The sciences of the artificial (3rd ed.)
The sciences of the artificial (3rd ed.)
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Reflections on an operating system design
Communications of the ACM
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
Communications of the ACM
Monitors: an operating system structuring concept
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
On the criteria to be used in decomposing systems into modules
Communications of the ACM
Protection in programming languages
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Dynamic verification of operating system decisions
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
Protection in the Hydra Operating System
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Programming with abstract data types
Proceedings of the ACM SIGPLAN symposium on Very high level languages
The use of abstract data types to simplify program modifications
Proceedings of the 1976 conference on Data : Abstraction, definition and structure
An experimental implementation of the kernel/domain architecture
SOSP '73 Proceedings of the fourth ACM symposium on Operating system principles
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Structured specification of a Security Kernel
Proceedings of the international conference on Reliable software
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
Implications of a virtual memory mechanism for implementing protection in a family of operating systems
Protection in programmed systems.
Protection in programmed systems.
Global variable considered harmful
ACM SIGPLAN Notices
Computer system organization: The B5700/B6700 series (ACM monograph series)
Computer system organization: The B5700/B6700 series (ACM monograph series)
The multics system: an examination of its structure
The multics system: an examination of its structure
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
Authentication Mechanisms in Microprocessor-Based Local Area Networks
IEEE Transactions on Software Engineering
Resourceful systems for fault tolerance, reliability, and safety
ACM Computing Surveys (CSUR)
Role-based security: pros, cons, & some research directions
ACM SIGSAC Review
SafeBots: a paradigm for software security controls
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Surveyor's Forum: An Amplification on Hydra's Capabilities
ACM Computing Surveys (CSUR)
Surveyor's Forum: A Criticism of Sampler
ACM Computing Surveys (CSUR)
Surveyor's Forum: A Criticism of Sampler
ACM Computing Surveys (CSUR)
Corrigendum: “A Sampler of Formal Definitions”
ACM Computing Surveys (CSUR)
Recovery Techniques for Database Systems
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Authentication in office system internetworks
ACM Transactions on Information Systems (TOIS)
Information hiding, the Intel iAPX 432,and Ada
ACM-SE 20 Proceedings of the 20th annual Southeast regional conference
Another general purpose computer architecture
ACM SIGARCH Computer Architecture News
A hardware implementation of capability-based addressing
ACM SIGARCH Computer Architecture News
Linux Security Modules: General Security Support for the Linux Kernel
Proceedings of the 11th USENIX Security Symposium
Supporting ada memory management in the iAPX-432
ASPLOS I Proceedings of the first international symposium on Architectural support for programming languages and operating systems
IBM System/38 support for capability-based addressing
ISCA '81 Proceedings of the 8th annual symposium on Computer Architecture
Security and protection of data in the IBM System/38
ISCA '80 Proceedings of the 7th annual symposium on Computer Architecture
Architectural implications of abstract data type implementation
ISCA '79 Proceedings of the 6th annual symposium on Computer architecture
Storage concepts in a software-reliability-directed computer architecture
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
An approach to a fault-tolerant system architecture
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
Design and principles of a fault tolerant system
ICSE '78 Proceedings of the 3rd international conference on Software engineering
APL in operating systems research
APL '81 Proceedings of the international conference on APL
A domain structure for distributed computer systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
In support of domain structure for operating systems
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
iMAX: A multiprocessor operating system for an object-based computer
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
The design of an object oriented architecture
ISCA '84 Proceedings of the 11th annual international symposium on Computer architecture
Officeaid: An integrated document management system
COCS '84 Proceedings of the second ACM-SIGOA conference on Office information systems
Capability architecture revisited
ACM SIGOPS Operating Systems Review
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
The use of the monitor call instruction to implement domain switching in the IBM 370 architecture
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
Protection at the micromachine level
ACM SIGARCH Computer Architecture News
Constructing verified and reliable communications processing systems
ACM SIGSOFT Software Engineering Notes
Preventing privilege escalation
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Privacy and security of data communications and data bases
VLDB '78 Proceedings of the fourth international conference on Very Large Data Bases - Volume 4
Information protection by method base systems
VLDB '78 Proceedings of the fourth international conference on Very Large Data Bases - Volume 4
Synergistic authorization in database systems
VLDB '81 Proceedings of the seventh international conference on Very Large Data Bases - Volume 7
Capability Based Tagged Architectures
IEEE Transactions on Computers
Hardbound: architectural support for spatial safety of the C programming language
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Tamper-Tolerant Software: Modeling and Implementation
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Software development for reliable software systems
Journal of Systems and Software
Object protection in distributed systems
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |