Formal requirements for virtualizable third generation architectures
Communications of the ACM
The nucleus of a multiprogramming system
Communications of the ACM
Protection and control of information sharing in multics
SOSP '73 Proceedings of the fourth ACM symposium on Operating system principles
A verified program-verifier.
Computer network development to achieve resource sharing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The evolution of virtual machine architecture
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Architecture of virtual machines
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
On measured behavior of the ARPA network
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Strum: Structured Microprogram Development System for Correct Firmware
IEEE Transactions on Computers
Encapsulation: an approach to operating system security
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
IBM Systems Journal
Penetrating an operating system: a study of VM/370 integrity
IBM Systems Journal
An access control mechanism for computing resources
IBM Systems Journal
Hierarchical approach to computer system integrity
IBM Systems Journal
Administrative control of computing service
IBM Systems Journal
Virtual control storage: security measures in VM/370
IBM Systems Journal
Hi-index | 0.00 |
While the desire for reliable security in multiuser computer systems has grown significantly, the computing community's knowledge of how to provide the requisite protection is still inadequate. Security is a "weak link" phenomenon; one link whose condition is unsatisfactory is the operating system software. It has often been pointed out that currently "no protection system implementation of any major multiuser computer system is known to have withstood serious attempts at circumvention by determined and skilled users." The community is replete with apocryphal claims of secure systems that inevitably have failed.