Login / Signup

On the Design and the Implementation of Secure Xenix Workstations.

Virgil D. GligorE. L. BurchC. Sekar ChandersekaranRobert S. ChapmanLeslie J. DottererMatthew S. HechtWen-Der JiangGary L. LuckenbaughN. Vasudevan
Published in: IEEE Symposium on Security and Privacy (1986)
Keyphrases
  • efficient implementation
  • design methodology
  • implementation issues
  • circuit design
  • genetic algorithm
  • computer aided
  • architectural design
  • aspect oriented
  • neural network
  • design considerations