From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Decentralized executive control in distributed computer systems., , , и . COMPSAC, стр. 254-258. IEEE, (1978)Keynote Address: Back to the Future.. USENIX Security Symposium, USENIX, (2004)The extended access matrix model of computer security., и . ACM SIGSOFT Softw. Eng. Notes, 10 (4): 119-125 (1985)An Approach to the Specification of Distributed Software., , и . The Use of Formal Specification of Software, том 36 из Informatik-Fachberichte, стр. 197-236. Springer, (1979)Kernel primitives of the HXDP executive., , , и . COMPSAC, стр. 595-600. IEEE, (1978)Secure Ada Target: Issues, System Design, and Verification., , , и . S&P, стр. 176-183. IEEE Computer Society, (1985)