Penetrating an Operating System: A Study of VM/370 Integrity
暂无分享,去创建一个
[1] William S. McPhee. Operating System Integrity in OS/VS2 , 1974, IBM Syst. J..
[2] Mark McGrath. Virtual Machine Computing in an Engineering Environment , 1972, IBM Syst. J..
[3] Richard P. Parmelee,et al. Virtual Storage and Virtual Machine Concepts , 1972, IBM Syst. J..
[4] Gerald J. Popek,et al. Verifiable secure operating system software , 1974, AFIPS '74.
[5] Gerald J. Popek,et al. Encapsulation: an approach to operating system security , 1974, ACM '74.
[6] Stuart E. Madnick,et al. An approach to information system isolation and security in a shared facility , 1973 .
[7] Anita K. Jones,et al. Protection in programmed systems. , 1973 .
[8] Clark R. Renninger. Approaches to privacy and security in computer systems , 1974 .