Cited By
View all- HSIAO DKERR DMADNICK S(1979)OPERATING SYSTEM SECURITYComputer Security10.1016/B978-0-12-357650-7.50014-4(165-219)Online publication date: 1979
- Mohan C(1978)Survey of recent operating systems research, designs and implementationsACM SIGOPS Operating Systems Review10.1145/775323.77532912:1(53-89)Online publication date: 1-Jan-1978
- Neumann PFeiertag RLevitt KRobinson LYeh RRamamoorthy C(1976)Software development and proofs of multi-level securityProceedings of the 2nd international conference on Software engineering10.5555/800253.807715(421-428)Online publication date: 13-Oct-1976
- Show More Cited By