Protection mechanisms and the enforcement of security policies
- 1 January 1978
- book chapter
- Published by Springer Nature
- p. 228-251
- https://doi.org/10.1007/3-540-08755-9_6
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- Certification of programs for secure information flowCommunications of the ACM, 1977
- Operating System Structures to Support Security and Reliable SoftwareACM Computing Surveys, 1976
- A Language Extension for Controlling Access to Shared DataIEEE Transactions on Software Engineering, 1976
- Reflections on an operating system designCommunications of the ACM, 1976
- Protection in the Hydra Operating SystemACM SIGOPS Operating Systems Review, 1975
- Towards the design of secure systemsSoftware: Practice and Experience, 1975
- Capability-based addressingCommunications of the ACM, 1974
- A note on the confinement problemCommunications of the ACM, 1973
- On The Advantages of Tagged ArchitectureIEEE Transactions on Computers, 1973
- Programming semantics for multiprogrammed computationsCommunications of the ACM, 1966