Ramifications of Integrity {See (last) and (integ) also.}

{arcane}Notes on "Operating System Structures to Support Security and Reliable Software"

Designing, Describing and Implementing Security Policies

Who Holds What Keys?

Slow Data Channels

Secure Communications

{arcane}Identification of Restart Keys

{arcane}User Compartments

Transmission Control for Keys (The Guard)

Secret References to Unsecret Things

Other Security-related Parts of the Manual

Scrutinizing keys.

Auditing Access