WorldCat Identities

Jones, Anita K.

Overview
Works: 33 works in 62 publications in 2 languages and 453 library holdings
Genres: Periodicals  Conference papers and proceedings 
Roles: Author, Editor
Classifications: QA76.9.S88, 001.6405
Publication Timeline
.
Most widely held works by Anita K Jones
Perspectives on computer science : from the 10th anniversary symposium at the Computer Science Department, Carnegie-Mellon University by Anita K Jones( Book )

16 editions published in 1977 in 3 languages and held by 301 WorldCat member libraries worldwide

An access control facility for programming languages by Anita K Jones( Book )

4 editions published in 1976 in English and held by 11 WorldCat member libraries worldwide

Controlled sharing of information is needed and desirable for many applications. Access control mechanisms exist in operating systems to provide such controlled sharing. However, programming languages currently do not support such a facility. This paper argues that to enhance software reliability programming languages should support controlled sharing of information; the paper illustrates how such an access control facility could be incorporated in a programming language. The mechanism described is suitable for incorporation in object-oriented languages which permit the definition of abstract data types; it is defined in such a way as to enable compile time checking of access control. (Author)
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information by National Research Council( )

1 edition published in 2000 in English and held by 10 WorldCat member libraries worldwide

"This is a summary of discussions at a planning meeting held November 1-2, 2000 to examine the prospects of initiating an NRC study on cyber-security and the insider threat to classified information. The meeting's focus was on the threat to classified systems and information because the political and organizational issues that often arise with protection policies and practices (e.g., rights to privacy) are considerably fewer and less intense than if sensitive unclassified information (especially non-governmental information) is involved. The meeting also addressed threats other than insider threats as well as non-classified computer systems."--Publisher's website
The enforcement of security policies for computation by Anita K Jones( Book )

2 editions published in 1975 in English and held by 8 WorldCat member libraries worldwide

Security policies define how information within a computer system is to be used. Protection mechanisms are built into these systems to enforce security policies. However, in most systems it is quite unclear what policies a particular mechanism can or does enforce. This paper precisely defines security policies and protection mechanisms in order to bridge the gap between them with the concept of soundness: whether a protection mechanism enforces a specific policy for a given program. Different sound protection mechanisms for the same policy and program can then be compared (on the basis of completeness) to determine if one outperforms the others. That a union of mechanisms for the same policy and program can be taken to produce a more complete mechanism is demonstrated. Although a maximal mechanism exists it cannot necessarily be effectively found. In addition to developing a theoretical framework in which to discuss security, a surveillance protection mechanism is introduced which indicates that it is sound and that it is more complete than the commonly used high water mark mechanism. (Author)
Protection in programmed systems by Anita K Jones( Book )

3 editions published between 1973 and 1981 in English and held by 7 WorldCat member libraries worldwide

The report discusses the control of access to objects within programmed systems. The vehicle for this study is a model of protection that isolates a small set of mechanisms needed to provide access control, leaving the policy for invoking these mechanisms to vary naturally with applications. Emphasis is placed on access control required for parameters that accompany a process crossing between execution environments; and a new concept called amplification is defined. The model is shown to provide structure and terminology sufficient for describing and comparing diverse protection systems, for expressing and proving boundary conditions that characterize the manipulation of objects within environments independent of the code executed, and for partially ordering protection systems according to the services they provide. In addition, the dissertation introduces the concept of a centralized protection facility capable of providing access control for user defined objects and accesses. (Author)
Cerro, a secure mail system by Anita K Jones( Book )

1 edition published in 1981 in English and held by 7 WorldCat member libraries worldwide

Workshop on Multiprocessors for High Performance Parallel Computation, sponsored by Carnegie-Mellon University and the National Science Foundation, Seven Springs, Champion, Pennsylvania, June 27-29, 1983 by Workshop on Multiprocessors for High Performance Parallel Computation( Book )

2 editions published in 1983 in English and held by 6 WorldCat member libraries worldwide

The Cm* multiprocessor project : a research review by Anita K Jones( Book )

3 editions published in 1980 in English and Undetermined and held by 4 WorldCat member libraries worldwide

The 50-processor Cm multiprocessor became operational in fall 1979, making it one of the largest multiprocessors in existence. The associated operating systems are nearing the point that they can be used to harness the computation power of Cm to run experimental applications. Thus, the Cm project is nearing the end of the development phase and is entering an experimental phase. The most important recent milestones for the Cm project are: A stable, operational, Cm/50 configuration. It is routinely in use by several different research groups at a time. Some enhancements to hardware continue. In particular, a prototype disk controller has just been completed. Two operating systems, STAROS and MEDUSA, now run on multiple clusters. They have just reached the state of beginning to support user applications and are in the process of being tuned for performance. Crucial to performance is the microcoded portion of each of the operating systems; microcode performance measurements are discussed in detail in this review. Initial 50-processor application measurements. This document reports the results of the first experiments to utilize the full fifty-processor Cm configuration
ACM transactions on computer systems by Association for Computing Machinery( )

in English and held by 4 WorldCat member libraries worldwide

Gala banquet keynote address Grace Hopper Celebration of Women in Computing by Grace Hopper Celebration of Women in Computing( Visual )

1 edition published in 1997 in English and held by 4 WorldCat member libraries worldwide

Ms Jones talks of her stint as a political appointee during the Clinton administration in the Dept. of Defense as director of defense research and engineering. She describes some of the objectives she set and the progress she feels has been made toward meeting them
Operating systems principles( Book )

3 editions published between 1986 and 1992 in English and held by 3 WorldCat member libraries worldwide

Secure data bases : protection against user inference by David P Dobkin( Book )

1 edition published in 1976 in English and held by 3 WorldCat member libraries worldwide

10th anniversary symposium : Computer Science Department, Carnegie-Mellon University, October 6-7-8, 1975( Book )

1 edition published in 1975 in English and held by 3 WorldCat member libraries worldwide

UVA proposal to NSF institutional infrastructure program by Anita K Jones( Book )

1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide

Scientific database management : panel reports and supporting material( Book )

1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide

Abstract: "On March 12-13, 1990, the National Science Foundation sponsored a two day workshop, hosted by the University of Virginia, at which representatives from the earth, life, and space sciences gathered together with computer scientists to discuss the problems facing the scientific community in the area of database management. A summary of the discussion which took place at that meeting can be found in Technical Report 90-21 of the Department of Computer Science at the University of Virginia. This document provides much of the background material upon which that report is based."
The WM computer architectures : military standard manual by Anita K Jones( Book )

1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide

This facility applies to WM's scalar as well as its vector execution units, and has the effect of potentially executing many load/store operations concurrent with the execution of other instructions. The report has been patterned after the 1750 military standard manual."
WM protection : the base mechanism by William Allan Wulf( Book )

1 edition published in 1991 in English and held by 2 WorldCat member libraries worldwide

Experience using multiprocessor systems : a status report by Anita K Jones( Book )

2 editions published in 1979 in Undetermined and English and held by 2 WorldCat member libraries worldwide

Selected papers from the eighth Symposium on Operating Systems Principles : Pacific Grove, California, December 14-16, 1981 by Symposium on Operating Systems Principles( )

2 editions published in 1982 in English and held by 2 WorldCat member libraries worldwide

Scientific database management : report of the Invitational NSF Worksop on Scientific Database Management, Charlottesville, Va., March 1990 : final report by Invitational NSF Workshop on Scientific Database Management( Book )

2 editions published in 1990 in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.58 (from 0.02 for Summary of ... to 0.92 for Scientific ...)

Languages