{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T20:40:16Z","timestamp":1742589616843,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540087557"},{"type":"electronic","value":"9783540358800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1007\/3-540-08755-9_5","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T16:32:42Z","timestamp":1330187562000},"page":"209-227","source":"Crossref","is-referenced-by-count":9,"title":["Issues in kernel design"],"prefix":"10.1007","author":[{"given":"G. J.","family":"Popek","sequence":"first","affiliation":[]},{"given":"C. S.","family":"Kline","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"5_CR1","unstructured":"Belady, L. and C. Weissman \"Experiments with Secure Resource Sharing for Virtual Machines\", Proceedings of IRIA International Workshop on Protection in Operating Systems, Rocquencourt, France, August 13\u201314, 1974, pp 27\u201334."},{"key":"5_CR2","unstructured":"Brinch Hansen, P. Operating System Principles, Prentice Hall 1973, 366 pp."},{"key":"5_CR3","unstructured":"Gaines, R. S. and C. Sunshine, \"A Secure NCP for Kernel Based Systems\", RAND Internal memo, 1976."},{"key":"5_CR4","unstructured":"Janson, P. A., \"Removing the Dynamic Linker from the Security Kernel of a Computing Utility\", MIT, Masters Thesis, June 1974, MAC TR-132, 128 pp."},{"key":"5_CR5","unstructured":"Kampe, M., C. Kline, G. Popek, E. Walton, \"The UCLA Data Secure Unix Operating System\", UCLA Technical Report, 9\/76."},{"issue":"10","key":"5_CR6","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. Lampson","year":"1973","unstructured":"Lampson, B., \"A Note on the Confinement Problem\", Communications of the ACM, Vol. 16, No. 10, October 1973, pp 613\u2013615.","journal-title":"Communications of the ACM"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Lampson, B. W. and H. Sturgis, \"Reflections on an Operating System Design\", Communications of the ACM, 1976.","DOI":"10.1145\/360051.360074"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Millen, J. K., \"Security Kernel Validation in Practice\", Communications of the ACM, 1976.","DOI":"10.1145\/360051.360059"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Popek, G. and C. Kline, \"Verifiable Secure Operating System Architectures\", Proceedings of 1974 NCC, pp 145\u2013151.","DOI":"10.1145\/1500175.1500204"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Popek, G., \"Protection Structures\", IEEE Computer, June 1974, pp 22\u201333.","DOI":"10.1109\/MC.1974.6323580"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Popek, G. and C. Kline \"A Verifiable Protection System\", Proceedings of the International Conference on Reliable Software, May 1975, Los Angeles, California.","DOI":"10.1145\/800027.808451"},{"key":"5_CR12","unstructured":"Popek G., and C. Kline, \"The UCLA Secure Unix Design\", Internal memo, unpublished."},{"issue":"7","key":"5_CR13","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/361011.361061","volume":"17","author":"D. Ritchie","year":"1974","unstructured":"Ritchie, D. and K. Thompson, \"The Unix Timesharing System\" Communications of the ACM, Vol. 17, No. 7, July 1974, pp 365\u2013375.","journal-title":"Communications of the ACM"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Robinson, et.al., \"On Attaining Reliable Software for a Secure Operating System\", 1975 International Conference on Reliable Software, April 21\u201323, 1975, Los Angeles, California.","DOI":"10.1145\/800027.808449"},{"issue":"9","key":"5_CR15","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. H. Saltzer","year":"1975","unstructured":"Saltzer, J. H. and M. Schroeder, \"The Protection of Information in Computer Systems\", Proceedings of the IEEE, Vol. 63, No. 9, September 1975, pp 1278\u20131306.","journal-title":"Proceedings of the IEEE"},{"key":"5_CR16","unstructured":"Saltzer, G. Private communication, 1976."},{"key":"5_CR17","unstructured":"Schell, R., private communication, 1974."},{"issue":"6","key":"5_CR18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","volume":"17","author":"W. Wulf","year":"1974","unstructured":"Wulf, W., et.al., \"HYDRA: The Kernel of a Multiprocessor Operating System\", Communications of the ACM, Vol. 17, No. 6,June 1974, pp 337\u2013345.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Operating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-08755-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T20:02:52Z","timestamp":1742587372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-08755-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"ISBN":["9783540087557","9783540358800"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-08755-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1978]]}}}