-
5
-
-
85008582430
-
-
Development and Certification, Semi-annual Progress Rept. 1 Jan-30 June 76, report NTIS AD-A038 261/4, Honeywell Information Systems, Aug.
-
N. Adleman et al., Security Kernel Evaluation for Multics and Secure Multics Design, Development and Certification, Semi-annual Progress Rept. 1 Jan-30 June 76, report NTIS AD-A038 261/4, Honeywell Information Systems, Aug. 1976.
-
(1976)
Security Kernel Evaluation for Multics and Secure Multics Design
-
-
Adleman, N.1
-
6
-
-
85072519230
-
The Foundations of a Provably Secure Operating System (PSOS)
-
R. J. Feiertag and P. G. Neumann, “The Foundations of a Provably Secure Operating System (PSOS),” Proc. Natl Computer Conf., AFIPS, 1979, pp. 329–334.
-
(1979)
Proc. Natl Computer Conf., AFIPS
, pp. 329-334
-
-
Feiertag, R.J.1
Neumann, P.G.2
-
7
-
-
0020778471
-
Scomp: A Solution to the Multilevel Security Problem
-
L. J. Fraim, “Scomp: A Solution to the Multilevel Security Problem,” Computer, vol. 16, no. 7, 1983, pp. 26–34.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 26-34
-
-
Fraim, L.J.1
-
8
-
-
0004200684
-
-
report ESD-TR-73-51, MITRE, Air Force Electronic Systems Division, Hanscom
-
J. P. Anderson, Computer Security Technology Planning Study, report ESD-TR-73-51, MITRE, Air Force Electronic Systems Division, Hanscom, 1972.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
9
-
-
60749089448
-
The Structure of the ‘THE’-Multipro-gramming System
-
E. W. Dijkstra, “The Structure of the ‘THE’-Multipro-gramming System,” Comm. ACM, vol. 11, no. 5, 1968, pp. 341–346.
-
(1968)
Comm. ACM
, vol.11
, Issue.5
, pp. 341-346
-
-
Dijkstra, E.W.1
-
10
-
-
0003400251
-
-
report ESD-TR-75-306, Deputy for Command and Management Systems, HQElectronic Systems Division, Mar.
-
D. E. Bell and L. J. LaPadula, Secure Computer System: (Unified) Exposition and (Multics) Interpretation, report ESD-TR-75-306, Deputy for Command and Management Systems, HQElectronic Systems Division, Mar. 1976.
-
(1976)
Secure Computer System: (Unified) Exposition and (Multics) Interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
13
-
-
0002487235
-
How Do Committees Invent?
-
M. E. Conway, “How Do Committees Invent?” Datamation, vol. 14, no. 5, 1968, pp. 28–31.
-
(1968)
Datamation
, vol.14
, Issue.5
, pp. 28-31
-
-
Conway, M.E.1
-
14
-
-
72249120603
-
seL4: Formal Verification of an OS Kernel
-
G. Klein et al., “seL4: Formal Verification of an OS Kernel,” Symp. Operating Systems Principles, ACM, 2009, pp. 207–220.
-
(2009)
Symp. Operating Systems Principles, ACM
, pp. 207-220
-
-
Klein, G.1
-
16
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
P. A. Karger et al., “A Retrospective on the VAX VMM Security Kernel,” IEEE Trans. Software Engineering, vol. 17, no. 11, 1991, pp. 1147–1165.
-
(1991)
IEEE Trans. Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
|