Design and Implementation of Secure Xenix | 25 | 7.90 | 1987 |
A Formal Method for the Identification of Covert Storage Channels in Source Code. | 21 | 3.24 | 1987 |
On the Design and the Implementation of Secure Xenix Workstations | 15 | 9.16 | 1986 |
A New Security Testing Method and Its Application to the Secure Xenix Kernel | 8 | 1.44 | 1986 |
Software specification using the special language | 0 | 0.34 | 1981 |
Data flow, abstraction levels and specifications for communications switching systems | 1 | 0.38 | 1976 |
Optimal Networks of NOR-OR Gates for Functions of Three Variables | 7 | 0.93 | 1972 |