Berkeley, 1973. (Also available as Xerox Palo Alto Res. Center Tech. Rep. CSL74-1.) (I-A2, II-C2, II-E, III-A, SFR)
-
(1973)
-
-
Sturgis, H.1
-
18
-
-
0016082170
-
The UNIX time-sharing system
-
July (I-A2, II-C3)
-
D. Ritchie and K. Thompson “The UNIX time-sharing system,” Commun. ACM, vol. 17, pp. 365–375, July 1974. (I-A2, II-C3)
-
(1974)
Commun. ACM
, vol.17
, pp. 365-375
-
-
Ritchie, D.1
Thompson, K.2
-
19
-
-
0014636736
-
Dynamic protection structures
-
in (I-A2, II-E, III-A)
-
B. Lampson, “Dynamic protection structures,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35, pp. 27–38. (I-A2, II-E, III-A)
-
1969 FJCC, AFIPS Conf. Proc.
, vol.35
, pp. 27-38
-
-
Lampson, B.1
-
20
-
-
85069756226
-
Protection systems and protection implementations
-
in (I-A2, II-B3, II-E, III-A, SFR)
-
R. Needham, “Protection systems and protection implementations,” in 1972 FJCC, AFIPS Conf. Proc., vol. 41, part. I, pp. 571–578. (I-A2, II-B3, II-E, III-A, SFR)
-
1972 FJCC, AFIPS Conf. Proc.
, vol.41
, pp. 571-578
-
-
Needham, R.1
-
21
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
June (I-A2, II-B3, III-A)
-
W. Wulf et al. “HYDRA: The kernel of a multiprocessor operating system,” Commun. ACM, vol. 17, pp. 337–345, June 1974. (I-A2, II-B3, III-A)
-
(1974)
Commun. ACM
, vol.17
, pp. 337-345
-
-
Wulf, W.1
-
22
-
-
0015331056
-
On the implementation of security measures in information systems
-
Apr. (I-A2)
-
R. Conway, W. Maxwell, and H. Morgan “On the implementation of security measures in information systems,” Commun. ACM, vol. 15, pp. 211–220, Apr. 1972. (I-A2)
-
(1972)
Commun. ACM
, vol.15
, pp. 211-220
-
-
Conway, R.1
Maxwell, W.2
Morgan, H.3
-
23
-
-
84948613388
-
The application of information theory to privacy in data banks
-
Rand Corp., Tech. Rep. R-1282-NSF, (I-A2)
-
I. Reed, “The application of information theory to privacy in data banks,” Rand Corp., Tech. Rep. R-1282-NSF, 1973. (I-A2)
-
(1973)
-
-
Reed, I.1
-
24
-
-
84948609139
-
Research on data secure systems
-
in (I-A2)
-
D. Hsiao, D. Kerr, and F. Stahl, “Research on data secure systems,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 994–996. (I-A2)
-
1974 NCC, AFIPS Conf. Proc.
, vol.43
, pp. 994-996
-
-
Hsiao, D.1
Kerr, D.2
Stahl, F.3
-
25
-
-
0005616406
-
Getting a personal dossier from a statistical data bank
-
May (I-A2)
-
L. Hoffman and W. Miller “Getting a personal dossier from a statistical data bank,” Datamation, vol. 16, pp. 74–75, May 1970. (I-A2)
-
(1970)
Datamation
, vol.16
, pp. 74-75
-
-
Hoffman, L.1
Miller, W.2
-
26
-
-
0016081584
-
Protection and the control of information sharing in Multics
-
July (I-A3, I-B4, III-A, SFR)
-
J. Saltzer “Protection and the control of information sharing in Multics,” Commun. ACM, vol. 17, pp. 388–402, July 1974. (I-A3, I-B4, III-A, SFR)
-
(1974)
Commun. ACM
, vol.17
, pp. 388-402
-
-
Saltzer, J.1
-
27
-
-
84948604530
-
Security, secrecy, and tamper-free considerations
-
Rand Corp. Tech. Rep. RM-3765-PR, (I-A3, III-B)
-
P. Baran, “Security, secrecy, and tamper-free considerations,” on Distributed Communications, no. 9, Rand Corp. Tech. Rep. RM-3765-PR, 1964. (I-A3, III-B)
-
(1964)
on Distributed Communications
, Issue.9
-
-
Baran, P.1
-
28
-
-
84892286191
-
A principle of kernel design
-
in (I-A3)
-
G. Popek, “A principle of kernel design,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 977–978. (I-A3)
-
1974 NCC, AFIPS Conf. Proc.
, vol.43
, pp. 977-978
-
-
Popek, G.1
-
29
-
-
84867323610
-
Enhancing computer system security
-
Rand Corp. Paper P-5064, (I-A3)
-
D. Hollingsworth, “Enhancing computer system security,” Rand Corp. Paper P-5064, 1973. (I-A3)
-
(1973)
-
-
Hollingsworth, D.1
-
30
-
-
0002179618
-
Protection
-
(Mar.), (Reprinted in ACM Operating Syst. Rev., vol. 8, pp. 18–24, Jan. 1974.) (I-B1, II-B2, II-E, SFR)
-
B. Lampson “Protection,” in Proc. 5th Princeton Symp. Information Science and Systems (Mar. 1971), pp. 437–443. (Reprinted in ACM Operating Syst. Rev., vol. 8, pp. 18–24, Jan. 1974.) (I-B1, II-B2, II-E, SFR)
-
(1971)
Proc. 5th Princeton Symp. Information Science and Systems
, pp. 437-443
-
-
Lampson, B.1
-
31
-
-
77949786374
-
Multiprogramming Stretch: Feasibility considerations
-
Nov. (I-B3)
-
E. Codd et al. “Multiprogramming Stretch: Feasibility considerations,” Commun. ACM, vol. 2, pp. 13–17, Nov. 1959. (I-B3)
-
(1959)
Commun. ACM
, vol.2
, pp. 13-17
-
-
Codd, E.1
-
32
-
-
1842522705
-
Design of the B5000 system
-
May (I-B3, I-B5)
-
W. Lonergan and P. King “Design of the B5000 system,” Datamation, vol. 7, pp. 28–32, May 1961. (I-B3, I-B5)
-
(1961)
Datamation
, vol.7
, pp. 28-32
-
-
Lonergan, W.1
King, P.2
-
33
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
July (I-B3)
-
G. Popek and R. Goldberg “Formal requirements for virtualizable third generation architectures,” Commun. ACM, vol. 17, pp. 412–421, July 1974. (I-B3)
-
(1974)
Commun. ACM
, vol.17
, pp. 412-421
-
-
Popek, G.1
Goldberg, R.2
-
34
-
-
0015769027
-
Architecture of virtual machines
-
in (I-B3)
-
R. Goldberg, “Architecture of virtual machines,” in 1973 NCC, AFIPS Conf. Proc., vol. 42, pp. 309–318. (I-B3)
-
1973 NCC, AFIPS Conf. Proc.
, vol.42
, pp. 309-318
-
-
Goldberg, R.1
-
35
-
-
0016090968
-
A high security log-in procedure
-
Aug. (I-B4)
-
G. Purdy “A high security log-in procedure,” Commun. ACM, vol. 17, pp. 442–445, Aug. 1974. (I-B4)
-
(1974)
Commun. ACM
, vol.17
, pp. 442-445
-
-
Purdy, G.1
-
36
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Aug. (I-B4)
-
A. Evans, W. Kantrowitz, and E. Weiss “A user authentication scheme not requiring secrecy in the computer,” Commun. ACM, vol. 17, pp. 437–442, Aug. 1974. (I-B4)
-
(1974)
Commun. ACM
, vol.17
, pp. 437-442
-
-
Evans, A.1
Kantrowitz, W.2
Weiss, E.3
-
37
-
-
0003746118
-
-
2nd ed. New York: American-Elsevier, (I-B4, I-B5, II-A)
-
M. Wilkes, Time-Sharing Computer Systems, 2nd ed. New York: American-Elsevier, 1972. (I-B4, I-B5, II-A)
-
(1972)
Time-Sharing Computer Systems
-
-
Wilkes, M.1
-
38
-
-
84976819632
-
An experimental application of cryptography to a remotely accessed data system
-
in (I-B4, III-B, SFR)
-
J. Smith, W. Notz, and P. Osseck, “An experimental application of cryptography to a remotely accessed data system,” in Proc. ACM 25th Nat. Conf., pp. 282–298, 1972. (I-B4, III-B, SFR)
-
(1972)
Proc. ACM 25th Nat. Conf.
, pp. 282-298
-
-
Smith, J.1
Notz, W.2
Osseck, P.3
-
39
-
-
78349288354
-
Cryptographic coding for data bank privacy
-
IBM Corp. Res. Rep. RC 2827, Mar. (I-B4, III-B, SFR)
-
H. Feistel, “Cryptographic coding for data bank privacy,” IBM Corp. Res. Rep. RC 2827, Mar. 1970. (I-B4, III-B, SFR)
-
(1970)
-
-
Feistel, H.1
-
40
-
-
78349258838
-
Security aspects of computer networks
-
(Apr.), Paper 73-427. (I-B4, I-B5, III-B, SFR)
-
D. Branstad, “Security aspects of computer networks,” in AIAA Computer Network Systems Conf. (Apr. 1973), Paper 73-427. (I-B4, I-B5, III-B, SFR)
-
(1973)
AIAA Computer Network Systems Conf.
-
-
Branstad, D.1
-
41
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Mar. (I-B5, II-B1, II-E)
-
J. Dennis and E. Van Horn “Programming semantics for multiprogrammed computations,” Commun. ACM, vol. 9, pp. 143–155, Mar. 1966. (I-B5, II-B1, II-E)
-
(1966)
Commun. ACM
, vol.9
, pp. 143-155
-
-
Dennis, J.1
Van Horn, E.2
-
42
-
-
0345533636
-
Segmentation and the design of multiprogrammed computer systems
-
Oct. (I-B5, II-A)
-
J. Dennis “Segmentation and the design of multiprogrammed computer systems,” J ACM, vol. 12, pp. 589–602, Oct. 1965. (I-B5, II-A)
-
(1965)
J ACM
, vol.12
, pp. 589-602
-
-
Dennis, J.1
-
43
-
-
0004625488
-
Virtual memory, processes, and sharing in Multics
-
May (I-B5)
-
R. Daley and J. Dennis “Virtual memory, processes, and sharing in Multics,” Commun. ACM, vol. 11, pp. 306–312, May 1968. (I-B5)
-
(1968)
Commun. ACM
, vol.11
, pp. 306-312
-
-
Daley, R.1
Dennis, J.2
-
45
-
-
0016081585
-
Capability-based addressing
-
July (II-A, SFR)
-
R. Fabry “Capability-based addressing,” Commun. ACM, vol. 17, pp. 403–412, July 1974. (II-A, SFR)
-
(1974)
Commun. ACM
, vol.17
, pp. 403-412
-
-
Fabry, R.1
-
49
-
-
84948608548
-
Preliminary description of a supervisor for a machine oriented around capabilities
-
sec. IB, Univ. of Chicago, Aug. (II-B1)
-
R. Fabry, “Preliminary description of a supervisor for a machine oriented around capabilities,” Inst. Comput. Res. Quart. Rep., vol. 18, sec. IB, Univ. of Chicago, Aug. 1968. (II-B1)
-
(1968)
Inst. Comput. Res. Quart. Rep.
, vol.18
-
-
Fabry, R.1
-
50
-
-
1842522707
-
A dynamic storage allocation scheme
-
Oct. (II-B1)
-
J. Iliffe and J. Jodeit, “A dynamic storage allocation scheme,” Comput. J., vol. 5, pp. 200–209, Oct. 1962. (II-B1)
-
(1962)
Comput. J.
, vol.5
, pp. 200-209
-
-
Iliffe, J.1
Jodeit, J.2
-
51
-
-
0015641828
-
On the advantages of tagged architecture
-
July (II-B1)
-
E. A. Feustel “On the advantages of tagged architecture,” IEEE Trans. Comput., vol. C-22, pp. 644–656, July 1973. (II-B1)
-
(1973)
IEEE Trans. Comput.
, vol.C-22
, pp. 644-656
-
-
Feustel, E.A.1
-
52
-
-
0016726369
-
On attaining reliable software for a secure operating system
-
(Apr.) (II-B3, III-B)
-
L. Robinson et al., “On attaining reliable software for a secure operating system,” in Int. Conf. Reliable Software (Apr. 1975), pp. 267–284. (II-B3, III-B)
-
(1975)
Int. Conf. Reliable Software
, pp. 267-284
-
-
Robinson, L.1
-
53
-
-
0002799680
-
Capability concept mechanism and structure in system 250
-
(Aug.) (II-B3, III-A)
-
D. England, “Capability concept mechanism and structure in system 250,” in IRIA Int. Workshop Protection in Operating Systems (Aug. 1974), pp. 63–82. (II-B3, III-A)
-
(1974)
IRIA Int. Workshop Protection in Operating Systems
, pp. 63-82
-
-
England, D.1
-
54
-
-
33749550010
-
Naming and protection in extendible operating systems
-
Ph.D. dissertation, Univ. of Calif., Berkeley, (Available as M.I.T. Proj. MAC Tech. Rep. TR-140.) (II-B3, III-A, SFR)
-
D. Redell, “Naming and protection in extendible operating systems,” Ph.D. dissertation, Univ. of Calif., Berkeley, 1974. (Available as M.I.T. Proj. MAC Tech. Rep. TR-140.) (II-B3, III-A, SFR)
-
(1974)
-
-
Redell, D.1
-
55
-
-
84976733023
-
The Multics virtual memory: Concepts and design
-
May (II-B3, II-C3)
-
A. Bensoussan, C. Clingen, and R. Daley “The Multics virtual memory: Concepts and design,” Commun. ACM, vol. 15, pp. 308–318, May 1972. (II-B3, II-C3)
-
(1972)
Commun. ACM
, vol.15
, pp. 308-318
-
-
Bensoussan, A.1
Clingen, C.2
Daley, R.3
-
56
-
-
77956066595
-
A user machine in a time-sharing system
-
Dec. (II-C3)
-
B. W. Lampson, W. W. Lichtenberger, and M. W. Pirtle “A user machine in a time-sharing system,” Proc. IEEE, vol. 54, pp. 1766–1774, Dec. 1966. (II-C3)
-
(1966)
Proc. IEEE
, vol.54
, pp. 1766-1774
-
-
Lampson, B.W.1
Lichtenberger, W.W.2
Pirtle, M.W.3
-
57
-
-
84948603890
-
Access controls in Burroughs large systems
-
Nat. Bur. Stand. Special Pub. 404, Sept. (II-C3)
-
H. Bingham, “Access controls in Burroughs large systems,” Privacy and Security in Computer Systems, Nat. Bur. Stand. Special Pub. 404, pp. 42–45, Sept. 1974. (II-C3)
-
(1974)
Privacy and Security in Computer Systems
, pp. 42-45
-
-
Bingham, H.1
-
58
-
-
84983928388
-
A general-purpose file system for secondary storage
-
in
-
R. Daley and P. Neumann, “A general-purpose file system for secondary storage,” in 1965 FJCC, AFIPS Conf. Proc., vol. 27, part. I, pp. 213–229. (II-C4)
-
1965 FJCC, AFIPS Conf. Proc.
, vol.27
, pp. 213-229
-
-
Daley, R.1
Neumann, P.2
-
59
-
-
84938001503
-
Making computers keep secrets
-
Ph.D. dissertation, M.I.T., Cambridge, Mass., (Also available as M.I.T. Proj. MAC Tech. Rep. TR-115.) (II-C4, II-C5, II-E, III-A, III-B, SFR)
-
L. Rotenberg, “Making computers keep secrets,” Ph.D. dissertation, M.I.T., Cambridge, Mass., 1973. (Also available as M.I.T. Proj. MAC Tech. Rep. TR-115.) (II-C4, II-C5, II-E, III-A, III-B, SFR)
-
(1973)
-
-
Rotenberg, L.1
-
60
-
-
0016726281
-
Structured specification of a security kernel
-
Los Angeles, Calif., Apr. (II-C5)
-
K. Walters et al., “Structured specification of a security kernel,” in Int. Conf. Reliable Software, Los Angeles, Calif., pp. 285–293, Apr. 1975. (II-C5)
-
(1975)
Int. Conf. Reliable Software
, pp. 285-293
-
-
Walters, K.1
-
61
-
-
0015672289
-
A note on the confinement problem
-
Oct. (II-C5)
-
B. Lampson “A note on the confinement problem,” Commun. ACM, vol. 16, pp. 613–615, Oct. 1973. (II-C5)
-
(1973)
Commun. ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.1
-
62
-
-
0003400251
-
Secure computer systems
-
Air Force Elec. Syst. Div. Rep. ESD-TR-73-278, vols., II, and III, Nov. (II-C5, III-B)
-
D. Bell and L. LaPadula, “Secure computer systems,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-278, vols. I, II, and III, Nov. 1973. (II-C5, III-B)
-
(1973)
, vol.I
-
-
Bell, D.1
LaPadula, L.2
-
63
-
-
0015315880
-
A hardware architecture for implementing protection rings
-
Mar. (II-C5, III-A, SFR)
-
M. Schroeder and J. Saltzer “A hardware architecture for implementing protection rings,” Commun. ACM, vol. 15, pp. 157–170, Mar. 1972. (II-C5, III-A, SFR)
-
(1972)
Commun. ACM
, vol.15
, pp. 157-170
-
-
Schroeder, M.1
Saltzer, J.2
-
64
-
-
0016382977
-
Memoryless subsystems
-
May (II-C5)
-
J. Fenton, “Memoryless subsystems,” Comput. J., vol. 17, pp. 143–147, May 1974. (II-C5)
-
(1974)
Comput. J.
, vol.17
, pp. 143-147
-
-
Fenton, J.1
-
65
-
-
0013402381
-
Hierarchical program structures
-
New York: Academic Press, (II-E)
-
O. Dahl and C. Hoare, “Hierarchical program structures,” in Structured Programming. New York: Academic Press, 1972, pp. 175–220. (II-E)
-
(1972)
Structured Programming
, pp. 175-220
-
-
Dahl, O.1
Hoare, C.2
-
66
-
-
84936896663
-
Privacy and protection in operating systems
-
Jan. (II-E)
-
D. Branstad “Privacy and protection in operating systems,” Computer, vol. 6, pp. 43–46, Jan. 1973. (II-E)
-
(1973)
Computer
, vol.6
, pp. 43-46
-
-
Branstad, D.1
-
67
-
-
0347896571
-
The nucleus of a multiprogramming system
-
Apr. (II-E)
-
P. Brinch-Hansen “The nucleus of a multiprogramming system,” Commun. ACM, vol. 13, pp. 238–250, Apr. 1970. (II-E)
-
(1970)
Commun. ACM
, vol.13
, pp. 238-250
-
-
Brinch-Hansen, P.1
-
68
-
-
84948604352
-
Memory structures for interactive computers
-
Ph.D. dissertation, Univ. of Calif., Berkeley, May (II-E)
-
J. LeClerc, “Memory structures for interactive computers,” Ph.D. dissertation, Univ. of Calif., Berkeley, May 1966. (II-E)
-
(1966)
-
-
LeClerc, J.1
-
69
-
-
84976761023
-
Address mapping and the control of access in an interactive computer
-
in (II-E)
-
D. Evans and J. LeClerc, “Address mapping and the control of access in an interactive computer,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30, pp. 23–30. (II-E)
-
1967 SJCC, AFIPS Conf. Proc.
, vol.30
, pp. 23-30
-
-
Evans, D.1
LeClerc, J.2
-
70
-
-
3743140411
-
Cooperation of mutually suspicious subsystems in a computer utility
-
Ph.D. dissertation, M.I.T., Cambridge, Mass., (Also available as M.I.T. Proj. MAC Tech. Rep. TR-104.) (II-E, III-A, SFR)
-
M. Schroeder, “Cooperation of mutually suspicious subsystems in a computer utility,” Ph.D. dissertation, M.I.T., Cambridge, Mass., 1972. (Also available as M.I.T. Proj. MAC Tech. Rep. TR-104.) (II-E, III-A, SFR)
-
(1972)
-
-
Schroeder, M.1
-
71
-
-
3743154925
-
Protection in programmed systems
-
Ph.D. dissertation, Carnegie-Mellon Univ., Pittsburgh, Pa., (II-E, SFR)
-
A. Jones, “Protection in programmed systems,” Ph.D. dissertation, Carnegie-Mellon Univ., Pittsburgh, Pa., 1973. (II-E, SFR)
-
(1973)
-
-
Jones, A.1
-
72
-
-
0015561577
-
Protection in programming languages
-
Jan. (II-E, SFR)
-
J. Morris “Protection in programming languages,” Commun. ACM, vol. 16, pp. 15–21, Jan. 1973. (II-E, SFR)
-
(1973)
Commun. ACM
, vol.16
, pp. 15-21
-
-
Morris, J.1
-
73
-
-
1342298829
-
Architecture of the IBM System/360
-
Apr. (III-A)
-
G. Amdahl, G. Blaauw, and F. Brooks “Architecture of the IBM System/360,” IBM J. Res. Develop., vol. 8, pp. 87–101, Apr. 1964. (III-A)
-
(1964)
IBM J. Res. Develop.
, vol.8
, pp. 87-101
-
-
Amdahl, G.1
Blaauw, G.2
Brooks, F.3
-
74
-
-
84948599005
-
System 370/Principles of operation
-
IBM Corp. Syst. Ref. Lib. GA22-7000-3, (III-A)
-
IBM Corp., “System 370/Principles of operation,” IBM Corp. Syst. Ref. Lib. GA22-7000-3, 1973. (III-A)
-
(1973)
-
-
-
75
-
-
84909537043
-
Encapsulation: An approach to operating system security
-
Annu. Conf., pp. (III-A)
-
R. Bisbey, II, and G. Popek, “Encapsulation: An approach to operating system security,” in Proc. ACM 1974 Annu. Conf., pp. 666-675. (III-A)
-
(1974)
Proc. ACM
, pp. 666-675
-
-
Bisbey, R.1
Popek, G.2
-
76
-
-
84948602721
-
-
DOD5200.28-M, Aug. (III-A)
-
Dept. of Defense, Manual of Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, DOD5200.28-M, Aug. 1972. (III-A)
-
(1972)
Manual of Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems
-
-
-
77
-
-
65249178780
-
Protection in an information processing utility
-
May (III-A)
-
R. Graham “Protection in an information processing utility,” Commun. ACM, vol. 11, pp. 365–369, May 1968. (III-A)
-
(1968)
Commun. ACM
, vol.11
, pp. 365-369
-
-
Graham, R.1
-
78
-
-
0014614566
-
The Hitac 5020 time-sharing system
-
in (III-A)
-
S. Motobayashi, T. Masuda, and N. Takahashi, “The Hitac 5020 time-sharing system,” in Proc. ACM 24th Nat. Conf., pp. 419–429, 1969. (III-A)
-
(1969)
Proc. ACM 24th Nat. Conf.
, pp. 419-429
-
-
Motobayashi, S.1
Masuda, T.2
Takahashi, N.3
-
79
-
-
0015724688
-
An experimental implementation of the kernel/domain architecture
-
Oct. (III-A)
-
M. Spier, T. Hastings, and D. Cutler “An experimental implementation of the kernel/domain architecture,” ACM Operating Syst. Rev., vol. 7, pp. 8–21, Oct. 1973. (III-A)
-
(1973)
ACM Operating Syst. Rev.
, vol.7
, pp. 8-21
-
-
Spier, M.1
Hastings, T.2
Cutler, D.3
-
80
-
-
84948596436
-
Computer systems research
-
July, to June 1974, pp., (III-B)
-
M.I.T. Proj. MAC, “Computer systems research,” in Project MAC Progress Report XI: July 1973 to June 1974, pp. 155-183. (III-B)
-
(1973)
Project MAC Progress Report XI
, pp. 155-183
-
-
Proj, M.I.T.1
-
81
-
-
84948593015
-
Synthesis of a software security system
-
Annu. Conf., pp. (III-B)
-
E. Burke, “Synthesis of a software security system,” in Proc. ACM 1974 Annu. Conf., pp. 648-650. (III-B)
-
(1974)
Proc. ACM
, pp. 648-650
-
-
Burke, E.1
-
82
-
-
3943101212
-
Design of a security kernel for the PDP-11/45
-
Air Force Elec. Syst. Div. Rep. ESD-TR-73-294, Dec. (III-B, SFR)
-
W. Schiller, “Design of a security kernel for the PDP-11/45,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-294, Dec. 1973. (III-B, SFR)
-
(1973)
-
-
Schiller, W.1
-
83
-
-
0014929268
-
Hardware aspects of secure computing
-
in (III-B, SFR)
-
L. Molho, “Hardware aspects of secure computing,” in 1970 SJCC, AFIPS Conf. Proc., vol. 36, pp. 135–141. (III-B, SFR)
-
1970 SJCC, AFIPS Conf. Proc.
, vol.36
, pp. 135-141
-
-
Molho, L.1
-
84
-
-
0015681446
-
Dynamic verification of operating system decisions
-
Nov. (III-B, SFR)
-
R. Fabry “Dynamic verification of operating system decisions,” Commun. ACM, vol. 16, pp. 659–668, Nov. 1973. (III-B, SFR)
-
(1973)
Commun. ACM
, vol.16
, pp. 659-668
-
-
Fabry, R.1
-
85
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct. (III-B)
-
C. Shannon “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949. (III-B)
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
86
-
-
84954099056
-
A panel session-Security kernels
-
Chm., in (III-B, SFR)
-
S. Lipner, Chm., “A panel session-Security kernels,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 973–980. (III-B, SFR)
-
1974 NCC, AFIPS Conf. Proc.
, vol.43
, pp. 973-980
-
-
Lipner, S.1
-
87
-
-
84948614200
-
A panel session-Research in data security-Policies and projects
-
in (III-B, SFR)
-
R. Mathis, Chm., “A panel session-Research in data security-Policies and projects,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 993–999. (III-B, SFR)
-
1974 NCC, AFIPS Conf. Proc.
, vol.43
, pp. 993-999
-
-
Mathis, R.1
-
88
-
-
84948613405
-
-
Rocquencourt, France: IRIA, Aug. (III-B, SFR)
-
Institut de Recherche d'Informatique et d'Automatique (IRIA), Int. Workshop Protection in Operating Systems. Rocquencourt, France: IRIA, Aug. 1974. (III-B, SFR)
-
(1974)
Int. Workshop Protection in Operating Systems
-
-
-
89
-
-
84948608581
-
Ongoing research and development on information protection
-
July (III-B, SFR)
-
J. Saltzer “Ongoing research and development on information protection,” ACM Operating Syst. Rev., vol. 8, pp. 8–24, July 1974. (III-B, SFR)
-
(1974)
ACM Operating Syst. Rev.
, vol.8
, pp. 8-24
-
-
Saltzer, J.1
-
91
-
-
0015279821
-
Is your computer insecure?
-
Jan. (SFR)
-
C. W. Beardsley “Is your computer insecure?” IEEE Spectrum, vol. 9, pp. 67–78, Jan. 1972. (SFR)
-
(1972)
IEEE Spectrum
, vol.9
, pp. 67-78
-
-
Beardsley, C.W.1
-
92
-
-
84909552542
-
Computer abuse
-
Stanford Res. Inst., Proj. ISU 2501, Nov. (SFR)
-
D. Parker, S. Nycom, and S. Oura, “Computer abuse,” Stanford Res. Inst., Proj. ISU 2501, Nov. 1973. (SFR)
-
(1973)
-
-
Parker, D.1
Nycom, S.2
Oura, S.3
-
93
-
-
0004253615
-
-
New York: Macmillan, (SFR)
-
D. Kahn, The Codebreakers. New York: Macmillan, 1967. (SFR)
-
(1967)
The Codebreakers
-
-
Kahn, D.1
-
94
-
-
84976664586
-
Cryptology, computers, and common sense
-
in (SFR)
-
G. Mellen, “Cryptology, computers, and common sense,” in 1973 NCC, AFIPS Conf. Proc., vol. 42, pp. 569–579. (SFR)
-
1973 NCC, AFIPS Conf. Proc.
, vol.42
, pp. 569-579
-
-
Mellen, G.1
-
95
-
-
0004200684
-
Computer security technology planning study
-
Air Force Elec. Syst. Div. Rep. ESD-TR-73-51, Oct. (SFR)
-
J. Anderson, “Computer security technology planning study,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-51, Oct. 1972. (SFR)
-
(1972)
-
-
Anderson, J.1
-
96
-
-
0006291871
-
Security controls for computer systems
-
Rand Corp. Tech. Rep. R-609, (Classified confidential.) (SFR)
-
W. Ware et al., “Security controls for computer systems,” Rand Corp. Tech. Rep. R-609, 1970. (Classified confidential.) (SFR)
-
(1970)
-
-
Ware, W.1
-
97
-
-
84948605975
-
Privacy and the computer: An annotated bibliography
-
Nov. (SFR)
-
R. Anderson and E. Fagerlund “Privacy and the computer: An annotated bibliography,” ACM Comput. Rev., vol. 13, pp. 551–559, Nov. 1972. (SFR)
-
(1972)
ACM Comput. Rev.
, vol.13
, pp. 551-559
-
-
Anderson, R.1
Fagerlund, E.2
-
98
-
-
84948611553
-
An annotated and cross-referenced bibliography on computer security and access control in computer systems
-
Ohio State Univ., Computer and Information Science Res. Center Rep. OSU-CISRC-T072-12, (SFR)
-
J. Bergart, M. Denicoff, and D. Hsiao, “An annotated and cross-referenced bibliography on computer security and access control in computer systems,” Ohio State Univ., Computer and Information Science Res. Center Rep. OSU-CISRC-T072-12, 1972. (SFR)
-
(1972)
-
-
Bergart, J.1
Denicoff, M.2
Hsiao, D.3
-
99
-
-
84948611346
-
Controlled accessibility bibliography
-
Nat. Bur. Stand. Tech. Note 780, June (SFR)
-
S. Reed and M. Gray, “Controlled accessibility bibliography,” Nat. Bur. Stand. Tech. Note 780, June 1973. (SFR)
-
(1973)
-
-
Reed, S.1
Gray, M.2
-
100
-
-
84944481953
-
Computer and data base security: A comprehensive annotated bibliography
-
M.I.T. Proj. MAC Tech. Rep. TR-122, Jan. (SFR)
-
J. Scherf, “Computer and data base security: A comprehensive annotated bibliography,” M.I.T. Proj. MAC Tech. Rep. TR-122, Jan. 1974. (SFR)
-
(1974)
-
-
Scherf, J.1
|