Author of the publication

Secure Ada Target: Issues, System Design, and Verification.

, , , and . S&P, page 176-183. IEEE Computer Society, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized executive control in distributed computer systems., , , and . COMPSAC, page 254-258. IEEE, (1978)Keynote Address: Back to the Future.. USENIX Security Symposium, USENIX, (2004)The extended access matrix model of computer security., and . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 119-125 (1985)An Approach to the Specification of Distributed Software., , and . The Use of Formal Specification of Software, volume 36 of Informatik-Fachberichte, page 197-236. Springer, (1979)Kernel primitives of the HXDP executive., , , and . COMPSAC, page 595-600. IEEE, (1978)Secure Ada Target: Issues, System Design, and Verification., , , and . S&P, page 176-183. IEEE Computer Society, (1985)