- Popek, Gerald J. and Charles S. Kline, "Issues in Kernel Design," To Appear in the Proceedings of the 1978 NCCGoogle Scholar
- Neumann, P. G., R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson, "A Provably Secure Operating System: The System, Its Applications and Proofs, SRI Final Report, Project 4332, 11 February 1977Google Scholar
- Millen, J. K., "Security Kernel Validation in Practice," Communications of the ACM, Vol. 19, No. 5, May 1976 Google ScholarDigital Library
- Harrison, Michael A, Walter L. Ruzzo, and Jeffrey D. Ullman, "Protection in Operating Systems," Communications of the ACM, Vol. 19, No. 8, August 1976. Google ScholarDigital Library
- Conway, R. W., W. L. Maxwell, and H. L. Morgan, "On the Implementation of Security Measures in Information Systems," Communications of the ACM, Vol. 15, No. 4, April 1972, pp. 211--220. Google ScholarDigital Library
Index Terms
- Some security principles and their application to computer security
Recommendations
Security During Application Development: an Application Security Expert Perspective
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsMany of the security problems that people face today, such as security breaches and data theft, are caused by security vulnerabilities in application source code. Thus, there is a need to understand and improve the experiences of those who can prevent ...
Comments