An operation-control scheme for authorization in computer systems
- 1 June 1978
- journal article
- Published by Springer Nature in International Journal of Parallel Programming
- Vol. 7 (2) , 157-191
- https://doi.org/10.1007/bf00975884
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Reflections on an operating system designCommunications of the ACM, 1976
- An Access Control Facility for Programming LanguagesPublished by Defense Technical Information Center (DTIC) ,1976
- Operating system structures to support security and reliable softwarePublished by National Institute of Standards and Technology (NIST) ,1976
- Towards the design of secure systemsSoftware: Practice and Experience, 1975
- On protection in operating systemsPublished by Association for Computing Machinery (ACM) ,1975
- Protection in the Hydra Operating SystemPublished by Association for Computing Machinery (ACM) ,1975
- The protection of information in computer systemsProceedings of the IEEE, 1975
- HYDRACommunications of the ACM, 1974
- Programming with abstract data typesACM SIGPLAN Notices, 1974
- Security controls in the ADEPT-50 time-sharing systemPublished by Association for Computing Machinery (ACM) ,1969