On the criteria to be used in decomposing systems into modules
Communications of the ACM
The nucleus of a multiprogramming system
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
Virtual machines and data security
Proceedings of the workshop on virtual computer systems
Operational management of time-sharing systems
ACM '66 Proceedings of the 1966 21st national conference
The multics system: an examination of its structure
The multics system: an examination of its structure
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Hardware aspects of secure computing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
The ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A summary of progress toward proving program correctness
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Analyzing the security of an existing computer system
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
EFTS social and technical issues: what are EFTS?
ACM SIGCAS Computers and Society
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The advent of trusted computer operating systems
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Administrative control of computing service
IBM Systems Journal
On the evolution of adversary models in security protocols: or know your friend and foe alike
Proceedings of the 13th international conference on Security protocols
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
A prototype real-time intrusion-detection expert system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Collaborative red teaming for anonymity system evaluation
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
A systematic process-model-based approach for synthesizing attacks and evaluating them
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Property-testing real-world authorization systems
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
One of the favorite diversions of university students involves "beating" the system. In the case of operating systems, this has been a remarkably easy accomplishment. An extensive lore of operating system penetration, ranging from anecdotes describing students who have outsmarted the teacher's grading program to students who captured the system's password list and posted it on one of the bulletin boards, has been collected on college campuses. Private industry has been victimized much more seriously. Here the lore of "system" penetrations contains scenarios involving the loss of tens of thousands of dollars.