Protection: principles and practice
暂无分享,去创建一个
Peter J. Denning | G. Scott Graham | G. S. Graham | P. Denning | Peter J. Denning | G. S. Graham | Peter J. Denning
[1] Peter J. Denning,et al. Third Generation Computer Systems , 1971, CSUR.
[2] Takashi Masuda,et al. The HITAC5020 time sharing system , 1969, ACM '69.
[3] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[4] David C. Evans,et al. Address mapping and the control of access in an interactive computer , 1967, AFIPS '67 (Spring).
[5] Maurice V. Wilkes,et al. Time-sharing computer systems , 1968 .
[6] Robert M. Graham,et al. Protection in an information processing utility , 1967, SOSP.
[7] R. Stockton Gaines. An operating system based on the concept of a supervisory computer , 1971, OPSR.
[8] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[9] R. Stockton Gaines,et al. An operating system based on the concept of a supervisory computer , 1972, CACM.
[10] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[11] Robert C. Daley,et al. The multics virtual memory , 1969, SOSP '69.