Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
A Linear Time Algorithm for Deciding Subject Security
Journal of the ACM (JACM)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
Medusa: an experiment in distributed operating system structure
Communications of the ACM
A language extension for expressing constraints on data access
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Certifying information flow properties of programs: an axiomatic approach
POPL '79 Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Java Security: Present and Near Future
IEEE Micro
A Notation for Deterministic Cooperating Processes
IEEE Transactions on Parallel and Distributed Systems
Systematic protection mechanism design
ASPLOS I Proceedings of the first international symposium on Architectural support for programming languages and operating systems
Architectural implications of abstract data type implementation
ISCA '79 Proceedings of the 6th annual symposium on Computer architecture
ICSE '78 Proceedings of the 3rd international conference on Software engineering
Possibility theory: As a means for modeling computer security and protection
MVL '78 Proceedings of the eighth international symposium on Multiple-valued logic
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Protection in the Hydra Operating System
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The transfer of information and authority in a protection system
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Commercially viable active networking
ACM SIGOPS Operating Systems Review
Using type-extension to organize virtual-memory mechanisms
ACM SIGOPS Operating Systems Review
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Formal Models of Capability-Based Protection Systems
IEEE Transactions on Computers
A Computer Architecture for Level Structured Systems
IEEE Transactions on Computers
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Penetrating an operating system: a study of VM/370 integrity
IBM Systems Journal
Distributed electronic rights in javascript
ESOP'13 Proceedings of the 22nd European conference on Programming Languages and Systems
Hi-index | 0.10 |