Architecture of virtual machines
Proceedings of the workshop on virtual computer systems
The evolution of virtual machine architecture
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Architecture of virtual machines
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Hierarchical approach to computer system integrity
IBM Systems Journal
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Hi-index | 0.00 |
Our concern is the ability of the computing system to ensure that data under its control is accessed only in accordance with the explicit intention of the owner of the data, as expressed in the directory or access control table of the system. We intend to use VM/370 as the base system for a study of how the security of data may be compromised. Our goal for this study is to be better able to evaluate different types of hardware and software system architectures with regard to their ability to provide security.