메뉴 건너뛰기




Volumn 63, Issue 9, 1975, Pages 1278-1308

The Protection of Information in Computer Systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE;

EID: 0016555241     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/PROC.1975.9939     Document Type: Article
Times cited : (1431)

References (100)
  • 1
  • 2
    • 0038763194 scopus 로고
    • Ann Arbor, Mich.: Univ. of Mich. Press, also New York: Signet, 1972, Paperback W4934. (I-A1, SFR)
    • A. Miller, The Assault on Privacy. Ann Arbor, Mich.: Univ. of Mich. Press, 1971; also New York: Signet, 1972, Paperback W4934. (I-A1, SFR)
    • (1971) The Assault on Privacy
    • Miller, A.1
  • 3
    • 0003746860 scopus 로고
    • Cambridge, Mass.: M.I.T. Press, (I-A1, SFR)
    • Dept. of Health, Education, and Welfare, Records, Computers, and the Rights of Citizens. Cambridge, Mass.: M.I.T. Press, 1973. (I-A1, SFR)
    • (1973) Records, Computers, and the Rights of Citizens
  • 4
    • 0016611332 scopus 로고
    • Privacy and security in computer systems
    • Mar.–Apr. (I-A1)
    • R. Turn and W. Ware, “Privacy and security in computer systems,” Amer. Scientist, vol. 63, pp. 196–203, Mar.–Apr. 1975. (I-A1)
    • (1975) Amer. Scientist , vol.63 , pp. 196-203
    • Turn, R.1    Ware, W.2
  • 5
    • 84948590819 scopus 로고    scopus 로고
    • Security and privacy in computer systems
    • in (I-A1)
    • W. Ware, “Security and privacy in computer systems,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30, pp. 287–290. (I-A1)
    • 1967 SJCC, AFIPS Conf. Proc. , vol.30 , pp. 287-290
    • Ware, W.1
  • 6
    • 77956859736 scopus 로고
    • Information security in a multi-user computer environment
    • New York: Academic Press (I-A1, SFR)
    • J. Anderson, “Information security in a multi-user computer environment,” in Advances in Computers, vol. 12. New York: Academic Press, 1973, pp. 1–35. (I-A1, SFR)
    • (1973) Advances in Computers , vol.12 , pp. 1-35
    • Anderson, J.1
  • 9
    • 84938065908 scopus 로고
    • Function and design of DOS/360 and TOS/360
    • (I-A2)
    • G. Bender, D. Freeman, and J. Smith “Function and design of DOS/360 and TOS/360,” IBM Syst. J., vol. 6, pp. 2–21, 1967. (I-A2)
    • (1967) IBM Syst. J. , vol.6 , pp. 2-21
    • Bender, G.1    Freeman, D.2    Smith, J.3
  • 10
    • 0014639551 scopus 로고    scopus 로고
    • Design considerations for an educational time-sharing system
    • in (I-A2)
    • R. Hargraves and A. Stephenson, “Design considerations for an educational time-sharing system,” in 1969 SJCC, AFIPS Conf. Proc., vol. 34, pp. 657–664. (I-A2)
    • 1969 SJCC, AFIPS Conf. Proc. , vol.34 , pp. 657-664
    • Hargraves, R.1    Stephenson, A.2
  • 11
    • 0014929124 scopus 로고
    • A virtual machine time-sharing system
    • (I-A2, I-B3, III-A)
    • R. Meyer and L. Seawright “A virtual machine time-sharing system,” IBM Syst. J., vol. 9, pp. 199–218, 1970. (I-A2, I-B3, III-A)
    • (1970) IBM Syst. J. , vol.9 , pp. 199-218
    • Meyer, R.1    Seawright, L.2
  • 12
    • 84879877754 scopus 로고
    • 2nd ed. Cambridge, Mass.: M.I.T. Press, (I-A2, III-A)
    • M.I.T. Computation Center, CTSS Programmer's Guide, 2nd ed. Cambridge, Mass.: M.I.T. Press, 1965. (I-A2, III-A)
    • (1965) CTSS Programmer's Guide
  • 13
    • 84948608849 scopus 로고
    • PDP-10 system concepts and capabilities
    • Maynard, Mass: Digital Equipment Corp., undated (ca.) (I-A2)
    • D. Stone, “PDP-10 system concepts and capabilities,” in PDP-10 Applications in Science, vol. II. Maynard, Mass: Digital Equipment Corp., undated (ca. 1970), pp. 32–55. (I-A2)
    • (1970) PDP-10 Applications in Science , vol.II , pp. 32-55
    • Stone, D.1
  • 14
    • 4544284713 scopus 로고    scopus 로고
    • Security controls in the ADEPT-50 time-sharing system
    • in (I-A2, II-C5, III-A, III-B, SFR)
    • C. Weissman, “Security controls in the ADEPT-50 time-sharing system,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35, pp. 119–133. (I-A2, II-C5, III-A, III-B, SFR)
    • 1969 FJCC, AFIPS Conf. Proc. , vol.35 , pp. 119-133
    • Weissman, C.1
  • 15
    • 0015316050 scopus 로고
    • TENEX, a paged time sharing system for the PDP-10
    • Mar. (I-A2, II-C3)
    • D. Bobrow et al. “TENEX, a paged time sharing system for the PDP-10,” Commun. ACM, vol. 15, pp. 135–143, Mar. 1972. (I-A2, II-C3)
    • (1972) Commun. ACM , vol.15 , pp. 135-143
    • Bobrow, D.1
  • 17
    • 84939761725 scopus 로고
    • A postmortem for a time sharing system
    • Ph.D. dissertation, Univ. of Calif., Berkeley, (Also available as Xerox Palo Alto Res. Center Tech. Rep. CSL74-1.) (I-A2, II-C2, II-E, III-A, SFR)
    • H. Sturgis, “A postmortem for a time sharing system,” Ph.D. dissertation, Univ. of Calif., Berkeley, 1973. (Also available as Xerox Palo Alto Res. Center Tech. Rep. CSL74-1.) (I-A2, II-C2, II-E, III-A, SFR)
    • (1973)
    • Sturgis, H.1
  • 18
    • 0016082170 scopus 로고
    • The UNIX time-sharing system
    • July (I-A2, II-C3)
    • D. Ritchie and K. Thompson “The UNIX time-sharing system,” Commun. ACM, vol. 17, pp. 365–375, July 1974. (I-A2, II-C3)
    • (1974) Commun. ACM , vol.17 , pp. 365-375
    • Ritchie, D.1    Thompson, K.2
  • 19
    • 0014636736 scopus 로고    scopus 로고
    • Dynamic protection structures
    • in (I-A2, II-E, III-A)
    • B. Lampson, “Dynamic protection structures,” in 1969 FJCC, AFIPS Conf. Proc., vol. 35, pp. 27–38. (I-A2, II-E, III-A)
    • 1969 FJCC, AFIPS Conf. Proc. , vol.35 , pp. 27-38
    • Lampson, B.1
  • 20
    • 85069756226 scopus 로고    scopus 로고
    • Protection systems and protection implementations
    • in (I-A2, II-B3, II-E, III-A, SFR)
    • R. Needham, “Protection systems and protection implementations,” in 1972 FJCC, AFIPS Conf. Proc., vol. 41, part. I, pp. 571–578. (I-A2, II-B3, II-E, III-A, SFR)
    • 1972 FJCC, AFIPS Conf. Proc. , vol.41 , pp. 571-578
    • Needham, R.1
  • 21
    • 0016069660 scopus 로고
    • HYDRA: The kernel of a multiprocessor operating system
    • June (I-A2, II-B3, III-A)
    • W. Wulf et al. “HYDRA: The kernel of a multiprocessor operating system,” Commun. ACM, vol. 17, pp. 337–345, June 1974. (I-A2, II-B3, III-A)
    • (1974) Commun. ACM , vol.17 , pp. 337-345
    • Wulf, W.1
  • 22
    • 0015331056 scopus 로고
    • On the implementation of security measures in information systems
    • Apr. (I-A2)
    • R. Conway, W. Maxwell, and H. Morgan “On the implementation of security measures in information systems,” Commun. ACM, vol. 15, pp. 211–220, Apr. 1972. (I-A2)
    • (1972) Commun. ACM , vol.15 , pp. 211-220
    • Conway, R.1    Maxwell, W.2    Morgan, H.3
  • 23
    • 84948613388 scopus 로고
    • The application of information theory to privacy in data banks
    • Rand Corp., Tech. Rep. R-1282-NSF, (I-A2)
    • I. Reed, “The application of information theory to privacy in data banks,” Rand Corp., Tech. Rep. R-1282-NSF, 1973. (I-A2)
    • (1973)
    • Reed, I.1
  • 24
  • 25
    • 0005616406 scopus 로고
    • Getting a personal dossier from a statistical data bank
    • May (I-A2)
    • L. Hoffman and W. Miller “Getting a personal dossier from a statistical data bank,” Datamation, vol. 16, pp. 74–75, May 1970. (I-A2)
    • (1970) Datamation , vol.16 , pp. 74-75
    • Hoffman, L.1    Miller, W.2
  • 26
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in Multics
    • July (I-A3, I-B4, III-A, SFR)
    • J. Saltzer “Protection and the control of information sharing in Multics,” Commun. ACM, vol. 17, pp. 388–402, July 1974. (I-A3, I-B4, III-A, SFR)
    • (1974) Commun. ACM , vol.17 , pp. 388-402
    • Saltzer, J.1
  • 27
    • 84948604530 scopus 로고
    • Security, secrecy, and tamper-free considerations
    • Rand Corp. Tech. Rep. RM-3765-PR, (I-A3, III-B)
    • P. Baran, “Security, secrecy, and tamper-free considerations,” on Distributed Communications, no. 9, Rand Corp. Tech. Rep. RM-3765-PR, 1964. (I-A3, III-B)
    • (1964) on Distributed Communications , Issue.9
    • Baran, P.1
  • 28
    • 84892286191 scopus 로고    scopus 로고
    • A principle of kernel design
    • in (I-A3)
    • G. Popek, “A principle of kernel design,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 977–978. (I-A3)
    • 1974 NCC, AFIPS Conf. Proc. , vol.43 , pp. 977-978
    • Popek, G.1
  • 29
    • 84867323610 scopus 로고
    • Enhancing computer system security
    • Rand Corp. Paper P-5064, (I-A3)
    • D. Hollingsworth, “Enhancing computer system security,” Rand Corp. Paper P-5064, 1973. (I-A3)
    • (1973)
    • Hollingsworth, D.1
  • 30
    • 0002179618 scopus 로고
    • Protection
    • (Mar.), (Reprinted in ACM Operating Syst. Rev., vol. 8, pp. 18–24, Jan. 1974.) (I-B1, II-B2, II-E, SFR)
    • B. Lampson “Protection,” in Proc. 5th Princeton Symp. Information Science and Systems (Mar. 1971), pp. 437–443. (Reprinted in ACM Operating Syst. Rev., vol. 8, pp. 18–24, Jan. 1974.) (I-B1, II-B2, II-E, SFR)
    • (1971) Proc. 5th Princeton Symp. Information Science and Systems , pp. 437-443
    • Lampson, B.1
  • 31
    • 77949786374 scopus 로고
    • Multiprogramming Stretch: Feasibility considerations
    • Nov. (I-B3)
    • E. Codd et al. “Multiprogramming Stretch: Feasibility considerations,” Commun. ACM, vol. 2, pp. 13–17, Nov. 1959. (I-B3)
    • (1959) Commun. ACM , vol.2 , pp. 13-17
    • Codd, E.1
  • 32
    • 1842522705 scopus 로고
    • Design of the B5000 system
    • May (I-B3, I-B5)
    • W. Lonergan and P. King “Design of the B5000 system,” Datamation, vol. 7, pp. 28–32, May 1961. (I-B3, I-B5)
    • (1961) Datamation , vol.7 , pp. 28-32
    • Lonergan, W.1    King, P.2
  • 33
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • July (I-B3)
    • G. Popek and R. Goldberg “Formal requirements for virtualizable third generation architectures,” Commun. ACM, vol. 17, pp. 412–421, July 1974. (I-B3)
    • (1974) Commun. ACM , vol.17 , pp. 412-421
    • Popek, G.1    Goldberg, R.2
  • 34
    • 0015769027 scopus 로고    scopus 로고
    • Architecture of virtual machines
    • in (I-B3)
    • R. Goldberg, “Architecture of virtual machines,” in 1973 NCC, AFIPS Conf. Proc., vol. 42, pp. 309–318. (I-B3)
    • 1973 NCC, AFIPS Conf. Proc. , vol.42 , pp. 309-318
    • Goldberg, R.1
  • 35
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • Aug. (I-B4)
    • G. Purdy “A high security log-in procedure,” Commun. ACM, vol. 17, pp. 442–445, Aug. 1974. (I-B4)
    • (1974) Commun. ACM , vol.17 , pp. 442-445
    • Purdy, G.1
  • 36
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Aug. (I-B4)
    • A. Evans, W. Kantrowitz, and E. Weiss “A user authentication scheme not requiring secrecy in the computer,” Commun. ACM, vol. 17, pp. 437–442, Aug. 1974. (I-B4)
    • (1974) Commun. ACM , vol.17 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, E.3
  • 37
    • 0003746118 scopus 로고
    • 2nd ed. New York: American-Elsevier, (I-B4, I-B5, II-A)
    • M. Wilkes, Time-Sharing Computer Systems, 2nd ed. New York: American-Elsevier, 1972. (I-B4, I-B5, II-A)
    • (1972) Time-Sharing Computer Systems
    • Wilkes, M.1
  • 38
    • 84976819632 scopus 로고
    • An experimental application of cryptography to a remotely accessed data system
    • in (I-B4, III-B, SFR)
    • J. Smith, W. Notz, and P. Osseck, “An experimental application of cryptography to a remotely accessed data system,” in Proc. ACM 25th Nat. Conf., pp. 282–298, 1972. (I-B4, III-B, SFR)
    • (1972) Proc. ACM 25th Nat. Conf. , pp. 282-298
    • Smith, J.1    Notz, W.2    Osseck, P.3
  • 39
    • 78349288354 scopus 로고
    • Cryptographic coding for data bank privacy
    • IBM Corp. Res. Rep. RC 2827, Mar. (I-B4, III-B, SFR)
    • H. Feistel, “Cryptographic coding for data bank privacy,” IBM Corp. Res. Rep. RC 2827, Mar. 1970. (I-B4, III-B, SFR)
    • (1970)
    • Feistel, H.1
  • 40
    • 78349258838 scopus 로고
    • Security aspects of computer networks
    • (Apr.), Paper 73-427. (I-B4, I-B5, III-B, SFR)
    • D. Branstad, “Security aspects of computer networks,” in AIAA Computer Network Systems Conf. (Apr. 1973), Paper 73-427. (I-B4, I-B5, III-B, SFR)
    • (1973) AIAA Computer Network Systems Conf.
    • Branstad, D.1
  • 41
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Mar. (I-B5, II-B1, II-E)
    • J. Dennis and E. Van Horn “Programming semantics for multiprogrammed computations,” Commun. ACM, vol. 9, pp. 143–155, Mar. 1966. (I-B5, II-B1, II-E)
    • (1966) Commun. ACM , vol.9 , pp. 143-155
    • Dennis, J.1    Van Horn, E.2
  • 42
    • 0345533636 scopus 로고
    • Segmentation and the design of multiprogrammed computer systems
    • Oct. (I-B5, II-A)
    • J. Dennis “Segmentation and the design of multiprogrammed computer systems,” J ACM, vol. 12, pp. 589–602, Oct. 1965. (I-B5, II-A)
    • (1965) J ACM , vol.12 , pp. 589-602
    • Dennis, J.1
  • 43
    • 0004625488 scopus 로고
    • Virtual memory, processes, and sharing in Multics
    • May (I-B5)
    • R. Daley and J. Dennis “Virtual memory, processes, and sharing in Multics,” Commun. ACM, vol. 11, pp. 306–312, May 1968. (I-B5)
    • (1968) Commun. ACM , vol.11 , pp. 306-312
    • Daley, R.1    Dennis, J.2
  • 45
    • 0016081585 scopus 로고
    • Capability-based addressing
    • July (II-A, SFR)
    • R. Fabry “Capability-based addressing,” Commun. ACM, vol. 17, pp. 403–412, July 1974. (II-A, SFR)
    • (1974) Commun. ACM , vol.17 , pp. 403-412
    • Fabry, R.1
  • 48
    • 84976842940 scopus 로고
    • An implementation of a multiprocessing computer system
    • (Oct.), Paper D-3. (II-B1)
    • W. Ackerman and W. Hummer, “An implementation of a multiprocessing computer system,” in Proc. ACM Symp. Operating System Principles (Oct. 1967), Paper D-3. (II-B1)
    • (1967) Proc. ACM Symp. Operating System Principles
    • Ackerman, W.1    Hummer, W.2
  • 49
    • 84948608548 scopus 로고
    • Preliminary description of a supervisor for a machine oriented around capabilities
    • sec. IB, Univ. of Chicago, Aug. (II-B1)
    • R. Fabry, “Preliminary description of a supervisor for a machine oriented around capabilities,” Inst. Comput. Res. Quart. Rep., vol. 18, sec. IB, Univ. of Chicago, Aug. 1968. (II-B1)
    • (1968) Inst. Comput. Res. Quart. Rep. , vol.18
    • Fabry, R.1
  • 50
    • 1842522707 scopus 로고
    • A dynamic storage allocation scheme
    • Oct. (II-B1)
    • J. Iliffe and J. Jodeit, “A dynamic storage allocation scheme,” Comput. J., vol. 5, pp. 200–209, Oct. 1962. (II-B1)
    • (1962) Comput. J. , vol.5 , pp. 200-209
    • Iliffe, J.1    Jodeit, J.2
  • 51
    • 0015641828 scopus 로고
    • On the advantages of tagged architecture
    • July (II-B1)
    • E. A. Feustel “On the advantages of tagged architecture,” IEEE Trans. Comput., vol. C-22, pp. 644–656, July 1973. (II-B1)
    • (1973) IEEE Trans. Comput. , vol.C-22 , pp. 644-656
    • Feustel, E.A.1
  • 52
    • 0016726369 scopus 로고
    • On attaining reliable software for a secure operating system
    • (Apr.) (II-B3, III-B)
    • L. Robinson et al., “On attaining reliable software for a secure operating system,” in Int. Conf. Reliable Software (Apr. 1975), pp. 267–284. (II-B3, III-B)
    • (1975) Int. Conf. Reliable Software , pp. 267-284
    • Robinson, L.1
  • 53
    • 0002799680 scopus 로고
    • Capability concept mechanism and structure in system 250
    • (Aug.) (II-B3, III-A)
    • D. England, “Capability concept mechanism and structure in system 250,” in IRIA Int. Workshop Protection in Operating Systems (Aug. 1974), pp. 63–82. (II-B3, III-A)
    • (1974) IRIA Int. Workshop Protection in Operating Systems , pp. 63-82
    • England, D.1
  • 54
    • 33749550010 scopus 로고
    • Naming and protection in extendible operating systems
    • Ph.D. dissertation, Univ. of Calif., Berkeley, (Available as M.I.T. Proj. MAC Tech. Rep. TR-140.) (II-B3, III-A, SFR)
    • D. Redell, “Naming and protection in extendible operating systems,” Ph.D. dissertation, Univ. of Calif., Berkeley, 1974. (Available as M.I.T. Proj. MAC Tech. Rep. TR-140.) (II-B3, III-A, SFR)
    • (1974)
    • Redell, D.1
  • 55
    • 84976733023 scopus 로고
    • The Multics virtual memory: Concepts and design
    • May (II-B3, II-C3)
    • A. Bensoussan, C. Clingen, and R. Daley “The Multics virtual memory: Concepts and design,” Commun. ACM, vol. 15, pp. 308–318, May 1972. (II-B3, II-C3)
    • (1972) Commun. ACM , vol.15 , pp. 308-318
    • Bensoussan, A.1    Clingen, C.2    Daley, R.3
  • 56
    • 77956066595 scopus 로고
    • A user machine in a time-sharing system
    • Dec. (II-C3)
    • B. W. Lampson, W. W. Lichtenberger, and M. W. Pirtle “A user machine in a time-sharing system,” Proc. IEEE, vol. 54, pp. 1766–1774, Dec. 1966. (II-C3)
    • (1966) Proc. IEEE , vol.54 , pp. 1766-1774
    • Lampson, B.W.1    Lichtenberger, W.W.2    Pirtle, M.W.3
  • 57
    • 84948603890 scopus 로고
    • Access controls in Burroughs large systems
    • Nat. Bur. Stand. Special Pub. 404, Sept. (II-C3)
    • H. Bingham, “Access controls in Burroughs large systems,” Privacy and Security in Computer Systems, Nat. Bur. Stand. Special Pub. 404, pp. 42–45, Sept. 1974. (II-C3)
    • (1974) Privacy and Security in Computer Systems , pp. 42-45
    • Bingham, H.1
  • 58
    • 84983928388 scopus 로고    scopus 로고
    • A general-purpose file system for secondary storage
    • in
    • R. Daley and P. Neumann, “A general-purpose file system for secondary storage,” in 1965 FJCC, AFIPS Conf. Proc., vol. 27, part. I, pp. 213–229. (II-C4)
    • 1965 FJCC, AFIPS Conf. Proc. , vol.27 , pp. 213-229
    • Daley, R.1    Neumann, P.2
  • 59
    • 84938001503 scopus 로고
    • Making computers keep secrets
    • Ph.D. dissertation, M.I.T., Cambridge, Mass., (Also available as M.I.T. Proj. MAC Tech. Rep. TR-115.) (II-C4, II-C5, II-E, III-A, III-B, SFR)
    • L. Rotenberg, “Making computers keep secrets,” Ph.D. dissertation, M.I.T., Cambridge, Mass., 1973. (Also available as M.I.T. Proj. MAC Tech. Rep. TR-115.) (II-C4, II-C5, II-E, III-A, III-B, SFR)
    • (1973)
    • Rotenberg, L.1
  • 60
    • 0016726281 scopus 로고
    • Structured specification of a security kernel
    • Los Angeles, Calif., Apr. (II-C5)
    • K. Walters et al., “Structured specification of a security kernel,” in Int. Conf. Reliable Software, Los Angeles, Calif., pp. 285–293, Apr. 1975. (II-C5)
    • (1975) Int. Conf. Reliable Software , pp. 285-293
    • Walters, K.1
  • 61
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct. (II-C5)
    • B. Lampson “A note on the confinement problem,” Commun. ACM, vol. 16, pp. 613–615, Oct. 1973. (II-C5)
    • (1973) Commun. ACM , vol.16 , pp. 613-615
    • Lampson, B.1
  • 62
    • 0003400251 scopus 로고
    • Secure computer systems
    • Air Force Elec. Syst. Div. Rep. ESD-TR-73-278, vols., II, and III, Nov. (II-C5, III-B)
    • D. Bell and L. LaPadula, “Secure computer systems,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-278, vols. I, II, and III, Nov. 1973. (II-C5, III-B)
    • (1973) , vol.I
    • Bell, D.1    LaPadula, L.2
  • 63
    • 0015315880 scopus 로고
    • A hardware architecture for implementing protection rings
    • Mar. (II-C5, III-A, SFR)
    • M. Schroeder and J. Saltzer “A hardware architecture for implementing protection rings,” Commun. ACM, vol. 15, pp. 157–170, Mar. 1972. (II-C5, III-A, SFR)
    • (1972) Commun. ACM , vol.15 , pp. 157-170
    • Schroeder, M.1    Saltzer, J.2
  • 64
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May (II-C5)
    • J. Fenton, “Memoryless subsystems,” Comput. J., vol. 17, pp. 143–147, May 1974. (II-C5)
    • (1974) Comput. J. , vol.17 , pp. 143-147
    • Fenton, J.1
  • 65
    • 0013402381 scopus 로고
    • Hierarchical program structures
    • New York: Academic Press, (II-E)
    • O. Dahl and C. Hoare, “Hierarchical program structures,” in Structured Programming. New York: Academic Press, 1972, pp. 175–220. (II-E)
    • (1972) Structured Programming , pp. 175-220
    • Dahl, O.1    Hoare, C.2
  • 66
    • 84936896663 scopus 로고
    • Privacy and protection in operating systems
    • Jan. (II-E)
    • D. Branstad “Privacy and protection in operating systems,” Computer, vol. 6, pp. 43–46, Jan. 1973. (II-E)
    • (1973) Computer , vol.6 , pp. 43-46
    • Branstad, D.1
  • 67
    • 0347896571 scopus 로고
    • The nucleus of a multiprogramming system
    • Apr. (II-E)
    • P. Brinch-Hansen “The nucleus of a multiprogramming system,” Commun. ACM, vol. 13, pp. 238–250, Apr. 1970. (II-E)
    • (1970) Commun. ACM , vol.13 , pp. 238-250
    • Brinch-Hansen, P.1
  • 68
    • 84948604352 scopus 로고
    • Memory structures for interactive computers
    • Ph.D. dissertation, Univ. of Calif., Berkeley, May (II-E)
    • J. LeClerc, “Memory structures for interactive computers,” Ph.D. dissertation, Univ. of Calif., Berkeley, May 1966. (II-E)
    • (1966)
    • LeClerc, J.1
  • 69
    • 84976761023 scopus 로고    scopus 로고
    • Address mapping and the control of access in an interactive computer
    • in (II-E)
    • D. Evans and J. LeClerc, “Address mapping and the control of access in an interactive computer,” in 1967 SJCC, AFIPS Conf. Proc., vol. 30, pp. 23–30. (II-E)
    • 1967 SJCC, AFIPS Conf. Proc. , vol.30 , pp. 23-30
    • Evans, D.1    LeClerc, J.2
  • 70
    • 3743140411 scopus 로고
    • Cooperation of mutually suspicious subsystems in a computer utility
    • Ph.D. dissertation, M.I.T., Cambridge, Mass., (Also available as M.I.T. Proj. MAC Tech. Rep. TR-104.) (II-E, III-A, SFR)
    • M. Schroeder, “Cooperation of mutually suspicious subsystems in a computer utility,” Ph.D. dissertation, M.I.T., Cambridge, Mass., 1972. (Also available as M.I.T. Proj. MAC Tech. Rep. TR-104.) (II-E, III-A, SFR)
    • (1972)
    • Schroeder, M.1
  • 71
    • 3743154925 scopus 로고
    • Protection in programmed systems
    • Ph.D. dissertation, Carnegie-Mellon Univ., Pittsburgh, Pa., (II-E, SFR)
    • A. Jones, “Protection in programmed systems,” Ph.D. dissertation, Carnegie-Mellon Univ., Pittsburgh, Pa., 1973. (II-E, SFR)
    • (1973)
    • Jones, A.1
  • 72
    • 0015561577 scopus 로고
    • Protection in programming languages
    • Jan. (II-E, SFR)
    • J. Morris “Protection in programming languages,” Commun. ACM, vol. 16, pp. 15–21, Jan. 1973. (II-E, SFR)
    • (1973) Commun. ACM , vol.16 , pp. 15-21
    • Morris, J.1
  • 73
    • 1342298829 scopus 로고
    • Architecture of the IBM System/360
    • Apr. (III-A)
    • G. Amdahl, G. Blaauw, and F. Brooks “Architecture of the IBM System/360,” IBM J. Res. Develop., vol. 8, pp. 87–101, Apr. 1964. (III-A)
    • (1964) IBM J. Res. Develop. , vol.8 , pp. 87-101
    • Amdahl, G.1    Blaauw, G.2    Brooks, F.3
  • 74
    • 84948599005 scopus 로고
    • System 370/Principles of operation
    • IBM Corp. Syst. Ref. Lib. GA22-7000-3, (III-A)
    • IBM Corp., “System 370/Principles of operation,” IBM Corp. Syst. Ref. Lib. GA22-7000-3, 1973. (III-A)
    • (1973)
  • 75
    • 84909537043 scopus 로고
    • Encapsulation: An approach to operating system security
    • Annu. Conf., pp. (III-A)
    • R. Bisbey, II, and G. Popek, “Encapsulation: An approach to operating system security,” in Proc. ACM 1974 Annu. Conf., pp. 666-675. (III-A)
    • (1974) Proc. ACM , pp. 666-675
    • Bisbey, R.1    Popek, G.2
  • 77
    • 65249178780 scopus 로고
    • Protection in an information processing utility
    • May (III-A)
    • R. Graham “Protection in an information processing utility,” Commun. ACM, vol. 11, pp. 365–369, May 1968. (III-A)
    • (1968) Commun. ACM , vol.11 , pp. 365-369
    • Graham, R.1
  • 79
    • 0015724688 scopus 로고
    • An experimental implementation of the kernel/domain architecture
    • Oct. (III-A)
    • M. Spier, T. Hastings, and D. Cutler “An experimental implementation of the kernel/domain architecture,” ACM Operating Syst. Rev., vol. 7, pp. 8–21, Oct. 1973. (III-A)
    • (1973) ACM Operating Syst. Rev. , vol.7 , pp. 8-21
    • Spier, M.1    Hastings, T.2    Cutler, D.3
  • 80
    • 84948596436 scopus 로고
    • Computer systems research
    • July, to June 1974, pp., (III-B)
    • M.I.T. Proj. MAC, “Computer systems research,” in Project MAC Progress Report XI: July 1973 to June 1974, pp. 155-183. (III-B)
    • (1973) Project MAC Progress Report XI , pp. 155-183
    • Proj, M.I.T.1
  • 81
    • 84948593015 scopus 로고
    • Synthesis of a software security system
    • Annu. Conf., pp. (III-B)
    • E. Burke, “Synthesis of a software security system,” in Proc. ACM 1974 Annu. Conf., pp. 648-650. (III-B)
    • (1974) Proc. ACM , pp. 648-650
    • Burke, E.1
  • 82
    • 3943101212 scopus 로고
    • Design of a security kernel for the PDP-11/45
    • Air Force Elec. Syst. Div. Rep. ESD-TR-73-294, Dec. (III-B, SFR)
    • W. Schiller, “Design of a security kernel for the PDP-11/45,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-294, Dec. 1973. (III-B, SFR)
    • (1973)
    • Schiller, W.1
  • 83
    • 0014929268 scopus 로고    scopus 로고
    • Hardware aspects of secure computing
    • in (III-B, SFR)
    • L. Molho, “Hardware aspects of secure computing,” in 1970 SJCC, AFIPS Conf. Proc., vol. 36, pp. 135–141. (III-B, SFR)
    • 1970 SJCC, AFIPS Conf. Proc. , vol.36 , pp. 135-141
    • Molho, L.1
  • 84
    • 0015681446 scopus 로고
    • Dynamic verification of operating system decisions
    • Nov. (III-B, SFR)
    • R. Fabry “Dynamic verification of operating system decisions,” Commun. ACM, vol. 16, pp. 659–668, Nov. 1973. (III-B, SFR)
    • (1973) Commun. ACM , vol.16 , pp. 659-668
    • Fabry, R.1
  • 85
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct. (III-B)
    • C. Shannon “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949. (III-B)
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.1
  • 86
    • 84954099056 scopus 로고    scopus 로고
    • A panel session-Security kernels
    • Chm., in (III-B, SFR)
    • S. Lipner, Chm., “A panel session-Security kernels,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 973–980. (III-B, SFR)
    • 1974 NCC, AFIPS Conf. Proc. , vol.43 , pp. 973-980
    • Lipner, S.1
  • 87
    • 84948614200 scopus 로고    scopus 로고
    • A panel session-Research in data security-Policies and projects
    • in (III-B, SFR)
    • R. Mathis, Chm., “A panel session-Research in data security-Policies and projects,” in 1974 NCC, AFIPS Conf. Proc., vol. 43, pp. 993–999. (III-B, SFR)
    • 1974 NCC, AFIPS Conf. Proc. , vol.43 , pp. 993-999
    • Mathis, R.1
  • 88
    • 84948613405 scopus 로고
    • Rocquencourt, France: IRIA, Aug. (III-B, SFR)
    • Institut de Recherche d'Informatique et d'Automatique (IRIA), Int. Workshop Protection in Operating Systems. Rocquencourt, France: IRIA, Aug. 1974. (III-B, SFR)
    • (1974) Int. Workshop Protection in Operating Systems
  • 89
    • 84948608581 scopus 로고
    • Ongoing research and development on information protection
    • July (III-B, SFR)
    • J. Saltzer “Ongoing research and development on information protection,” ACM Operating Syst. Rev., vol. 8, pp. 8–24, July 1974. (III-B, SFR)
    • (1974) ACM Operating Syst. Rev. , vol.8 , pp. 8-24
    • Saltzer, J.1
  • 91
    • 0015279821 scopus 로고
    • Is your computer insecure?
    • Jan. (SFR)
    • C. W. Beardsley “Is your computer insecure?” IEEE Spectrum, vol. 9, pp. 67–78, Jan. 1972. (SFR)
    • (1972) IEEE Spectrum , vol.9 , pp. 67-78
    • Beardsley, C.W.1
  • 92
    • 84909552542 scopus 로고
    • Computer abuse
    • Stanford Res. Inst., Proj. ISU 2501, Nov. (SFR)
    • D. Parker, S. Nycom, and S. Oura, “Computer abuse,” Stanford Res. Inst., Proj. ISU 2501, Nov. 1973. (SFR)
    • (1973)
    • Parker, D.1    Nycom, S.2    Oura, S.3
  • 93
    • 0004253615 scopus 로고
    • New York: Macmillan, (SFR)
    • D. Kahn, The Codebreakers. New York: Macmillan, 1967. (SFR)
    • (1967) The Codebreakers
    • Kahn, D.1
  • 94
    • 84976664586 scopus 로고    scopus 로고
    • Cryptology, computers, and common sense
    • in (SFR)
    • G. Mellen, “Cryptology, computers, and common sense,” in 1973 NCC, AFIPS Conf. Proc., vol. 42, pp. 569–579. (SFR)
    • 1973 NCC, AFIPS Conf. Proc. , vol.42 , pp. 569-579
    • Mellen, G.1
  • 95
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Air Force Elec. Syst. Div. Rep. ESD-TR-73-51, Oct. (SFR)
    • J. Anderson, “Computer security technology planning study,” Air Force Elec. Syst. Div. Rep. ESD-TR-73-51, Oct. 1972. (SFR)
    • (1972)
    • Anderson, J.1
  • 96
    • 0006291871 scopus 로고
    • Security controls for computer systems
    • Rand Corp. Tech. Rep. R-609, (Classified confidential.) (SFR)
    • W. Ware et al., “Security controls for computer systems,” Rand Corp. Tech. Rep. R-609, 1970. (Classified confidential.) (SFR)
    • (1970)
    • Ware, W.1
  • 97
    • 84948605975 scopus 로고
    • Privacy and the computer: An annotated bibliography
    • Nov. (SFR)
    • R. Anderson and E. Fagerlund “Privacy and the computer: An annotated bibliography,” ACM Comput. Rev., vol. 13, pp. 551–559, Nov. 1972. (SFR)
    • (1972) ACM Comput. Rev. , vol.13 , pp. 551-559
    • Anderson, R.1    Fagerlund, E.2
  • 98
    • 84948611553 scopus 로고
    • An annotated and cross-referenced bibliography on computer security and access control in computer systems
    • Ohio State Univ., Computer and Information Science Res. Center Rep. OSU-CISRC-T072-12, (SFR)
    • J. Bergart, M. Denicoff, and D. Hsiao, “An annotated and cross-referenced bibliography on computer security and access control in computer systems,” Ohio State Univ., Computer and Information Science Res. Center Rep. OSU-CISRC-T072-12, 1972. (SFR)
    • (1972)
    • Bergart, J.1    Denicoff, M.2    Hsiao, D.3
  • 99
    • 84948611346 scopus 로고
    • Controlled accessibility bibliography
    • Nat. Bur. Stand. Tech. Note 780, June (SFR)
    • S. Reed and M. Gray, “Controlled accessibility bibliography,” Nat. Bur. Stand. Tech. Note 780, June 1973. (SFR)
    • (1973)
    • Reed, S.1    Gray, M.2
  • 100
    • 84944481953 scopus 로고
    • Computer and data base security: A comprehensive annotated bibliography
    • M.I.T. Proj. MAC Tech. Rep. TR-122, Jan. (SFR)
    • J. Scherf, “Computer and data base security: A comprehensive annotated bibliography,” M.I.T. Proj. MAC Tech. Rep. TR-122, Jan. 1974. (SFR)
    • (1974)
    • Scherf, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.