Marvin Schaefer

Learn More
One aspect of producing secure operating systems involves the confinement of programs. This paper discusses the program confinement problem as addressed by the developers of a retrofitted version of the IBM VM/370 virtual machine monitor. This version of the system (called KVM/370) uses a security-kernel architecture to provide a provably secure multi-level(More)
I. SUMMARY This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have(More)
Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by(More)