Making computers keep secrets

Massachusetts Institute of Technology. Dept. of Electrical Engineering. Thesis. 1973. Ph.D.

[1]  Michael D. Schroeder,et al.  Performance of the GE-645 associative memory while Multics is in operation , 1971, SIGOPS Workshop on System Performance Evaluation.

[2]  Morris H. Hansen,et al.  Insuring confidentiality of individual records in data storage and retrieval for statistical purposes , 1899, AFIPS '71 (Fall).

[3]  Jeffrey A. Meldman,et al.  Centralized Information Systems and the Legal Right to Privacy , 1969 .

[4]  D. K. Branstan Privacy and Protection in Operating Systems , 1973, Computer.

[5]  F. J. Corbató,et al.  Multics: the first seven years , 1972, AFIPS '72 (Spring).

[6]  Jerome H. Saltzer,et al.  A hardware architecture for implementing protection rings , 1972, CACM.

[7]  Robert C. Daley,et al.  The Multics virtual memory , 1972, Commun. ACM.

[8]  Michael D. Schroeder,et al.  Cooperation of mutually suspicious subsystems in a computer utility , 1972 .

[9]  A. Miller The assault on privacy : computers, data banks, and dossiers , 1972 .

[10]  Roger M. Needham,et al.  Protection systems and protection implementations , 1899, AFIPS '72 (Fall, part I).

[11]  Clark Weissman,et al.  Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).

[12]  Tom Kilburn,et al.  One-Level Storage System , 1962, IRE Trans. Electron. Comput..

[13]  Dean Hanawalt Vanderbilt Controlled information sharing in a computer utility , 1969 .

[14]  Lawrence Arie Hirschhorn Toward a political economy of information capital. , 1971 .

[15]  Jack B. Dennis,et al.  Programming semantics for multiprogrammed computations , 1966, CACM.