共 21 条
[1]
Lampson B.W., Sturgis H.E., Reflections on an operating system design, Commun. Ass. Comput. Mach., 19, pp. 251-265, (1976)
[2]
England D., Capability concept, mechanism and structure in system 250, Proc. IRIA Int. Workshop on Protection in Operating Systems, pp. 63-82, (1974)
[3]
Wulf W.A., Et al., HYDRA: The kernel of a multiprocessoroperating system, Commun. Ass. Comput. Mach., 17, pp. 337-345, (1974)
[4]
Needham R.M., Walker R.D.H., The Cambridge CAPcomputer and its protection system, Proc. 6th Symp. Operating Systems Principles, pp. 1-10, (1977)
[5]
Redell D.D., Naming and protection in extendible operating systems, (1974)
[6]
Jones A.K., The object model: A conceptual tool for structuring software, Operating Systems-An Advanced Course, pp. 7-16, (1978)
[7]
Diffie W., Hellman M., Privacy and authentication: Anintroduction to cryptography, Proc. IEEE, 67, pp. 397-427, (1979)
[8]
Smith J., The design of Lucifer, a cryptographic device for data communications, (1971)
[9]
Data Encryption Standard, (1977)
[10]
Chamberlin D.D., Gray J.N., Griffiths P.P., Mresse M., Traiger I.L., Wade B.W., Et al., Data base authorization, Foundations of Secure Computation, pp. 39-56, (1978)