Skip to main content

Grundprinzipien des Designs sicherer Systeme

  • Chapter
  • First Online:
Sichere Systeme

Part of the book series: Xpert.press ((XPERT.PRESS))

  • 3032 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.J. Bernstein, Some thoughts on security after ten years of qmail 1.0, available online at http://cr.yp.to/qmail/qmailsec-20071101.pdf

    Google Scholar 

  2. Cap-talk mailing list, http://www.eros-os.org/pipermail/cap-talk/

    Google Scholar 

  3. J. Donelly, cap-talk mailing-list Beitrag, http://www.eros-os.org/pipermail/cap-talk/2008-April/010761.html

    Google Scholar 

  4. Erights.org, Homepage der sicheren Programmiersprache „E“

    Google Scholar 

  5. S. Garfinkel, Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable, Dissertation, Massachusetts Institute of Technology (MIT) 2005, available online at http://www.simson.net/thesis/

    Google Scholar 

  6. B. Lampson, Keynote zur Usenix Konferenz 2005, http://www.usenix.org/ events/sec05/tech/

    Google Scholar 

  7. M.S. Miller, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, Dissertation, Johns Hopkins University, Baltimore, available online at http://www.erights.org/talks/thesis/index.html

    Google Scholar 

  8. P. van Roy, S. Haridi, Concepts, Techniques, and Models of Computer Programming, The MIT Press, 2004

    Google Scholar 

  9. J.H. Saltzer, M.D. Schroeder, The Protection of Information in Computer Systems, available online at http://www.cs.virginia.edu/∼evans/cs551/saltzer/

    Google Scholar 

  10. D. Vogt, Wurzelbehandlung. Linux Magazin 04/05 Seite 64 ff.

    Google Scholar 

  11. David Wagner, Object Capabilities for Security Google techtalk, November 30, 2007. http://www.youtube.com/watch?v=EGX2I31OhBE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Grundprinzipien des Designs sicherer Systeme. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_3

Download citation

Publish with us

Policies and ethics