Preview
Unable to display preview. Download preview PDF.
Bibliography
Bashe, C. J., L. R. Johnson, J. H. Palmer, and E. W. Pugh. IBM's Early Computers MIT Press, Cambridge, Massachusetts, 1986.
“Analysis of a Kernel Verification.” Proceedings of the 1984 Symposium on Security and Privacy, Oakland, California, May 1984, pp. 125–131.
Daley, R. C., and Dennis, J. B. “Virtual Memory, Processes, and Sharing in MULTICS.” Communications of the ACM, 11:5, pp. 306–312 (May 1968).
DeMillo, R. A., R. J. Lipton, and A. J. Perlis. “Social Processes and Proofs of Theorems and Programs.” Communications of the ACM, 22:5, (May 1979).
Dijkstra, E. W. “The Structure of the ‘THE’ Multiprogramming System.” Communications of the ACM, 11:5, pp. 341–346 (May 1968).
Trusted Computer System Evaluation Criteria. Computer Security Center, Department of Defense, Fort Meade, Maryland. (CSC-STD-001-83) March 1985.
Grampp, F. T., and R. H. Morris. “UNIX Operating System Security.” AT&T Bell Laboratories Technical Journal, 63:8b, pp. 1649–1672 (October 1984).
Jelen, G. F. Information Security: An Elusive Goal. Program on Information Resources Policy, Harvard University, Cambridge, Massachusetts. June 1985.
Lampson, B. W. “A Note on the Confinement Problem.” Communications of the ACM, 16:10, pp. 613–615 (October 1973).
Lampson, B. W. “Protection.” ACM Operating Systems Review, 19:5, pp. 13–24 (December 1985).]
McLean, J. “A Comment on the ‘Basic Security Theorem’ of Bell and La-Padula.” Information Processing Letters, 20:3, pp. 67–70 (1985).
McLean, J. “Reasoning About Security Models.” Personal Communication, 1986.
Organick, E. I. The Multics System. MIT Press, Cambridge, Massachusetts, 1972.
Rabin, M. O. “Fingerprinting by Random Polynomials.” TR-15-81. Center for Research in Computing Technology, Harvard University, Cambridge, Massachusetts. 1981.
Ritchie, D. M. and Thompson, K. “The UNIX Time-Sharing System.” Communications of the ACM, 17:7, pp. 365–375 (July 1974).
Schroeder, M. D., and J. H. Saltzer. “A Hardware Architecture for Implementing Protection Rings.” Communications of the ACM, 15:3, pp. 157–170 (March 1972).
Shamir, A. “How to Share a Secret.” Communications of the ACM, 22:11, pp. 612–613 (November 1979).
Thompson, K. “Reflections on Trusting Trust.” Communications of the ACM, 27:8, pp. 761–763 (August 1984).
Wulf, W. A., R. Levin, S. P. Harbison. HYDRA/C.mmp. McGraw-Hill, New York, NY, 1981.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1989 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rabin, M., Tygar, J.D. (1989). ITOSS: An integrated toolkit for operating system security. In: Litwin, W., Schek, HJ. (eds) Foundations of Data Organization and Algorithms. FODO 1989. Lecture Notes in Computer Science, vol 367. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51295-0_115
Download citation
DOI: https://doi.org/10.1007/3-540-51295-0_115
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-51295-0
Online ISBN: 978-3-540-46186-9
eBook Packages: Springer Book Archive