-
2
-
-
0003400251
-
-
ESD-TR-83-278, Mitre Corporation, vI and II Nov vIII Apr
-
D.E. Bell, L. LaPadula. "Secure Computer Systems" ESD-TR-83-278, Mitre Corporation, vI and II (Nov 1973), vIII (Apr 1974).
-
(1973)
Secure Computer Systems
-
-
Bell, D.E.1
LaPadula, L.2
-
3
-
-
0018685670
-
The Transfer of Information and Authority in a Protection System
-
M. Bishop, L. Snyder. "The Transfer of Information and Authority in a Protection System" SOSP 1979, p. 45-54.
-
SOSP 1979
, pp. 45-54
-
-
Bishop, M.1
Snyder, L.2
-
4
-
-
0042484568
-
On the Inability of an Unmodified Capability Machine to Enforce the *-Property
-
September
-
W. E. Boebert. "On the Inability of an Unmodified Capability Machine to Enforce the *-Property" Proceedings of 7th DoD/NBS Computer Security Conference, September 1984, p. 291-293. http://zesty.ca/capmyths/boebert.html
-
(1984)
Proceedings of 7th DoD/NBS Computer Security Conference
, pp. 291-293
-
-
Boebert, W.E.1
-
5
-
-
84855631738
-
-
Comments on [Miller03]
-
(Comments on [Miller03]) http://www.eros-os.org/pipermail/cap-talk/2003-March/ 001133.html
-
-
-
-
8
-
-
35248864097
-
-
personal communications
-
Douglas Crockford, personal communications, 1997.
-
(1997)
-
-
Crockford, D.1
-
9
-
-
0000338326
-
Programming Semantics for Multiprogrammed Computations
-
March
-
J.B. Dennis, E.C. Van Horn. "Programming Semantics for Multiprogrammed Computations" ommunications of the ACM, 9(3):143-155, March 1966.
-
(1966)
Ommunications of the ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
12
-
-
0016081585
-
Capability-based addressing
-
R. S. Fabry. "Capability-based addressing" Communications of the ACM, 17(7), 1974, p. 403-412.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 403-412
-
-
Fabry, R.S.1
-
13
-
-
0011477134
-
-
Technical Report SSL 76-6, Learning Research Group, Xerox Palo, Alto Research Center
-
A. Goldberg, A. Kay. Smalltalk-72 instruction manual. Technical Report SSL 76-6, Learning Research Group, Xerox Palo, Alto Research Center, 1976. http://www.spies.com/∼aek/pdf/xerox/alto/Smalltalk72_ Manual.pdf
-
(1976)
Smalltalk-72 Instruction Manual
-
-
Goldberg, A.1
Kay, A.2
-
15
-
-
0007935332
-
The KeyKOS Architecture
-
September
-
N. Hardy. "The KeyKOS Architecture" ACM Operating Systems Review, September 1985, p. 8-25. http://www.agorics.com/Library/KeyKos/architecture.html
-
(1985)
ACM Operating Systems Review
, pp. 8-25
-
-
Hardy, N.1
-
16
-
-
35248886821
-
-
U.S. Patent 4,584,639: Computer Security System
-
N. Hardy. U.S. Patent 4,584,639: Computer Security System,
-
-
-
Hardy, N.1
-
17
-
-
0016984825
-
Protection in operating systems
-
M.A. Harrison, M.L. Ruzzo, and J.D. Ullman. "Protection in operating systems" Communications of the ACM, 19(8) p. 461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, M.L.2
Ullman, J.D.3
-
19
-
-
84882574666
-
A Linear Time Algorithm for Deciding Security
-
A. K. Jones, R. J. Lipton, L. Snyder. "A Linear Time Algorithm for Deciding Security" FOCS, 1976, p. 33-41.
-
(1976)
FOCS
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
20
-
-
84867643904
-
Language Design and Open Systems
-
Bernardo Huberman (ed.), Elsevier Science Publishers, North-Holland
-
K. Kahn, M. S. Miller. "Language Design and Open Systems", Ecology of Computation, Bernardo Huberman (ed.), Elsevier Science Publishers, North-Holland, 1988.
-
(1988)
Ecology of Computation
-
-
Kahn, K.1
Miller, M.S.2
-
23
-
-
0003250977
-
-
R. Kelsey, (ed.), W. Clinger, (ed.), J. Rees, (ed.), ; ACM Sigplan Notices
-
R. Kelsey, (ed.), W. Clinger, (ed.), J. Rees, (ed.), "Revised̂5 Report on the Algorithmic Language Scheme" ACM Sigplan Notices, 1998.
-
(1998)
Revised̂5 Report on the Algorithmic Language Scheme
-
-
-
24
-
-
0015672289
-
A Note on the Confinement Problem
-
October
-
B. W. Lampson, "A Note on the Confinement Problem" CACM on Operating Systems, 16(10), October, 1973.
-
(1973)
CACM on Operating Systems
, vol.16
, Issue.10
-
-
Lampson, B.W.1
-
25
-
-
33645584517
-
Logical Secrets
-
E. Shapiro (ed.), MIT Press, Cambridge, MA
-
M. S. Miller, D. G. Bobrow, E. D. Tribble, J. Levy, "Logical Secrets" Concurrent Prolog: Collected Papers, E. Shapiro (ed.), MIT Press, Cambridge, MA, 1987.
-
(1987)
Concurrent Prolog: Collected Papers
-
-
Miller, M.S.1
Bobrow, D.G.2
Tribble, E.D.3
Levy, J.4
-
26
-
-
0003595553
-
An Automatic Auction in ATM Network Bandwidth
-
S. H. Clearwater (ed.), World Scientific, Palo Alto, CA
-
M. S. Miller, D. Krieger, N. Hardy, C. Hibbert, E. D. Tribble. "An Automatic Auction in ATM Network Bandwidth". Market-based Control, A Paradigm for Distributed Resource Allocation, S. H. Clearwater (ed.), World Scientific, Palo Alto, CA, 1996.
-
(1996)
Market-based Control, a Paradigm for Distributed Resource Allocation
-
-
Miller, M.S.1
Krieger, D.2
Hardy, N.3
Hibbert, C.4
Tribble, E.D.5
-
29
-
-
0015561577
-
Protection in Programming Languages
-
J. H. Morris. "Protection in Programming Languages" CACM 16(1) p. 15-21, 1973. http://www.erights.org/history/morris73.pdf.
-
(1973)
CACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris, J.H.1
-
31
-
-
0347229432
-
-
CSL-116, Computer Science Laboratory, SRI International, Inc., May
-
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, L. Robinson. A Provably Secure Operating System: The System, Its Applications, and Proofs, CSL-116, Computer Science Laboratory, SRI International, Inc., May 1980.
-
(1980)
A Provably Secure Operating System: The System, Its Applications, and Proofs
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
32
-
-
0015482049
-
On the Criteria to Be Used in Decomposing Systems into Modules
-
December
-
D. Parnas. "On the Criteria To Be Used in Decomposing Systems into Modules" CACM 15(12), December 1972. http://www.acm.org/classics/may96/.
-
(1972)
CACM
, vol.15
, Issue.12
-
-
Parnas, D.1
-
36
-
-
0347717925
-
-
Information Processing86, H. -J. Kugler (ed.), North-Holland, Amsterdam
-
M. Safra, E. Y. Shapiro. Meta Interpreters for Real. Information Processing86, H. -J. Kugler (ed.), North-Holland, Amsterdam, p. 271-278, 1986.
-
(1986)
Meta Interpreters for Real
, pp. 271-278
-
-
Safra, M.1
Shapiro, E.Y.2
-
37
-
-
0016555241
-
The Protection of Information in Computer Systems
-
September
-
J. H. Saltzer, M. D. Schroeder. "The Protection of Information in Computer Systems" Proceedings of the IEEE 63(9), September 1975, p. 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
38
-
-
35248883200
-
Extending a Capability Based System into a Network Environment
-
R. D. Sansom, D. P. Julian, R. Rashid. "Extending a Capability Based System Into a Network Environment" Research sponsored by DOD, 1986, p. 265-274.
-
(1986)
Research Sponsored by DOD
, pp. 265-274
-
-
Sansom, R.D.1
Julian, D.P.2
Rashid, R.3
-
46
-
-
1242313749
-
-
MIT Press, in preparation
-
P. Van Roy, S. Haridi, "Concepts, Techniques, and Models of Computer Programming" MIT Press, in preparation. http://www.info.ucl.ac.be/people/PVR/book.html
-
Concepts, Techniques, and Models of Computer Programming
-
-
Van Roy, P.1
Haridi, S.2
-
48
-
-
0031542975
-
Extensible Security Architectures for Java
-
D. S. Wallach, D. Balfanz, D. Dean, E. W. Felten. "Extensible Security Architectures for Java" Proceedings of the 16th Symposium on Operating Systems Principles, 1997, p. 116-128. http://www.cs.princeton.edu/sip/pub/sosp97.html
-
(1997)
Proceedings of the 16th Symposium on Operating Systems Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
50
-
-
0016069660
-
HYDRA: The Kernel of a Multiprocessor Operating System
-
William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, and Fred J. Pollack. "HYDRA: The Kernel of a Multiprocessor Operating System" Communications of the ACM, 17(6):337-345, 1974
-
(1974)
Communications of the ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.A.1
Cohen, E.S.2
Corwin, W.M.3
Jones, A.K.4
Levin, R.5
Pierson, C.6
Pollack, F.J.7
|