Author of the publication

Security kernels.

, , , , , , and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 973-980. AFIPS Press, (1974)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements for the development of computer-based urban information systems.. AFIPS Spring Joint Computing Conference, volume 34 of AFIPS Conference Proceedings, page 523-528. AFIPS Press, (1969)Twenty Years of Evaluation Criteria and Commercial Technology.. S&P, page 111-112. IEEE Computer Society, (1999)Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle.. GI Jahrestagung (1), volume P-67 of LNI, page 21-28. GI, (2005)The Trustworthy Computing Security Development Lifecycle.. ACSAC, page 2-13. IEEE Computer Society, (2004)Security and Source Code Access: Issues and Realities.. S&P, page 124-125. IEEE Computer Society, (2000)Non-Discretionery Controls for Commercial Applications.. S&P, page 2-10. IEEE Computer Society, (1982)Guest Editors' Introduction Security and Privacy., and . IEEE Trans. Software Eng., 16 (6): 561-562 (1990)The Journey Toward Secure Systems: Achieving Assurance.. RE, page 5. IEEE Computer Society, (2003)Assurance and evaluation: what next?. ACM Conference on Computer and Communications Security, page 1. ACM, (2007)The Birth and Death of the Orange Book.. IEEE Ann. Hist. Comput., 37 (2): 19-31 (2015)