-
1
-
-
61949225136
-
LOCKing computers securely
-
Saydjari, O. Sami, Joseph M. Beckman, Jeffrey R. Leaman, "LOCKing Computers Securely", 10th Proceedings of the National Computer Security Conference, Ott 1987, pp. 129-141
-
(1987)
10th Proceedings of the National Computer Security Conference, Ott
, pp. 129-141
-
-
Sami, S.O.1
Beckman, J.M.2
Leaman, J.R.3
-
3
-
-
0347229432
-
A provably secure operating system the system, its applica-tions, and proof s
-
SRI International, Menlo Park, CA, 7 May
-
Neumann, P. G., et al, "A Provably Secure Operating System The System, Its Applica-tions, and Proof s," Computer Science Labora-tory Report CSL-1 16, SRI International, Menlo Park, CA, 7 May 1980
-
(1980)
Computer Science Labora-tory Report CSL-1
, vol.16
-
-
Neumann, P.G.1
-
4
-
-
84949001901
-
-
Ford Aerospace and Communications Corporation. Contract MDA904-80-C-0470, June
-
Ford Aerospace and Communications Corporation. "Provably Secure Operating System (PSOS) Final Report." Contract MDA904-80-C-0470. June 1981
-
(1981)
Provably Secure Operating System (PSOS) Final Report
-
-
-
5
-
-
0022584128
-
An experience using two covert channel analysis techniques on a real system design
-
IEEE, April
-
Kemmerer, R., McHugh, J., Haigh, J. T., Young, W. D., "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design." Proceedings of the 1986 Symposium on Security and Privacy, IEEE, April 1986
-
(1986)
Proceedings of the 1986 Symposium on Security and Privacy
-
-
Kemmerer, R.1
McHugh, J.2
Haigh, J.T.3
Young, W.D.4
-
6
-
-
84910697286
-
Secure computing: The secure ada target approach
-
June
-
Boebert, W. E., Kain, R.Y. and Young, W.D., "Secure Computing: The Secure Ada Target Approach", Scientific Honeyweller, June 1985
-
(1985)
Scientific Honeyweller
-
-
Boebert, W.E.1
Kain, R.Y.2
Young, W.D.3
-
7
-
-
0016555241
-
The protection of information in computer systems
-
March
-
Saltzer, J. D., and Schroeder, M. D., "The Protection of Information in Computer Systems", Proceedings of the IEEE, Vol 63 No 9, March 1975, pp. 1278-1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.D.1
Schroeder, M.D.2
-
11
-
-
0042484568
-
On the inability of an unmodified capability machine to enforce the ∗-property
-
Sept 24-26
-
W. E. Boebert, "On the Inability of an Unmodified Capability Machine to Enforce the ∗-Property", 7th Proceedings of the DoD/NBS Computer Security Conference, Sept 24-26 1984, pp. 291-293
-
(1984)
7th Proceedings of the DoD/NBS Computer Security Conference
, pp. 291-293
-
-
Boebert, W.E.1
-
12
-
-
0023293655
-
On access cheeking in capability-based systems
-
Feb
-
Kain, R. Y., and Landwehr, C. E., "On Access Cheeking in Capability-Based Systems; IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, Feb 1987, p. 202
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 202
-
-
Kain, R.Y.1
Landwehr, C.E.2
-
13
-
-
0016081585
-
Capability-based addressing
-
July
-
Fabry, R. S., "Capability-Based Addressing", Communications of the ACM, July 1974, Vol. 17, No. 7
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Fabry, R.S.1
-
14
-
-
84949001905
-
-
Mitre Bedford Working Paper #25867 under contract F19628-84-C-0001, December 18
-
Chen, Thomas M., "SAT Design Overview." Mitre Bedford Working Paper #25867 under contract F19628-84-C-0001, December 18, 1984
-
(1984)
SAT Design Overview
-
-
Chen, T.M.1
-
17
-
-
0018466858
-
SociaI processes and proofs of theorems and programs
-
May
-
DeMillo, R. A., Lipton, R. J., Perlis, A. J., "SociaI Processes and Proofs of Theorems and Programs,", Communications of the ACM, Vol 22, No 5, May 1979, p. 271
-
(1979)
Communications of the ACM
, vol.22
, Issue.5
, pp. 271
-
-
DeMillo, R.A.1
Lipton, R.J.2
Perlis, A.J.3
-
19
-
-
84949001907
-
-
usr/group Communications, September/Oct-ober
-
Sutton, Steve, "Can Unix Be Trusted?", /usr/group Communications, September/Oct-ober 1987
-
(1987)
Can Unix Be Trusted?
-
-
Sutton, S.1
-
20
-
-
0021510842
-
Unix opera-ting system security
-
October
-
Grampp, F. T., and Morris, R. H., "Unix Opera-ting System Security", AT&T Bell Laboratories Technical Journal, Vol. 63, No. 8, Part 2, October 1984, pp. 1649-1672
-
(1984)
AT&T Bell Laboratories Technical Journal
, vol.63
, Issue.8
, pp. 1649-1672
-
-
Grampp, F.T.1
Morris, R.H.2
|