References

  1. Theodore A. Linden, “Operating System Structures to Support Security and Reliable Software,” NBS Technical Note 919, U.S. Department of Commerce, National Bureau of Standards, Institute for Computer Sciences and Technology, August, 1976. (Also published in ACM Computing Surveys, 8, 4, December 1976, pages 409-445.).
  2. System/370 Principles of Operation, GA22-7000-9, IBM, 1983.
  3. Henry M. Levy, Capability Based Computer Systems, Digital Press, 1984.
  4. OS/VS2 MVS Supervisor Services and Macro Instructions, GC28-1114-1, IBM, 1983.
  5. Reference Manual for the Ada Programming Language, United States Department of Defense, ANSI/MIL-STD-1815A-1983, 1983.
  6. D. M. Ritchie and K.L. Thompson, “The UNIX Time-sharing System”, Communications of the ACM, July, 1974.
  7. KeyKOS /370 Principles of Operation, KL002, Key Logic, 1988.
  8. Adele Goldberg and David Robson, Smalltalk 80 The Language and its Implementation., Addison Wesley, 1983.
  9. William A. Wulf, Roy Levin, and Samuel P. Harbison, Hydra/C.mmp An Experimental Computer System, McGraw-Hill Book Company, 1981.
  10. U.S. Patent number 4,584,639.
  11. Butler Lampson, “A Note on the Confinement Problem”, Communications of the ACM, V 16, N 10, October, 1973.
  12. Virtual Machine/System Product CMS Command and Macro Reference, SC19-6209-1, IBM, 1983.