| Number | Name | Date | Kind |
|---|---|---|---|
| 4005386 | Seki et al. | Jan 1977 | A |
| 4183085 | Roberts et al. | Jan 1980 | A |
| 4218738 | Matyas et al. | Aug 1980 | A |
| 4227253 | Ehrsam et al. | Oct 1980 | A |
| 4253145 | Goldberg | Feb 1981 | A |
| 4310720 | Check, Jr. | Jan 1982 | A |
| 4328542 | Anastas et al. | May 1982 | A |
| 4430728 | Beitel et al. | Feb 1984 | A |
| 4442484 | Childs, Jr. et al. | Apr 1984 | A |
| 4486828 | Kitamura et al. | Dec 1984 | A |
| 4488217 | Binder et al. | Dec 1984 | A |
| 4531023 | Levine | Jul 1985 | A |
| 4584639 | Hardy | Apr 1986 | A |
| 4593353 | Pickholtz | Jun 1986 | A |
| 4652990 | Pailen et al. | Mar 1987 | A |
| 4669043 | Kaplinsky | May 1987 | A |
| 4677546 | Freeman et al. | Jun 1987 | A |
| 4677670 | Henderson, Jr. | Jun 1987 | A |
| 4701840 | Boebert et al. | Oct 1987 | A |
| 4742447 | Duvall et al. | May 1988 | A |
| 4748668 | Shamir et al. | May 1988 | A |
| 4751669 | Sturgis et al. | Jun 1988 | A |
| 4754326 | Kram et al. | Jun 1988 | A |
| 4754395 | Weisshaar et al. | Jun 1988 | A |
| 4771461 | Matyas | Sep 1988 | A |
| 4794515 | Hornung | Dec 1988 | A |
| 4797853 | Savage | Jan 1989 | A |
| 4799061 | Abraham et al. | Jan 1989 | A |
| 4799153 | Hann et al. | Jan 1989 | A |
| 4829469 | Germaine et al. | May 1989 | A |
| 4858117 | DiChiara et al. | Aug 1989 | A |
| 4885789 | Burger et al. | Dec 1989 | A |
| 4918653 | Johri et al. | Apr 1990 | A |
| 4926476 | Covey | May 1990 | A |
| 4945468 | Carson et al. | Jul 1990 | A |
| 4962533 | Krueger et al. | Oct 1990 | A |
| Entry |
|---|
| Ames et al., “Security Kernel Design and Implementation: An Introduction,” IEEE Computer, Jul. 1983, pp. 14-22. |
| Dunford, Filer, Version 2.20 User Documentation May 14, 1986. |
| McCauley et al., “KSOS: The Design of a Secure Operating System,” Version 1.2 (ca. 1979). |
| UNIX operating system. |
| European Patent Application Publication No. 0326699 published Sep. 8, 1989 in Bulletin No. 89/32. |
| Simon Wiseman, Phil Terry, Andrew Wood and Clare Harrold “The Trusted Path Between SMITE and the User,” 1988 IEEE Symposium on Security and Privacy pp. 147-155 (1988) published in the United States of America. |
| Security Kernel Design and Implementation: An Introduction, IEEE Computer, Jul. 1983, pp 14-22. |
| A VMM Security Kernel for the VAX Architecture, (unpublished draft of Jun. 11, 1990), Krager, et al. |