Untrusted Applications Need Trusted Operating Systems

Free copies are available while supplies last. Go to http://csrc.ncsl.nist.gov/nissc/ for contact information or send mail to nisscconference@dockmaster.ncsc.mil

By: Paul A. Karger

Published in: Proceedings of 19th National Information Systems Security Conference Gaithersburg, MD/Fort Meade, MD, NIST/National Computer Security Center, vol.2, p.847-8 in 1997

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .