Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSOS Revisited., and . ACSAC, page 208-216. IEEE Computer Society, (2003)Does TCB subsetting enhance trust?. ACSAC, IEEE, (1989)Proving Multilevel Security of a System Design., , and . SOSP, page 57-65. ACM, (1977)Operating System Review 11(5).A Separation Model for Virtual Machine Monitors., and . S&P, page 78-86. IEEE Computer Society, (1991)Processor-per-Domain Guard Architecture., , and . S&P, page 120. IEEE Computer Society, (1983)Intrusion detection inter-component adaptive negotiation., , , , , , , , and . Comput. Networks, 34 (4): 605-621 (2000)Software Development and Proofs of Multi-Level Security., , , and . ICSE, page 421-428. IEEE Computer Society, (1976)The foundations of a provably secure operating system (PSOS)., and . MARK, page 329-334. IEEE, (1979)Polonium: An Identity Authentication System., , and . S&P, page 101-107. IEEE Computer Society, (1985)The MULTICS Input/Output System., and . SOSP, page 35-41. ACM, (1971)Operating System Review 6(1-2).