Making computers keep secrets
暂无分享,去创建一个
[1] Michael D. Schroeder,et al. Performance of the GE-645 associative memory while Multics is in operation , 1971, SIGOPS Workshop on System Performance Evaluation.
[2] Morris H. Hansen,et al. Insuring confidentiality of individual records in data storage and retrieval for statistical purposes , 1899, AFIPS '71 (Fall).
[3] Jeffrey A. Meldman,et al. Centralized Information Systems and the Legal Right to Privacy , 1969 .
[4] D. K. Branstan. Privacy and Protection in Operating Systems , 1973, Computer.
[5] F. J. Corbató,et al. Multics: the first seven years , 1972, AFIPS '72 (Spring).
[6] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[7] Robert C. Daley,et al. The Multics virtual memory , 1972, Commun. ACM.
[8] Michael D. Schroeder,et al. Cooperation of mutually suspicious subsystems in a computer utility , 1972 .
[9] A. Miller. The assault on privacy : computers, data banks, and dossiers , 1972 .
[10] Roger M. Needham,et al. Protection systems and protection implementations , 1899, AFIPS '72 (Fall, part I).
[11] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[12] Tom Kilburn,et al. One-Level Storage System , 1962, IRE Trans. Electron. Comput..
[13] Dean Hanawalt Vanderbilt. Controlled information sharing in a computer utility , 1969 .
[14] Lawrence Arie Hirschhorn. Toward a political economy of information capital. , 1971 .
[15] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.