30 research outputs found

    An Endogenous Priority Model for Load Control in Combined Batch—Interactive Computer Systems

    Get PDF

    Formal models for computer security

    No full text
    Efforts to build "secure " computer systems have now been underway for more than a decade. Many designs have been proposed, some prototypes have been constructed, and a few systems are approaching the production stage. A small number of systems are even operating in what the Department of Defense calls the "multilevel " mode som

    Usage statistics for MTS

    No full text

    Technical correspondence

    No full text

    Hidden safety requirements in large-scale systems

    No full text
    To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate straightforward rules for safe component interconnection

    Formal Models for C o m p u t e r Security

    No full text
    Efforts to build "secure " computer systems have now been underway for more than a decade. Many designs have been proposed, some prototypes have been constructed, and a few systems are approaching the production stage. A small number of systems are even operating in what the Department of Defense calls the "multilevel " mode som

    Technical Correspondence

    No full text

    Does program verification help?

    No full text
    corecore