skip to main content
10.1145/800179.1124633acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

Program confinement in KVM/370

Published:01 January 1977Publication History
First page image

References

  1. 1. IBM Virtual Machine Facility/370 : Control Program (CP) Logic, IBM Publication SY20-0880. May be obtained from IBM Corporation, Data Processing Division, 1133 Westchester Avenue, White Plains, New York, 10604.Google ScholarGoogle Scholar
  2. 2. IBM System/370 Principles of Operation, IBM Publication GA 22-7000. May be obtained from IBM Corporation, Data Processing Division, 1133 Westchester Avenue, White Plains, New York, 10604.Google ScholarGoogle Scholar
  3. 3. Attanasio, C. R., Markstein, P. W., Phillips, R. J., "Penetrating an Operating System: A Study of VM/370 Integrity," IBM Systems Journal, Volume 15, November 1, 1976, pp. 102-116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4. Donovan, J. J., Madnick, S. E., "Hierarchical Approach to Computer System Integrity," IBM Svstems Journal, Volume 14, Number 2, 1975, pp. 188-202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5. Weissman, Clark, "Secure Computer Operations with Virtual Partitioning, " AFIPS Conference Proceedings, Volume 44, National Computer Conference, 1975, pp. 929-934.Google ScholarGoogle Scholar
  6. 6. Belady, L. A., Weissman, C., "Experiments with Secure Resource Sharing for Virtual Machines," SDC SP-3769, May 1974. Also published in Proceedings on Protection in Operating Systems, Institute de Recherche d' Informatique et d'Automatique (IRIA), Colloques Internationaux, Rocquencourt, France, August 1974.Google ScholarGoogle Scholar
  7. 7. Gold, B., Linde, R., Schaefer, M., Scheid, J., "VM/370 Security Retrofit Program," The Proceedings of the National ACM Conference, October 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8. Lampson, B. W., "A Note on the confinement Problem," Communications of the ACM, October 1973, pp. 613-615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9. Linde, R. R., "Operating System Penetration," AFIPS Conference Proceedings, Volume 44, National Computer Conference, 1975, pp. 361-368.Google ScholarGoogle Scholar
  10. 10. Lampson, B. W., "Dynamic Protection Structures," AFIPS Conference Proceedings, Volume 35, 1969 FJCC, pp. 27-38.Google ScholarGoogle Scholar
  11. 11. Denning, D. E., "A Lattice Model of Secure Information Flow," CACM (19.5), May, 1976, p. 236-242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12. Denning, D., Denning, P. and Graham, G. S., "Selectively Confined Subsystems" Proceedings International Workshop on Protection in Operating Systems, IRIA, Colloques Internationaux, Rocquencourt, France, August, 1974, pp. 55-61.Google ScholarGoogle Scholar
  13. 13. Anderson, J. P., "Computer Security Technology Planning Study," ESD-TR-73-51, Volume I, October 1972.Google ScholarGoogle Scholar
  14. 14. Schiller, W. L., "The Design and Specification of a Security Kernel for the PDP-11/45," MITRE Technical Report, MITR-2934, March 1975.Google ScholarGoogle Scholar
  15. 15. Bell, E. D., LaPadula, L. D., "Secure Computer Systems : Mathematical Foundations," MITRE Technical Report Number 2547, 1 March 1973.Google ScholarGoogle Scholar
  1. Program confinement in KVM/370

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM '77: Proceedings of the 1977 annual conference
      January 1977
      505 pages

      Copyright © 1977 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 1977

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader