Special Feature The Total Computer Security Problem: an Oveview
暂无分享,去创建一个
[1] Robert F. Hargraves,et al. Design considerations for an educational time-sharing system , 1969, AFIPS '69 (Spring).
[2] Elliott I. Organick,et al. Computer System Organization: The B5700/B6700 Series , 1973 .
[3] David Lorge Parnas,et al. A technique for software module specification with examples , 1972, CACM.
[4] W LampsonButler,et al. Reflections on an operating system design , 1976 .
[5] D. E. Bell,et al. A Software Validation Technique for Certification: The Methodology , 1975 .
[6] Richard A. Meyer,et al. A Virtual Machine Time-Sharing System , 1970, IBM Syst. J..
[7] Brian Randell,et al. System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.
[8] K. S. Shankar,et al. On virtual machine integrity , 1976 .
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[10] Lawrence Robinson,et al. SPECIAL Reference Manual. , 1977 .
[11] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[12] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[13] L. Smith. Architectures for Secure Computing Systems , 1975 .
[14] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[15] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[16] Gerald J. Popek,et al. The PDP-11 virtual machine architecture: A case study , 1975, SOSP.
[17] Clark Weissman. Secure computer operation with virtual machine partitioning , 1975, AFIPS '75.
[18] Philippe Janson,et al. REMOVING THE DYNAMIC LINKER FROM THE SECURITY KERNEL OF A COMPUTING UTILITY , 1974 .
[19] D. Parker. Crime by computer , 1976 .
[20] John D. Bagley,et al. Sharing data and services in a virtual machine system , 1975, SOSP.
[21] James Marting,et al. Security, Accuracy, and Privacy in Computer Systems , 1973 .
[22] Robert C. Daley,et al. The Multics virtual memory , 1972, Commun. ACM.
[23] Michael D. Schroeder,et al. Cooperation of mutually suspicious subsystems in a computer utility , 1972 .
[24] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[25] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[26] Edsger W. Dijkstra,et al. The structure of the “THE”-multiprogramming system , 1968, CACM.
[27] Roger M. Needham,et al. Protection systems and protection implementations , 1899, AFIPS '72 (Fall, part I).
[28] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[29] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..
[30] Lawrence Robinson,et al. Proof techniques for hierarchically structured programs , 1977, CACM.
[31] Edward A. Feustel,et al. On The Advantages of Tagged Architecture , 1973, IEEE Transactions on Computers.
[32] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[33] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[34] Thomas H. Bredt,et al. A structured specification of a hierarchical operating system , 1975, Reliable Software.
[35] Lawrence Robinson,et al. A Provably Secure Operating System. , 1975 .
[36] F. J. Corbató,et al. Multics: the first seven years , 1972, AFIPS '72 (Spring).
[37] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[38] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[39] Gerald J. Popek,et al. Protection structures , 1974, Computer.
[40] D. F. Stork. Downgrading in a Secure Multilevel Computer System: The Formulary Concept , 1975 .
[41] D. P. Reed,et al. PROCESSOR MULTIPLEXING IN A LAYED OPERATING SYSTEM , 1976 .
[42] William A Wulf. ALPHARD: Toward a Language to Support Structured Programs , 1974 .
[43] William Robert Price,et al. Implications of a virtual memory mechanism for implementing protection in a family of operating systems , 1973 .
[44] Anita K. Jones,et al. Protection in programmed systems. , 1973 .
[45] Maurice V. Wilkes,et al. Domains of Protection and the Management of Processes , 1974, Computer/law journal.
[46] Richard C. Holt,et al. Project SUE as a learning experience , 1972, AFIPS '72 (Fall, part I).
[47] Jack B. Dennis,et al. Virtual memory, processes, and sharing in Multics , 1967, CACM.
[48] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[49] Michael D. Schroeder. Engineering a security kernel for Multics , 1975, SOSP.
[50] William A. Wulf,et al. Policy/mechanism separation in Hydra , 1975, SOSP.
[51] J. O'reilly. The Privacy Act of 1974. , 1975 .
[52] C. A. R. Hoare,et al. Monitors: an operating system structuring concept , 1974, CACM.
[53] Robert W. Floyd,et al. Assigning meaning to programs , 1967 .
[54] J PopekGerald,et al. The PDP-11 virtual machine architecture , 1975 .
[55] Edsger W. Dijkstra,et al. Co-operating sequential processes , 1968 .
[56] William A. Wulf,et al. Towards the design of secure systems , 1975, Softw. Pract. Exp..
[57] Edward A. Feustel. OnTheAdvantages ofTagged Architecture , 1973 .
[58] Stuart E. Madnick,et al. Hierarchical Approach to Computer System Integrity , 1975, IBM Syst. J..
[59] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[60] R. G. Bratt. MINIMIZING THE NAMING FACILITIES REQUIRING PROTECTION IN A COMPUTING UTILITY , 1975 .
[61] William A. Wulf,et al. BLISS: a language for systems programming , 1971, CACM.
[62] David D. Redell,et al. NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS , 1974 .
[63] Leo Joseph Rotenberg,et al. Making computers keep secrets , 1973 .
[64] David Jefferson,et al. Protection in the Hydra Operating System , 1975, SOSP.
[65] Philippe A. Janson. Dynamic linking and environment initialization in a multi-domain process. , 1975, SOSP.
[66] Karl N. Levitt,et al. Greatest Common Divisor of n Integers and Multipliers (Certification of Algorithm 386) , 1973, Commun. ACM.
[67] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[68] David Lorge Parnas,et al. On a 'Buzzword': Hierarchical Structure , 2001, IFIP Congress.
[69] K. S. Shankar,et al. Data flow, abstraction levels and specifications for communications switching systems , 1976, ICSE '76.
[70] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[71] William A. Wulf,et al. Overview of the Hydra Operating System development , 1975, SOSP.
[72] James P. Anderson,et al. Information Security in a Multi-User Computer Environment , 1972, Adv. Comput..
[73] Lawrence Robinson,et al. An example of hierarchical design and proof , 1978, CACM.
[74] C. A. R. Hoare,et al. Procedures and parameters: An axiomatic approach , 1971, Symposium on Semantics of Algorithmic Languages.
[75] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[76] Robert S. Fabry,et al. Capability-based addressing , 1974, CACM.