• D. Tsichritzis
Chapter 3: Techniques
Part of the Lecture Notes in Computer Science book series (LNCS, volume 30)


Virtual Machine File System Security Mechanism Protection Status Financial Capability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4. References

  1. 1).
    NATO Report on SOFTWARE ENGINEERING, Garmish, Oct. 1968. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.Google Scholar
  2. 2).
    Ichbiah, J. Compagnie Internationale pour l' Informatique private communications.Google Scholar
  3. 3).
    Elspas, B. et al "Software Reliability", IEEE COMPUTER, Vol. 1, No. 1, Jan. 1971.Google Scholar
  4. 4).
    Henderson, P. and Snowden R. "An experiment in structured programming", Technical Report 18, Computer Laboratory, University of Newcastle upon Tyne, 1971.Google Scholar
  5. 5).
    Naur, P. "Proof of Algorithms by General Snapshots", BIT, Vol. 6, No. 4, pp. 310–316, 1966.Google Scholar
  6. 6).
    Floyd, R.W. "Assigning Meanings to Programs", Proceedings of a Symposium in Applied Mathematics, Mathematical Aspects of Computer Science, Vol. 19, pp. 19–32, J.T. Schwartz (Ed.), American Mathematical Society, Providence, Rhode Island, 1967.Google Scholar
  7. 7).
    London, R.L. "Computer Programs can be Proved Correct", Proceedings of the Fourth Systems Symposium — Formal Systems and Non-Numerical Problem Solving by Computers, held at Case-Western Reserve University, 1968.Google Scholar
  8. 8).
    London, R.L. "Certification of the Algorithm Treesort", Communications of the ACM, Vol. 13, No. 6, pp. 371–373, 1970.Google Scholar
  9. 9).
    Hoare, C.A.R. "An Axiomatic Basis for Computer Programming", Communications of the ACM, Vol. 12, No. 10, 1969.Google Scholar
  10. 10).
    Clark, B. and Horning, J. "The system language for project SUE", SIGPLAN Symposium for Languages for Systems Implementation, 1971.Google Scholar
  11. 11).
    Snowden, R. "PEARL: An interactive system for the preparation and validation of structured programs", Technical Report 28, Computer Laboratory, University of Newcastle upon Tyne, 1971.Google Scholar
  12. 12).
    Manna, Z. and Pnueli, A. "Formalization of Properties of Recursively Defined Functions", ACM Symposium of Theory of Computing, pp. 201–210, 1969.Google Scholar
  13. 13).
    Luckman, D. "The Resolution Principle in Theorem Proving", Machine Intelligence 1, Collins and Michie (Eds.), American Elsevier, Inc., New York 1967.Google Scholar
  14. 14).
    King, J. C. and Floyd, R. W. "Interpretation Oriented Theorem Prover Over Integers", Second Annual ACM Symposium on Theory of Computing, pp. 169–179, 1970.Google Scholar
  15. 15).
    Dijkstra, E. W. "The Structure of THE Multiprogramming System. CACM 11, 5, May 1968, 341–346.Google Scholar
  16. 16).
    NATO Report on SOFTWARE ENGINEERING, Rome, Oct. 1969. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN/NATO, 1110 Bruxelles, Belgium.Google Scholar
  17. 17).
    Habermann, N. "Synchronization of Communicating Processes", Third Symposium on Operating Systems Principles, Palo Alto, 1971.Google Scholar
  18. 18).
    Coffman, E. et al "System deadlocks", ACM Computing Surveys, Vol. 3, No. 2, June 1971.Google Scholar
  19. 19).
    Belday, L. and Lehmann, M. "Programming System Dynamics" IBM Report RC 3546, September 1971.Google Scholar
  20. 20).
    Lampson, B. W. "Dynamic Protection Structures", Proc. AFIPS Conf. 35, 1969 FJCC.Google Scholar
  21. 21).
    Lampson, B. "Protection", Proceedings of the Fifth Annual Princeton Conference on Information Sciences and Systems, March 1971, p. 437–443.Google Scholar
  22. 22).
    Graham, S. and Denning, P. "Protection: Principles and Practice", Tech. Report No. 101, Princeton University Electrical Engineering Dept. to appear in SJCC 1972.Google Scholar
  23. 23).
    Dijkstra, E. W. "Cooperating Sequential Processes" in Programming Languages (F. Genuys ed.) Academic Press 1968 p. 43–112.Google Scholar
  24. 24).
    Conway, R. W. et al "Security and Privacy in Information Systems — A Functional Model" Tech. Report No. 133, Dept. of Operations Research, Cornell University, June 1971, to appear in CACM.Google Scholar
  25. 25).
    "COSINE Report on Operating Systems", available through Commission on Education, National Academy of Engineering, 2101 Constitution Avenue, Washington, D.C. 20418.Google Scholar
  26. 26).
    Schroeder, M. and Saltzer, J. "A Hardware Architecture for Implementing Protection Rings", Proceedings of the Third Symposium on Operating Systems Principles, October 18–20, p. 42–54.Google Scholar
  27. 27).
    Graham, R. M. "Protection in an Informations Processing Utility", CACM 11, 5, May 1968.Google Scholar
  28. 28).
    Project SUE internal documentation workbook. Computer Systems Research Group, University of Toronto.Google Scholar
  29. 29).
    Brinch, Hansen P. "The Nucleus of a Multiprogramming System", CACM 13, April 1970.Google Scholar
  30. 30).
    Hoffman, L. "Computers and Privacy", ACM Computing Surveys, Vol. 1, No. 2, June 1969.Google Scholar
  31. 31).
    Gotlieb, C. C. and Hume, P. "Systems Capacity for Data Security". Draft report for study 6 of Privacy and Computers Task Force.Google Scholar
  32. 32).
    Petersen, H. E. and Turn, R. "System implications of information privacy". Proc. AFIPS 1967 Spring Joint Comput. Conf., Vol. 30, Thompson Book Co., Washington, D.C., pp. 291–300.Google Scholar
  33. 33).
    Shannon, C. E. "Communication theory of secrecy systems", Bell Syste. Tech. J. 28, 4, Oct. 1949, 656–715.Google Scholar
  34. 34).
    Baran, P. On distributed communications: IX. Security, secrecy and tamper-free considerations. Doc. RM-3765-PR Rand Corp., Santa Monica, Calif., August 1964.Google Scholar
  35. 35).
    Hsiao, D. K. "A File System for a Problem Solving Facility". Ph.D. Diss. in Electrical Engineering, U. of Pennsylvania, Philadelphia, Pa., 1968.Google Scholar
  36. 36).
    Hoffman, L. "The formulary model for access control and privacy in computer systems", SLAC Rept. No. 117, Stanford University, May 1970.Google Scholar
  37. 37).
    Beardsley C. "Is your computer insecure". IEEE Spectrum, January 1972.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1975

Authors and Affiliations

  • D. Tsichritzis
    • 1
  1. 1.Department of Computer ScienceUniversity of TorontoCanada

Personalised recommendations