Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UCLA Secure Unix., , , , , and . MARK, page 355-364. IEEE, (1979)The LOCUS Distributed Operating System., , , , and . SOSP, page 49-70. ACM, (1983)Operating System Review 17(5).Encryption and Secure Computer Networks., and . ACM Comput. Surv., 11 (4): 331-356 (1979)The PDP-11 Virtual Machine Architecture: A Case Study., and . SOSP, page 97-105. ACM, (1975)Operating System Review 9(5), Special Issue.Issues in kernel design., and . AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 1079-1086. AFIPS Press, (1978)Design Issues for Secure Computer Networks., and . Advanced Course: Operating Systems, volume 60 of Lecture Notes in Computer Science, page 517-546. Springer, (1978)Verifiable secure operating system software., and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 145-151. AFIPS Press, (1974)A verifiable protection system., and . Reliable Software, page 294-304. ACM, (1975)LOCUS - A Network Transparent, High Reliability Distributed System., , , , , , and . SOSP, page 169-177. ACM, (1981)Operating System Review 15(5).Public key vs. conventional key encryption., and . MARK, page 831-838. IEEE, (1979)