Segmentation and the Design of Multiprogrammed Computer Systems
Journal of the ACM (JACM)
Ubiquity and need-to-know: two principles of data distribution
ACM SIGOPS Operating Systems Review
Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Protection in operating systems
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
The Multics virtual memory: concepts and design
Communications of the ACM
Virtual memory, processes, and sharing in MULTICS
Communications of the ACM
The arrogant programmer: Dijkstra and Wegner considered harmful
ACM SIGCSE Bulletin
ISC '01 Proceedings of the 4th International Conference on Information Security
ACM SIGOPS Operating Systems Review
A proposal for certain process management and intercommunication primitives
ACM SIGOPS Operating Systems Review
MP/C: A multiprocessor/computer architecture
ISCA '81 Proceedings of the 8th annual symposium on Computer Architecture
Possibility theory: As a means for modeling computer security and protection
MVL '78 Proceedings of the eighth international symposium on Multiple-valued logic
ACM '73 Proceedings of the ACM annual conference
ACM '69 Proceedings of the 1969 24th national conference
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The PDP-11 virtual machine architecture: A case study
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Overview of the Hydra Operating System development
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
A simulation method for multi-level data security analysis
ANSS '76 Proceedings of the 4th symposium on Simulation of computer systems
An experimental implementation of the kernel/domain architecture
SOSP '73 Proceedings of the fourth ACM symposium on Operating system principles
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Principles of computer system organization
SIGCSE '70 Proceedings of the first SIGCSE technical symposium on Education in computer science
Multi-processor software lockout
ACM '68 Proceedings of the 1968 23rd ACM national conference
Principles of computer system organization
ACM SIGCSE Bulletin
On a "buzzword": hierarchical structure
Software pioneers
SOSP '69 Proceedings of the second symposium on Operating systems principles
The multics interprocess communication facility
SOSP '69 Proceedings of the second symposium on Operating systems principles
Variables: bindings and protection
ACM SIGPLAN Notices
ACM SIGMIS Database
MP/C: A Multiprocessor/Computer Architecture
IEEE Transactions on Computers
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
Privilege separation made easy: trusting small libraries not big processes
Proceedings of the 1st European Workshop on System Security
TSS/360: a time-shared operating system
AFIPS '68 (Fall, part I) Proceedings of the December 9-11, 1968, fall joint computer conference, part I
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Multics: the first seven years
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Organization and features of the Michigan terminal system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
The authorization problem in shared files
IBM Systems Journal
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Patterns for the secure and reliable execution of processes
Proceedings of the 15th Conference on Pattern Languages of Programs
Concerning "Modeling" of computer security
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 48.32 |