Back to Results
First PageMeta Content
Computer network security / Access control / Privilege / Superuser / Capability-based security / Threat / Operating system / Ring / Kernel / Computer security / Security / Cyberwarfare


In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp[removed]Preprint) ITOSS: An Integrated Toolkit For Operating System Security.1 (Extended Abstract) Michael Rabin
Add to Reading List

Document Date: 2006-03-31 18:45:08


Open Document

File Size: 293,84 KB

Share Result on Facebook

City

Cambridge / /

Company

IBM / /

Currency

BSD / /

Facility

Computer Science Carnegie Mellon University / Michael Rabin Aiken Computation Laboratory Harvard University / Harvard University / /

IndustryTerm

large systems / security operating systems / security applications / efficient algorithm / sentinel tool / bank / secondary memory devices / software tools / banking / correct and prudent management / secure operating systems / security systems / large software system / security tools / adequate solution / secure committee tool / behalf computing processes / software support / /

OperatingSystem

UNIX / BSD / /

Organization

Harvard University / National Science Foundation / School of Computer Science Carnegie Mellon University Pittsburgh / Department of Defense / Committee on Salaries / Data Organization / /

Position

department head / driver / VP / chairman / Manager of Loans / model for computer security / operating system designer / chairman of a certain committee / bank teller / second author / /

ProgrammingLanguage

Lazarus / C / /

ProvinceOrState

Pennsylvania / Massachusetts / /

Technology

efficient algorithm / UNIX / Operating System / operating systems / access control list / /

SocialTag