1. On distributed communications: IX. Security, secrecy and tamper-free communications;Baran,1964
2. Fast “Infinite-key” privacy transformation for resource-sharing systems;Carroll,1970
3. Computer security, the corporate Achilles heel;Chu;Business Automation,1971
4. Management of confidential information;Comber,1969
5. Virtual memory;Denning;Computing Surveys,1970