Protection in the BirliX operating system
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 160-166
- https://doi.org/10.1109/icdcs.1990.89290
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Protection imperfect: the security of some computing environmentsACM SIGOPS Operating Systems Review, 1988
- A cryptographic checksum for integrity protectionComputers & Security, 1987
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Limiting the Damage Potential of Discretionary Trojan HorsesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Authentication revisitedACM SIGOPS Operating Systems Review, 1987
- Cryptographic sealing for information secrecy and authenticationCommunications of the ACM, 1982
- Password securityCommunications of the ACM, 1979
- Object Migration and AuthenticationIEEE Transactions on Software Engineering, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- ProtectionACM SIGOPS Operating Systems Review, 1974