Learn More
One of the most critical and least understood aspects of protection is the exercise of control over the movement of rights between the subjects of a system. The conventional Take-Grant mechanism for exercising such control suffers from a puzzling and unfortunate limitation: it cannot enforce strictly unidirectional channels for the flow of rights. That is,(More)
It has often been observed that fewer large software systems are being built “from scratch.” This phenomenon is primarily due to the maturity of the computer age: obvious and cost-effective applications for computers within major industry and government organizations already have large and complex computer-based systems serving them. While these systems(More)
We def ine anaphora more broadly than is usua l l y done, i . e . to inc lude not only pronoun, proadverb ( e . g . he re , t h e r e , t hen ) , pro-verb (e .g . do as in John goes to bed e a r l y ; I do t o o . ) , d e f i n i t e , e t c . re fe rence, but a lso i n d e f i n i t e reference (as in 1 below),as w e l l as reference by an e n t i r e(More)
The brain was removed from cadavers using a modified technique involving additionally the removal of most of the squamous occipital bone and laminae of the upper cervical vertebrae. The resulting specimens were superior to the usual ones in that the medulla oblongata, the upper spinal cord, and all the cranial nerves and cerebral arteries were intact. Fears(More)
  • 1