-
2
-
-
84945710932
-
COPS-A protection mechanism for computer systems
-
Ph.D. Diss., U. of Wash., Seattle, Wash., July
-
Andrews, G.R. COPS-A protection mechanism for computer systems. Ph.D. Diss., U. of Wash., Seattle, Wash., July 1974.
-
(1974)
-
-
Andrews, G.R.1
-
3
-
-
84971176319
-
Foundations
-
ESD-TR-73-278, The MITRE Corp., Bedford, Mass
-
Foundations, Vol. 1-III. ESD-TR-73-278, The MITRE Corp., Bedford, Mass.
-
, vol.1-3
-
-
-
4
-
-
0004190631
-
-
Amer. Math. Soc. Col. Pub. XXV, Amer. Math. Soc., Providence, R.I., 3rd ed.
-
Birkhoff, G. Lattice Theory. Amer. Math. Soc. Col. Pub. XXV, Amer. Math. Soc., Providence, R.I., 3rd ed., 1967.
-
(1967)
Lattice Theory
-
-
Birkhoff, G.1
-
5
-
-
84976817842
-
Selectively confined subsystems. Proc. Int. Workshop on Protection in Operating Systems
-
France, Aug
-
Denning, D.E., Denning, P.J., and Graham, G.S. Selectively confined subsystems. Proc. Int. Workshop on Protection in Operating Systems, IRIA-Laboria, France, Aug. 1974, pp. 55-61.
-
(1974)
IRIA-Laboria
, pp. 55-61
-
-
Denning, D.E.1
Denning, P.J.2
Graham, G.S.3
-
6
-
-
0041684496
-
Secure information flow in computer systems
-
Ph.D. Th., Comptr. Sci. Dep., Purdue U., W. Lafayette, Ind., May
-
Denning, D.E. Secure information flow in computer systems. Ph.D. Th., Comptr. Sci. Dep., Purdue U., W. Lafayette, Ind., May 1975.
-
(1975)
-
-
Denning, D.E.1
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
77954994485
-
On the derivation of lattice structured information flow policies
-
Tech. Rep. TR-179 Purdue U., W. Lafayette, Ind., March
-
Denning, D.E. On the derivation of lattice structured information flow policies. Tech. Rep. TR-179, Dep. of Comptr. Sci., Purdue U., W. Lafayette, Ind., March 1976.
-
(1976)
Dep. of Comptr. Sci.
-
-
Denning, D.E.1
-
9
-
-
0012779604
-
Information protection systems
-
Ph.D. Diss., Comptr. Lab., U. of Cambridge, England
-
Fenton, J.S. Information protection systems. Ph.D. Diss., Comptr. Lab., U. of Cambridge, England, 1973.
-
(1973)
-
-
Fenton, J.S.1
-
10
-
-
0016382977
-
Memoryless subsystems
-
Fenton, J.S. Memoryless subsystems. Comptr. J. 17, 2 (May 1974), 143-147.
-
(1974)
Comptr. J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
11
-
-
39149137077
-
An abstract computer model demonstrating directional information flow
-
U. of Cambridge, Cambridge, England
-
Fenton, J.S. An abstract computer model demonstrating directional information flow. U. of Cambridge, Cambridge, England, 1974.
-
(1974)
-
-
Fenton, J.S.1
-
12
-
-
0016623975
-
Exception handling: Issues and a proposed notation
-
Dec
-
Goodenough, J.B. Exception handling: Issues and a proposed notation. Comm. ACM 18, 12 (Dec. 1975), 683-696.
-
(1975)
Comm. ACM
, vol.18
, Issue.12
, pp. 683-696
-
-
Goodenough, J.B.1
-
13
-
-
84871374295
-
Memoryless execution: A programmer's viewpoint
-
IBM Tech. Rep. 025, IBM Israeli Scientific Ctr., Haifa, March
-
Gat, I., and Saal, H.J. Memoryless execution: A programmer's viewpoint. IBM Tech. Rep. 025, IBM Israeli Scientific Ctr., Haifa, March 1975.
-
(1975)
-
-
Gat, I.1
Saal, H.J.2
-
14
-
-
84942812332
-
Protection principles and practice
-
SJCC AFIPS Press, Montvale, N.J.
-
Graham, G.S., and Denning, P.J. Protection principles and practice. Proc. AFIPS 1972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429.
-
(1972)
Proc. AFIPS
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
15
-
-
0010722692
-
Compiler Construction for Digital Computers
-
Wiley, New York
-
Gries, D. Compiler Construction for Digital Computers, Wiley, New York, 1971.
-
(1971)
-
-
Gries, D.1
-
16
-
-
84999217852
-
On protection in operating systems
-
Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) Nov
-
Harrison, M.A., Ruzzo, W.L., and Ullman, J.D. On protection in operating systems. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 14-24.
-
(1975)
, vol.9
, Issue.5
, pp. 14-24
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
17
-
-
84976843670
-
IBM
-
Rep. No. GC28-8201-3, IBM Systems Reference Library
-
IBM. System/360 PL/I (F) Language Reference Manual. Rep. No. GC28-8201-3, IBM Systems Reference Library, 1971.
-
(1971)
System/360 PL/I (F) Language Reference Manual
-
-
-
18
-
-
3743154925
-
Protection in programmed systems
-
Ph.D. Th., Carnegie-Mellon U., Pittsburgh, Pa., June
-
Jones, A.K. Protection in programmed systems. Ph.D. Th., Carnegie-Mellon U., Pittsburgh, Pa., June 1973.
-
(1973)
-
-
Jones, A.K.1
-
19
-
-
84987646334
-
The enforcement of security policies for computation
-
Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) (Nov.
-
Jones, A.K., and Lipton, R.J. The enforcement of security policies for computation. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 197-206.
-
(1975)
, vol.9
, Issue.5
, pp. 197-206
-
-
Jones, A.K.1
-
20
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.
-
(1973)
Comm. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
21
-
-
84945721946
-
A comment on the confinement problem
-
Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) Nov
-
Lipner, S.B. A comment on the confinement problem. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 192-196.
-
(1975)
, vol.9
, Issue.5
, pp. 192-196
-
-
Lipner, S.B.1
-
22
-
-
84869113956
-
Object code optimization
-
Jan
-
Lowry, E.S., and Medlock, C.W. Object code optimization. Comm. ACM 12, 1 (Jan. 1969), 13-22.
-
(1969)
Comm. ACM
, vol.12
, Issue.1
, pp. 13-22
-
-
Lowry, E.S.1
-
23
-
-
0016951438
-
Security Kernel Validation in Practice
-
May
-
Millen, J.K. Security Kernel Validation in Practice. Comm. ACM 19, 5 (May 1976), 243-250.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
25
-
-
84976861631
-
Potential capabilities in ALGOL-like programs
-
TR 74-211 Cornell U., Ithaca, N.Y., Sept
-
Moore, C.G. III. Potential capabilities in ALGOL-like programs. TR 74-211, Dep. Comptr. Sci., Cornell U., Ithaca, N.Y., Sept. 1974.
-
(1974)
Dep. Comptr. Sci.
-
-
Moore, C.G.1
-
26
-
-
84938001503
-
Making computers keep secrets
-
Ph.D. Th., MAC-TR-115, Project Mac, M.I.T., Cambridge, Mass., Feb.
-
Rotenberg, L.J. Making computers keep secrets. Ph.D. Th., MAC-TR-115, Project Mac, M.I.T., Cambridge, Mass., Feb. 1974.
-
(1974)
-
-
Rotenberg, L.J.1
-
27
-
-
3743140411
-
Cooperation of mutually suspicious subsystems in a computer utility
-
Ph.D. Th., MAC-TR-104, Project MAC, Sept.
-
Schroeder, M.D. Cooperation of mutually suspicious subsystems in a computer utility. Ph.D. Th., MAC-TR-104, Project MAC, Sept. 1972.
-
(1972)
-
-
Schroeder, M.D.1
-
29
-
-
0016726281
-
Structured specification of a security kernel
-
on Reliable Software, SIGPLAN Notices (ACM) June
-
Walter, K.G., et al. Structured specification of a security kernel. Proc. Int. Conf. on Reliable Software, SIGPLAN Notices (ACM) 10, 6 (June 1975), 285-293.
-
(1975)
Proc. Int. Conf.
, vol.10
, Issue.6
, pp. 285-293
-
-
Walter, K.G.1
-
30
-
-
4544284713
-
Security controls in the ADEPT-50 time-sharing system
-
AFIPS Press, Montvale, N.J.
-
Weissman, C. Security controls in the ADEPT-50 time-sharing system. Proc. AFIPS 1969 FJCC, Vol. 35, AFIPS Press, Montvale, N.J., pp. 119-133.
-
(1969)
AFIPS
, vol.35
, pp. 119-133
-
-
Weissman, C.1
-
31
-
-
0015197891
-
The programming language Pascal
-
Wirth, N. The programming language Pascal. Acta Informatica 1, 1 (1971), 35-63.
-
(1971)
Acta Informatica
, vol.1
, Issue.1
, pp. 35-63
-
-
Wirth, N.1
|