Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A note on some compiling algorithms.. Commun. ACM, 7 (3): 149-150 (1964)Program structures for parallel processing.. Commun. ACM, 8 (12): 786-788 (1965)Computer Security Technology Planning Study. volume 2. U.S. Air Force Electronic Systems Division, (October 1972)Experimental study of a 1.5-MW, 110-GHz gyrotron oscillator.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2005)ndltd.org (oai:dspace.mit.edu:1721.1/30158).An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.. S&P, page 102-106. IEEE Computer Society, (1983)Information Security in a Multi-User Computer Environment.. Advances in Computers, (1972)Accelerating Computer Security Innovation.. S&P, page 91-98. IEEE Computer Society, (1982)Privacy and protection in operating systems (Panel Session)., , , , and . ACM Annual Conference (2), page 665-666. ACM, (1972)A computer for direct execution of algorithmic languages.. AFIPS Eastern Joint Computing Conference, page 184-193. ACM, (1961)Computer security myths mythtakes or 'The real security problem is...'.. ACSAC, IEEE, (1992)