Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSOS Revisited., and . ACSAC, page 208-216. IEEE Computer Society, (2003)Does TCB subsetting enhance trust?. ACSAC, IEEE, (1989)Proving Multilevel Security of a System Design., , and . SOSP, page 57-65. ACM, (1977)Operating System Review 11(5).A Separation Model for Virtual Machine Monitors., and . S&P, page 78-86. IEEE Computer Society, (1991)Processor-per-Domain Guard Architecture., , and . S&P, page 120. IEEE Computer Society, (1983)Intrusion detection inter-component adaptive negotiation., , , , , , , , and . Comput. Networks, 34 (4): 605-621 (2000)The MULTICS Input/Output System., and . SOSP, page 35-41. ACM, (1971)Operating System Review 6(1-2).A Key Distribution Protocol Using Event Markers, , and . ACM Trans. Comput. Syst., 1 (3): 249-255 (1983)Implicit Discretionary Access Propagation: A new Interpretation of DAC., and . CSFW, page 183-187. IEEE Computer Society, (1991)An avenue for exploitation and development of verification technology., and . ACM SIGSOFT Softw. Eng. Notes, 6 (3): 45-46 (1981)