-
1
-
-
0022659508
-
A password-capability system
-
February
-
M. Anderson, R. D. Pose, and C. S. Wallace. A password-capability system. The Computer Journal, 29(1):1-8, February 1986.
-
(1986)
The Computer Journal
, vol.29
, Issue.1
, pp. 1-8
-
-
Anderson, M.1
Pose, R.D.2
Wallace, C.S.3
-
2
-
-
0005653840
-
Protection in the grasshopper operating system
-
September
-
A. Dearie, R. di Bona, J. Farrow, F. Henskens, D. Hulse, A. Lindstrom, S. Norris, J. Rosenberg, and R. Vaughan. Protection in the grasshopper operating system. In Proceedings of the 6th International Workshop on Persistent Object Systems, pages 54-72, September 1994.
-
(1994)
Proceedings of the 6Th International Workshop on Persistent Object Systems
, pp. 54-72
-
-
Dearie, A.1
Di Bona, R.2
Farrow, J.3
Henskens, F.4
Hulse, D.5
Lindstrom, A.6
Norris, S.7
Rosenberg, J.8
Vaughan, R.9
-
3
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
March
-
J. B. Dennis and E. C. Van Horn. Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3):143-155, March 1966.
-
(1966)
Communications of the ACM
, vol.9
, Issue.3
, pp. 143
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
4
-
-
0016081585
-
Capability-based addressing
-
July
-
R. S. Fabry. Capability-based addressing. Communications of the ACM, 17(7):403-412, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 403-412
-
-
Fabry, R.S.1
-
6
-
-
0024664205
-
A secure identity-based capability system
-
IEEE Computer Science Press, Oakland, CA, May
-
L. Gong. A secure identity-based capability system. In IEEE Symposium on Security and Privacy, pages 56-63. IEEE Computer Science Press, Oakland, CA, May 1989.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 56-63
-
-
Gong, L.1
-
7
-
-
34547488912
-
A performance evaluation of the intel iapx 432
-
June
-
P. M. Hansen, M. A. Linton, R. N. Mayo, M. Murphy, and D. A. Patterson. A performance evaluation of the intel iapx 432. Computer Architecture News, 10(4), June 1982.
-
(1982)
Computer Architecture News
, vol.10
, Issue.4
-
-
Hansen, P.M.1
Linton, M.A.2
Mayo, R.N.3
Murphy, M.4
Patterson, D.A.5
-
8
-
-
0016984825
-
Protection in operating systems
-
August
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
9
-
-
0028466968
-
SESAME: The solution to security for open distributed systems
-
July
-
P. Kaijser, T. Parker, and D. Pinkas. SESAME: The solution to security for open distributed systems. Computer Communications, 17(7):501-518, July 1994.
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 501-518
-
-
Kaijser, P.1
Parker, T.2
Pinkas, D.3
-
10
-
-
0038253143
-
Improving security and performance for capability systems
-
Cambridge, England, October, Dissertation submitted for the degree of Doctor of Philosophy
-
P. A. Karger. Improving security and performance for capability systems. Technical Report 149, University of Cambridge Computer Laboratory, Cambridge, England, October 1988. Dissertation submitted for the degree of Doctor of Philosophy.
-
(1988)
Technical Report 149, University of Cambridge Computer Laboratory
-
-
Karger, P.A.1
-
12
-
-
0019067593
-
A hardware implementation of capability based addressing
-
October
-
G. J. Myers and B. R. S. Buckingham. A hardware implementation of capability based addressing. ACM Operating Systems Review, 14(4):13-25, October 1980.
-
(1980)
ACM Operating Systems Review
, vol.14
, Issue.4
, pp. 13-25
-
-
Myers, G.J.1
Buckingham, B.R.S.2
-
13
-
-
0027699087
-
Lattice-based access control models
-
November
-
R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, November 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
14
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|