메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 96-108

LOCK: An historical perspective

Author keywords

Computer graphics; Computerized monitoring; Cryptography; Data security; Electrical capacitance tomography; Information security; Operating systems; Reactive power; Read only memory; Testing

Indexed keywords

COMPUTER GRAPHICS; COMPUTER HARDWARE; CRYPTOGRAPHY; ELECTRIC IMPEDANCE TOMOGRAPHY; HARDWARE; LOCKS (FASTENERS); REACTIVE POWER; ROM; SECURITY OF DATA; SECURITY SYSTEMS; SPECIFICATIONS; TESTING;

EID: 33646135583     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2002.1176283     Document Type: Conference Paper
Times cited : (13)

References (22)
  • 3
    • 0347229432 scopus 로고
    • A provably secure operating system the system, its applica-tions, and proof s
    • SRI International, Menlo Park, CA, 7 May
    • Neumann, P. G., et al, "A Provably Secure Operating System The System, Its Applica-tions, and Proof s," Computer Science Labora-tory Report CSL-1 16, SRI International, Menlo Park, CA, 7 May 1980
    • (1980) Computer Science Labora-tory Report CSL-1 , vol.16
    • Neumann, P.G.1
  • 4
    • 84949001901 scopus 로고
    • Ford Aerospace and Communications Corporation. Contract MDA904-80-C-0470, June
    • Ford Aerospace and Communications Corporation. "Provably Secure Operating System (PSOS) Final Report." Contract MDA904-80-C-0470. June 1981
    • (1981) Provably Secure Operating System (PSOS) Final Report
  • 7
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • March
    • Saltzer, J. D., and Schroeder, M. D., "The Protection of Information in Computer Systems", Proceedings of the IEEE, Vol 63 No 9, March 1975, pp. 1278-1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.D.1    Schroeder, M.D.2
  • 11
    • 0042484568 scopus 로고
    • On the inability of an unmodified capability machine to enforce the ∗-property
    • Sept 24-26
    • W. E. Boebert, "On the Inability of an Unmodified Capability Machine to Enforce the ∗-Property", 7th Proceedings of the DoD/NBS Computer Security Conference, Sept 24-26 1984, pp. 291-293
    • (1984) 7th Proceedings of the DoD/NBS Computer Security Conference , pp. 291-293
    • Boebert, W.E.1
  • 12
  • 13
    • 0016081585 scopus 로고
    • Capability-based addressing
    • July
    • Fabry, R. S., "Capability-Based Addressing", Communications of the ACM, July 1974, Vol. 17, No. 7
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Fabry, R.S.1
  • 14
    • 84949001905 scopus 로고
    • Mitre Bedford Working Paper #25867 under contract F19628-84-C-0001, December 18
    • Chen, Thomas M., "SAT Design Overview." Mitre Bedford Working Paper #25867 under contract F19628-84-C-0001, December 18, 1984
    • (1984) SAT Design Overview
    • Chen, T.M.1
  • 17
    • 0018466858 scopus 로고
    • SociaI processes and proofs of theorems and programs
    • May
    • DeMillo, R. A., Lipton, R. J., Perlis, A. J., "SociaI Processes and Proofs of Theorems and Programs,", Communications of the ACM, Vol 22, No 5, May 1979, p. 271
    • (1979) Communications of the ACM , vol.22 , Issue.5 , pp. 271
    • DeMillo, R.A.1    Lipton, R.J.2    Perlis, A.J.3
  • 19
    • 84949001907 scopus 로고
    • usr/group Communications, September/Oct-ober
    • Sutton, Steve, "Can Unix Be Trusted?", /usr/group Communications, September/Oct-ober 1987
    • (1987) Can Unix Be Trusted?
    • Sutton, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.