-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
USAF Electronic Systems Division, Bedford, MA, April
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977.
-
(1977)
Technical Report ESD-TR-76-372
-
-
Biba, K.J.1
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
MITRE Corp. MTR-2997, Bedford, MA, Available as NTIS AD-A023 588
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available as NTIS AD-A023 588.
-
(1975)
Technical Report ESD-TR-75-306
-
-
Bell, D.E.1
LaPadula, L.J.2
-
6
-
-
0017517624
-
Certification of programs for secure information flow
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0021509216
-
Linear-time algorithms for testing the satisfiability of prepositional Horn formulæ
-
October
-
William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of prepositional Horn formulæ. Journal of Logic Programming, 1(3):267-284, October 1984.
-
(1984)
Journal of Logic Programming
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
13
-
-
0017971337
-
A language extension for expressing constraints on data access
-
May
-
Anita K. Jones and Barbara Liskov. A language extension for expressing constraints on data access. Comm. of the ACM, 21(5):358-367, May 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.K.1
Liskov, B.2
-
14
-
-
0003630846
-
-
Springer-Verlag
-
Barbara Liskov, Russell Atkinson, Toby Bloom, J. Eliot Moss, J. Craig Schaffert, Robert Scheifler, and Alan Snyder. CLU Reference Manual. Springer-Verlag, 1984. Also published as Lecture Notes in Computer Science 114, G. Goos and J. Hartmanis, Eds., Springer-Verlag, 1981.
-
(1984)
CLU Reference Manual
-
-
Liskov, B.1
Atkinson, R.2
Bloom, T.3
Eliot Moss, J.4
Craig Schaffert, J.5
Scheifler, R.6
Snyder, A.7
-
15
-
-
2742561997
-
-
Also published as Springer-Verlag
-
Barbara Liskov, Russell Atkinson, Toby Bloom, J. Eliot Moss, J. Craig Schaffert, Robert Scheifler, and Alan Snyder. CLU Reference Manual. Springer-Verlag, 1984. Also published as Lecture Notes in Computer Science 114, G. Goos and J. Hartmanis, Eds., Springer-Verlag, 1981.
-
(1981)
Lecture Notes in Computer Science
, vol.114
-
-
Goos, G.1
Hartmanis, J.2
-
16
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
October
-
Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
-
(1991)
Proc. 13th ACM Symp. on Operating System Principles (SOSP)
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
17
-
-
0039015629
-
-
Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
-
Operating System Review
, vol.253
, Issue.5
-
-
-
18
-
-
0015672289
-
A note on the confinement problem
-
Butler W. Lampson. A note on the confinement problem. Comm. of the ACM, 10:613-615, 1973.
-
(1973)
Comm. of the ACM
, vol.10
, pp. 613-615
-
-
Lampson, B.W.1
-
21
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
August
-
M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
23
-
-
84955596529
-
Trust in the λ-calculus
-
number 983 in Lecture Notes in Computer Science, Springer, September
-
Jens Palsberg and Peter Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
-
(1995)
Proc. 2nd International Symposium on Static Analysis
, pp. 314-329
-
-
Palsberg, J.1
Ørbæk, P.2
-
24
-
-
84957705773
-
Tractable constraints in finite semilattices
-
number 1145 in Lecture Notes in Computer Science, Springer-Verlag, September
-
Jakob Rehof and Torben Æ. Mogensen. Tractable constraints in finite semilattices. In Proc. 3rd International Symposium on Static Analysis, number 1145 in Lecture Notes in Computer Science, pages 285-300. Springer-Verlag, September 1996.
-
(1996)
Proc. 3rd International Symposium on Static Analysis
, pp. 285-300
-
-
Rehof, J.1
Mogensen, T.Æ.2
-
25
-
-
0026977869
-
CACL: Efficient fine-grained protection for objects
-
Vancouver, BC, Canada, October
-
Joel Richardson, Peter Schwarz, and Luis-Felipe Cabrera. CACL: Efficient fine-grained protection for objects. In Proceedings of the 1992 ACM Conference on Object-Oriented Programming Systems, Languages, and Applications, pages 154-165, Vancouver, BC, Canada, October 1992.
-
(1992)
Proceedings of the 1992 ACM Conference on Object-Oriented Programming Systems, Languages, and Applications
, pp. 154-165
-
-
Richardson, J.1
Schwarz, P.2
Cabrera, L.-F.3
-
26
-
-
0345950227
-
Provably-secure programming languages for remote evaluation
-
January
-
Dennis Volpano. Provably-secure programming languages for remote evaluation. ACM SIGPLAN Notices, 32(1):117-119, January 1997.
-
(1997)
ACM SIGPLAN Notices
, vol.32
, Issue.1
, pp. 117-119
-
-
Volpano, D.1
-
27
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|