Entry Wilkes:1984:SMP from compj1980.bib
Last update: Sat Jan 6 02:03:49 MST 2018
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Wilkes:1984:SMP,
author = "Maurice V. Wilkes",
title = "Security Management and Protection --- a Personal
Approach",
journal = j-COMP-J,
volume = "27",
number = "1",
pages = "3--7",
month = feb,
year = "1984",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/27.1.3",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:16 MST 2012",
bibsource = "Compendex database;
http://comjnl.oxfordjournals.org/content/27/1.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/",
URL = "http://comjnl.oxfordjournals.org/content/27/1/3.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/3.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/4.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/5.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/6.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/7.tif",
acknowledgement = ack-nhfb,
classcodes = "C6150J (Operating systems)",
classification = "723",
corpsource = "Digital Equipment Corp., Maynard, MA, USA",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "access; capability-based protection system; control;
data processing; directories; file director; inspector;
lattice model; operating system; operating systems
(computers); security; security fence; security kernel;
security management; security of data; security
systems; user file",
treatment = "P Practical",
}
Related entries
- 25-3-396b-396, 25-4-496a-496,
26(2)134,
26(2)175,
26(3)205,
26(3)235,
26(3)282,
27(1)62,
27(3)254,
28(3)216,
28(4)366,
28(5)487,
29(1)9,
29(1)12,
29(1)24,
29(1)33,
29(2)109,
29(2)118,
29(2)176,
29(3)229,
29(3)235,
29(3)241,
29(6)527,
30(1)20,
30(1)52,
30(2)157,
30(3)228,
30(3)249,
30(5)386,
30(5)437,
30(5)451,
30(6)487,
31(1)9,
31(3)209,
31(3)220,
31(6)503,
31(6)570,
32(2)162,
32(4)323,
32(4)362
- access,
23(2)124,
23(2)188,
25(1)74,
25(1)140,
25(2)193,
25(4)486,
26(1)10,
26(2)113,
27(3)270,
28(3)291,
28(4)398,
28(4)409,
29(1)9,
29(2)167,
29(6)527,
30(2)157,
30(3)249,
30(4)343,
30(5)451,
30(6)485,
30(6)529,
31(1)41,
31(2)116,
31(2)147,
31(3)209,
31(6)503,
32(1)24,
32(1)90,
32(2)162,
32(4)362
- approach,
23(1)3,
23(1)9,
23(1)28,
23(2)114-1,
23(3)223,
23(3)256,
23(4)317,
24(3)222,
24(4)320,
25(1)12,
25(3)353,
25(4)410,
25(4)442,
25(4)492,
26(3)255,
26(3)283,
26(4)293,
26(4)360,
26(4)383,
27(1)37,
27(2)171,
27(3)246,
28(1)59,
28(1)89,
28(2)97,
28(2)162,
28(4)353,
29(2)161,
29(2)189,
29(2)189-1,
29(3)222,
29(4)330,
29(5)385,
30(1)8,
30(2)119,
30(2)176,
30(3)258,
30(5)393,
30(5)437,
30(6)507,
31(2)133,
31(2)182,
31(3)243,
31(5)409,
32(2)152,
32(2)162,
32(5)386,
32(5)437
- based, capability-,
29(4)289
- capability-based,
29(4)289
- directory,
23(1)37,
30(1)80,
31(2)175
- kernel,
24(1)17,
26(2)134,
27(3)283,
29(2)109,
29(3)246,
29(4)289,
30(2)183,
30(3)193,
30(4)316
- lattice,
30(5)404,
31(6)564
- personal,
23(1)2,
23(4)347,
23(4)353,
26(4)296,
28(2)117,
30(3)254
- protection,
24(2)118,
27(1)47,
29(4)289,
30(3)249,
31(1)25
- security, 23-3-242a-242,
23(3)261,
27(3)209,
29(1)9,
29(4)300,
30(3)249,
31(6)503,
32(1)13