Communications of the ACM
The SDC Time-Sharing System revisited
ACM '67 Proceedings of the 1967 22nd national conference
Operational management of time-sharing systems
ACM '66 Proceedings of the 1966 21st national conference
Protection in an information processing utility
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
Security and privacy in computer systems
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
The ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Hardware aspects of secure computing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
The ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Selective security capabilities in ASAP: a file management system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The authorization problem in shared files
IBM Systems Journal
Synchronisation in Trust Management Using Push Authorisation
Electronic Notes in Theoretical Computer Science (ENTCS)
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Evaluation of access authorization characteristics of derived data sets
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
A security model of dynamic labeling providing a tiered approach to verification
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Concerning "Modeling" of computer security
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Foundation for a time interval access control model
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Runtime verification using policy-based approach to control information flow
International Journal of Security and Networks
Hi-index | 0.00 |
At present, the system described in this paper has not been approved by the Department of Defense for processing classified information. This paper does not represent DOD policy regarding industrial application of time- or resource-sharing of EDP equipment.