Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences
暂无分享,去创建一个
[1] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[2] B. H. Liskov,et al. Specification techniques for data abstractions , 1975, IEEE Transactions on Software Engineering.
[3] F. de P. Hanika,et al. Introduction to Operating System Design , 1976 .
[4] Eduardo B. Fernández,et al. Data Base Security: Requirements, Policies, and Models , 1980, IBM Syst. J..
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Robert S. Fabry,et al. Capability-based addressing , 1974, CACM.
[7] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[8] David Jefferson,et al. Protection in the Hydra Operating System , 1975, SOSP.
[9] Gerald J. Popek,et al. Encapsulation: an approach to operating system security , 1974, ACM '74.