Security and privacy in computer systems
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
The ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Selective security capabilities in ASAP: a file management system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Hi-index | 0.00 |
It makes no sense to discuss software for privacy-preserving or secure time-shared computing without considering the hardware on which it is to run. Software access controls rely upon certain pieces of hardware. If these can go dead or be deliberately disabled without warning, then all that remains is false security.