Author of the publication

Privacy and protection in operating systems (Panel Session).

, , , , and . ACM Annual Conference (2), page 665-666. ACM, (1972)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental study of a 1.5-MW, 110-GHz gyrotron oscillator.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2005)ndltd.org (oai:dspace.mit.edu:1721.1/30158).Computer Security Technology Planning Study. volume 2. U.S. Air Force Electronic Systems Division, (October 1972)An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.. S&P, page 102-106. IEEE Computer Society, (1983)Privacy and protection in operating systems (Panel Session)., , , , and . ACM Annual Conference (2), page 665-666. ACM, (1972)Accelerating Computer Security Innovation.. S&P, page 91-98. IEEE Computer Society, (1982)Computer security myths mythtakes or 'The real security problem is...'.. ACSAC, IEEE, (1992)A computer for direct execution of algorithmic languages.. AFIPS Eastern Joint Computing Conference, page 184-193. ACM, (1961)D825 - a multiple-computer system for command & control., , , and . AFIPS Fall Joint Computing Conference, page 86-96. ACM, (1962)A logic design translator., and . AFIPS Fall Joint Computing Conference, page 251-261. ACM, (1962)A Unification of Computer and Network Security Concepts.. S&P, page 77-91. IEEE Computer Society, (1985)