Journal: Communications of the ACM

Volume 19, Issue 5

236 -- 243Dorothy E. Denning. A Lattice Model of Secure Information Flow
243 -- 250Jonathan K. Millen. Security Kernel Validation in Practice
251 -- 265Butler W. Lampson, Howard E. Sturgis. Reflections on an Operating System Design
266 -- 272A. Nico Habermann, Lawrence Flon, Lee W. Cooprider. Modularization and Hierarchy in a Family of Operating Systems
273 -- 279John H. Howard. Proving Monitors
279 -- 285Susan S. Owicki, David Gries. Verifying Properties of Parallel Programs: An Axiomatic Approach
285 -- 294A. Wayne Madison, Alan P. Batson. Characteristics of Program Localities
295 -- 297Barton G. Prieve, Robert S. Fabry. VMIN-An Optimal Variable-Space Page Replacement Algorithm
298 -- 304Wesley W. Chu, Holger Opderbeck. Analysis of the PFF Replacement Algorithm via a Semi-Markov Model