Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
The “worm” programs—early experience with a distributed computation
Communications of the ACM
On the criteria to be used in decomposing systems into modules
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
On a “buzzword”: hierarchical structure
Software fundamentals
The Mythical Man-Month: Essays on Softw
The Mythical Man-Month: Essays on Softw
Shockwave Rider
The Major Cyberincident Investigations Board
IEEE Security and Privacy
Hi-index | 0.00 |
Systems of programs control more and more of our critical infrastructures. Forty years of system development and research have taught us many lessons in how to build software that is reliable, relatively free of vulnerabilities, and can enforce security policies. Those years of experience seem not to have taught us how to get these lessons put into practice, particularly with respect to security, except in a few specialized places. This essay suggests an approach to capturing what we know in a way that can make a difference in systems on which we all rely.