BibTeX records: Roger M. Needham

download as .bib file

@inproceedings{DBLP:conf/spw/Needham02,
  author    = {Roger M. Needham},
  title     = {Keynote Address},
  booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April
               17-19, 2002, Revised Papers},
  pages     = {2--4},
  year      = {2002},
  crossref  = {DBLP:conf/spw/2002},
  url       = {https://doi.org/10.1007/978-3-540-39871-4\_2},
  doi       = {10.1007/978-3-540-39871-4\_2},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Needham02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02a,
  author    = {Roger M. Needham},
  title     = {Back to the Beginning},
  booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April
               17-19, 2002, Revised Papers},
  pages     = {242},
  year      = {2002},
  crossref  = {DBLP:conf/spw/2002},
  url       = {https://doi.org/10.1007/978-3-540-39871-4\_20},
  doi       = {10.1007/978-3-540-39871-4\_20},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Needham02a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham01,
  author    = {Roger M. Needham},
  title     = {Keynote Address: Mobile Computing versus Immobile Security},
  booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April
               25-27, 2001, Revised Papers},
  pages     = {1--3},
  year      = {2001},
  crossref  = {DBLP:conf/spw/2001},
  url       = {https://doi.org/10.1007/3-540-45807-7\_1},
  doi       = {10.1007/3-540-45807-7\_1},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Needham01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham00,
  author    = {Roger M. Needham},
  title     = {Keynote Address: Security Protocols and the Swiss Army Knife (Transcript
               of Discussion)},
  booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April
               3-5, 2000, Revised Papers},
  pages     = {1--4},
  year      = {2000},
  crossref  = {DBLP:conf/spw/2000},
  url       = {https://doi.org/10.1007/3-540-44810-1\_1},
  doi       = {10.1007/3-540-44810-1\_1},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Needham00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Needham99,
  author    = {Roger M. Needham},
  title     = {The Hardware Environment},
  booktitle = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
               USA, May 9-12, 1999},
  pages     = {236},
  year      = {1999},
  crossref  = {DBLP:conf/sp/1999},
  url       = {https://doi.org/10.1109/SECPRI.1999.766918},
  doi       = {10.1109/SECPRI.1999.766918},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/Needham99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham99,
  author    = {Roger M. Needham},
  title     = {Keynote Address: The Changing Environment},
  booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April
               19-21, 1999, Proceedings},
  pages     = {1--5},
  year      = {1999},
  crossref  = {DBLP:conf/spw/1999},
  url       = {https://doi.org/10.1007/10720107\_1},
  doi       = {10.1007/10720107\_1},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Needham99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/AndersonBCLMN98,
  author    = {Ross J. Anderson and
               Francesco Bergadano and
               Bruno Crispo and
               Jong{-}Hyeon Lee and
               Charalampos Manifavas and
               Roger M. Needham},
  title     = {A New Family of Authentication Protocols},
  journal   = {Operating Systems Review},
  volume    = {32},
  number    = {4},
  pages     = {9--20},
  year      = {1998},
  url       = {https://doi.org/10.1145/302350.302353},
  doi       = {10.1145/302350.302353},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/AndersonBCLMN98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AndersonNS98,
  author    = {Ross J. Anderson and
               Roger M. Needham and
               Adi Shamir},
  title     = {The Steganographic File System},
  booktitle = {Information Hiding, Second International Workshop, Portland, Oregon,
               USA, April 14-17, 1998, Proceedings},
  pages     = {73--82},
  year      = {1998},
  crossref  = {DBLP:conf/ih/1998},
  url       = {https://doi.org/10.1007/3-540-49380-8\_6},
  doi       = {10.1007/3-540-49380-8\_6},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ih/AndersonNS98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Needham98,
  author    = {Roger M. Needham},
  title     = {Logic and Over-Simplification},
  booktitle = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
               Indiana, USA, June 21-24, 1998},
  pages     = {2--3},
  year      = {1998},
  crossref  = {DBLP:conf/lics/1998},
  url       = {https://doi.org/10.1109/LICS.1998.705638},
  doi       = {10.1109/LICS.1998.705638},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lics/Needham98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NeedhamLFGC98,
  author    = {Roger M. Needham and
               E. Stewart Lee and
               Joan Feigenbaum and
               Virgil D. Gligor and
               Bruce Christianson},
  title     = {Panel Session - Future Directions},
  booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  pages     = {227--239},
  year      = {1998},
  crossref  = {DBLP:conf/spw/1998},
  url       = {https://doi.org/10.1007/3-540-49135-X\_31},
  doi       = {10.1007/3-540-49135-X\_31},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/NeedhamLFGC98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AbadiN96,
  author    = {Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {Prudent Engineering Practice for Cryptographic Protocols},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {22},
  number    = {1},
  pages     = {6--15},
  year      = {1996},
  url       = {https://doi.org/10.1109/32.481513},
  doi       = {10.1109/32.481513},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tse/AbadiN96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/JardetzkySN95,
  author    = {Paul W. Jardetzky and
               Cormac J. Sreenan and
               Roger M. Needham},
  title     = {Storage and Synchronization for Distributed Continuous Media},
  journal   = {Multimedia Syst.},
  volume    = {3},
  number    = {4},
  pages     = {151--161},
  year      = {1995},
  url       = {https://doi.org/10.1007/BF02176236},
  doi       = {10.1007/BF02176236},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mms/JardetzkySN95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AndersonN95,
  author    = {Ross J. Anderson and
               Roger M. Needham},
  title     = {Robustness Principles for Public Key Protocols},
  booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  pages     = {236--247},
  year      = {1995},
  crossref  = {DBLP:conf/crypto/1995},
  url       = {https://doi.org/10.1007/3-540-44750-4\_19},
  doi       = {10.1007/3-540-44750-4\_19},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AndersonN95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/cstoday95/AndersonN95,
  author    = {Ross J. Anderson and
               Roger M. Needham},
  title     = {Programming Satan's Computer},
  booktitle = {Computer Science Today: Recent Trends and Developments},
  pages     = {426--440},
  year      = {1995},
  crossref  = {DBLP:books/sp/CStoday1995},
  url       = {https://doi.org/10.1007/BFb0015258},
  doi       = {10.1007/BFb0015258},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/cstoday95/AndersonN95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Needham94,
  author    = {Roger M. Needham},
  title     = {Denail of Service: An Example},
  journal   = {Commun. {ACM}},
  volume    = {37},
  number    = {11},
  pages     = {42--46},
  year      = {1994},
  url       = {https://doi.org/10.1145/188280.188294},
  doi       = {10.1145/188280.188294},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/Needham94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WheelerN94,
  author    = {David J. Wheeler and
               Roger M. Needham},
  title     = {TEA, a Tiny Encryption Algorithm},
  booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
               14-16 December 1994, Proceedings},
  pages     = {363--366},
  year      = {1994},
  crossref  = {DBLP:conf/fse/1994},
  url       = {https://doi.org/10.1007/3-540-60590-8\_29},
  doi       = {10.1007/3-540-60590-8\_29},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/WheelerN94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbadiN94,
  author    = {Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {Prudent engineering practice for cryptographic protocols},
  booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages     = {122--136},
  year      = {1994},
  crossref  = {DBLP:conf/sp/1994},
  url       = {https://doi.org/10.1109/RISP.1994.296587},
  doi       = {10.1109/RISP.1994.296587},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/AbadiN94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongLNS93,
  author    = {Li Gong and
               T. Mark A. Lomas and
               Roger M. Needham and
               Jerome H. Saltzer},
  title     = {Protecting Poorly Chosen Secrets from Guessing Attacks},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {11},
  number    = {5},
  pages     = {648--656},
  year      = {1993},
  url       = {https://doi.org/10.1109/49.223865},
  doi       = {10.1109/49.223865},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/GongLNS93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Needham93,
  author    = {Roger M. Needham},
  title     = {Denial of Service},
  booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.},
  pages     = {151--153},
  year      = {1993},
  crossref  = {DBLP:conf/ccs/1993},
  url       = {https://doi.org/10.1145/168588.168607},
  doi       = {10.1145/168588.168607},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Needham93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/annals/Needham92,
  author    = {Roger M. Needham},
  title     = {Later Developments at Cambridge: Titan, Cap, and the Cambridge Ring},
  journal   = {{IEEE} Annals of the History of Computing},
  volume    = {14},
  number    = {4},
  pages     = {57--58},
  year      = {1992},
  url       = {https://doi.org/10.1109/85.194056},
  doi       = {10.1109/85.194056},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/annals/Needham92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nossdav/NeedhamN92,
  author    = {Roger M. Needham and
               Akira Nakamura},
  title     = {An Approach to Real-time Scheduling - but is it Really a Problem for
               Multimedia?},
  booktitle = {Network and Operating System Support for Digital Audio and Video,
               Third International Workshop, La Jolla, California, USA, November
               12-13, 1992, Proceedings},
  pages     = {32--39},
  year      = {1992},
  crossref  = {DBLP:conf/nossdav/1992},
  url       = {https://doi.org/10.1007/3-540-57183-3\_4},
  doi       = {10.1007/3-540-57183-3\_4},
  timestamp = {Sat, 20 May 2017 15:32:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nossdav/NeedhamN92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SchroederBBMNRST91,
  author    = {Michael D. Schroeder and
               Andrew Birrell and
               Michael Burrows and
               Hal Murray and
               Roger M. Needham and
               Thomas L. Rodeheffer and
               Edwin H. Satterthwaite and
               Charles P. Thacker},
  title     = {Autonet: {A} High-Speed, Self-Configuring Local Area Network Using
               Point-to-Point Links},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {9},
  number    = {8},
  pages     = {1318--1335},
  year      = {1991},
  url       = {https://doi.org/10.1109/49.105178},
  doi       = {10.1109/49.105178},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/SchroederBBMNRST91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Needham91,
  author    = {Roger M. Needham},
  title     = {What Next? Some Speculations},
  booktitle = {Operating Systems of the 90s and Beyond, International Workshop, Dagstuhl
               Castle, Germany, July 8-12, 1991, Proceedings},
  pages     = {220--222},
  year      = {1991},
  crossref  = {DBLP:conf/dagstuhl/1991os},
  url       = {https://doi.org/10.1007/BFb0024547},
  doi       = {10.1007/BFb0024547},
  timestamp = {Sat, 20 May 2017 15:32:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/Needham91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BurrowsAN90,
  author    = {Michael Burrows and
               Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {Rejoinder to Nessett},
  journal   = {Operating Systems Review},
  volume    = {24},
  number    = {2},
  pages     = {39--40},
  year      = {1990},
  url       = {https://doi.org/10.1145/382258.382790},
  doi       = {10.1145/382258.382790},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/BurrowsAN90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BurrowsAN90,
  author    = {Michael Burrows and
               Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {A Logic of Authentication},
  journal   = {{ACM} Trans. Comput. Syst.},
  volume    = {8},
  number    = {1},
  pages     = {18--36},
  year      = {1990},
  url       = {https://doi.org/10.1145/77648.77649},
  doi       = {10.1145/77648.77649},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tocs/BurrowsAN90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GongNY90,
  author    = {Li Gong and
               Roger M. Needham and
               Raphael Yahalom},
  title     = {Reasoning about Belief in Cryptographic Protocols},
  booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, May 7-9, 1990},
  pages     = {234--248},
  year      = {1990},
  crossref  = {DBLP:conf/sp/1990},
  url       = {https://doi.org/10.1109/RISP.1990.63854},
  doi       = {10.1109/RISP.1990.63854},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/GongNY90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamH89,
  author    = {Roger M. Needham and
               Andrew Herbert},
  title     = {Report on the Third European {SIGOPS} Workshop "Autonomy or Interdependence
               in Distributed Systems", September 19-21, 1988, Ca, bridge, England},
  journal   = {Operating Systems Review},
  volume    = {23},
  number    = {2},
  pages     = {3--19},
  year      = {1989},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/NeedhamH89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurrowsAN89,
  author    = {Michael Burrows and
               Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {The Scope of a Logic of Authentication},
  booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  pages     = {119--126},
  year      = {1989},
  crossref  = {DBLP:conf/dimacs/dimacs2},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dimacs/BurrowsAN89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdos/BaconLN89,
  author    = {Jean Bacon and
               Ian M. Leslie and
               Roger M. Needham},
  title     = {Distributed Computing with a Processor Bank},
  booktitle = {Process in Distributed Operating Systems and Distributed Systems Management,
               European Workshop, Berlin, Germany, April 18-19, 1889},
  pages     = {147--161},
  year      = {1989},
  crossref  = {DBLP:conf/pdos/1989},
  url       = {https://doi.org/10.1007/3-540-52609-9\_82},
  doi       = {10.1007/3-540-52609-9\_82},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdos/BaconLN89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BurrowsAN89,
  author    = {Michael Burrows and
               Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {A Logic of Authentication},
  booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
               {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
               1989},
  pages     = {1--13},
  year      = {1989},
  crossref  = {DBLP:conf/sosp/1989},
  url       = {https://doi.org/10.1145/74850.74852},
  doi       = {10.1145/74850.74852},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/BurrowsAN89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LomasGSN89,
  author    = {T. Mark A. Lomas and
               Li Gong and
               Jerome H. Saltzer and
               Roger M. Needham},
  title     = {Reducing Risks from Poorly Chosen Keys},
  booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
               {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
               1989},
  pages     = {14--18},
  year      = {1989},
  crossref  = {DBLP:conf/sosp/1989},
  url       = {https://doi.org/10.1145/74850.74853},
  doi       = {10.1145/74850.74853},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/LomasGSN89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GiffordNS88,
  author    = {David K. Gifford and
               Roger M. Needham and
               Michael D. Schroeder},
  title     = {The Cedar System},
  journal   = {Commun. {ACM}},
  volume    = {31},
  number    = {3},
  pages     = {288--298},
  year      = {1988},
  url       = {https://doi.org/10.1145/42392.42398},
  doi       = {10.1145/42392.42398},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/GiffordNS88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamB88,
  author    = {Roger M. Needham and
               Michael Burrows},
  title     = {Locks in Distributed Systems - Observations},
  journal   = {Operating Systems Review},
  volume    = {22},
  number    = {3},
  pages     = {44},
  year      = {1988},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/NeedhamB88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HopperN88,
  author    = {Andrew Hopper and
               Roger M. Needham},
  title     = {The Cambridge Fast Ring Networking System},
  journal   = {{IEEE} Trans. Computers},
  volume    = {37},
  number    = {10},
  pages     = {1214--1223},
  year      = {1988},
  url       = {https://doi.org/10.1109/12.5983},
  doi       = {10.1109/12.5983},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tc/HopperN88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tark/BurrowsAN88,
  author    = {Michael Burrows and
               Mart{\'{\i}}n Abadi and
               Roger M. Needham},
  title     = {Authentication: {A} Practical Study in Belief and Action},
  booktitle = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning
               about Knowledge, Pacific Grove, CA, USA, March 1988},
  pages     = {325--342},
  year      = {1988},
  crossref  = {DBLP:conf/tark/1988},
  timestamp = {Thu, 21 Jun 2018 07:50:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tark/BurrowsAN88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamS87,
  author    = {Roger M. Needham and
               Michael D. Schroeder},
  title     = {Authentication Revisited},
  journal   = {Operating Systems Review},
  volume    = {21},
  number    = {1},
  pages     = {7},
  year      = {1987},
  url       = {https://doi.org/10.1145/24592.24593},
  doi       = {10.1145/24592.24593},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/NeedhamS87},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/BirrellLNS86,
  author    = {Andrew Birrell and
               Butler W. Lampson and
               Roger M. Needham and
               Michael D. Schroeder},
  title     = {Current work on authentication},
  booktitle = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam,
               Netherlands, September 8-10, 1986},
  year      = {1986},
  crossref  = {DBLP:conf/sigopsE/1986},
  url       = {https://doi.org/10.1145/503956.503966},
  doi       = {10.1145/503956.503966},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigopsE/BirrellLNS86},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/Needham86,
  author    = {Roger M. Needham},
  title     = {On making distributed systems that work},
  booktitle = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam,
               Netherlands, September 8-10, 1986},
  year      = {1986},
  crossref  = {DBLP:conf/sigopsE/1986},
  url       = {https://doi.org/10.1145/503956.503993},
  doi       = {10.1145/503956.503993},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigopsE/Needham86},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BirrellLNS86,
  author    = {Andrew Birrell and
               Butler W. Lampson and
               Roger M. Needham and
               Michael D. Schroeder},
  title     = {A Global Authentication Service without Global Trust},
  booktitle = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, April 7-9, 1986},
  pages     = {223--230},
  year      = {1986},
  crossref  = {DBLP:conf/sp/1986},
  url       = {https://doi.org/10.1109/SP.1986.10009},
  doi       = {10.1109/SP.1986.10009},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/BirrellLNS86},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SchroederGN85,
  author    = {Michael D. Schroeder and
               David K. Gifford and
               Roger M. Needham},
  title     = {A Caching File System For a Programmer's Workstation},
  booktitle = {Proceedings of the Tenth {ACM} Symposium on Operating System Principles,
               {SOSP} 1985, Orcas Island, Washington, USA, December 1-4, 1985},
  pages     = {25--34},
  year      = {1985},
  crossref  = {DBLP:conf/sosp/1985},
  url       = {https://doi.org/10.1145/323647.323632},
  doi       = {10.1145/323647.323632},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/SchroederGN85},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/LeslieNBA84,
  author    = {Ian M. Leslie and
               Roger M. Needham and
               John W. Burren and
               Graham C. Adams},
  title     = {The architecture of the universe network},
  journal   = {Computer Communication Review},
  volume    = {14},
  number    = {2},
  pages     = {2--9},
  year      = {1984},
  url       = {https://doi.org/10.1145/800056.802053},
  doi       = {10.1145/800056.802053},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/LeslieNBA84},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/WatersALN84,
  author    = {A. Gill Waters and
               Christopher J. Adams and
               Ian M. Leslie and
               Roger M. Needham},
  title     = {The use of broadcast techniques on the universe network},
  journal   = {Computer Communication Review},
  volume    = {14},
  number    = {2},
  pages     = {52--57},
  year      = {1984},
  url       = {https://doi.org/10.1145/800056.802059},
  doi       = {10.1145/800056.802059},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/WatersALN84},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/SchroederBN84,
  author    = {Michael D. Schroeder and
               Andrew Birrell and
               Roger M. Needham},
  title     = {Experience with Grapevine: The Growth of a Distributed System},
  journal   = {{ACM} Trans. Comput. Syst.},
  volume    = {2},
  number    = {1},
  pages     = {3--23},
  year      = {1984},
  url       = {https://doi.org/10.1145/2080.2081},
  doi       = {10.1145/2080.2081},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tocs/SchroederBN84},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/NeedhamHM83,
  author    = {Roger M. Needham and
               A. J. Herbert and
               James G. Mitchell},
  title     = {How to Connect Stable Memory to a Computer},
  journal   = {Operating Systems Review},
  volume    = {17},
  number    = {1},
  pages     = {16},
  year      = {1983},
  url       = {https://doi.org/10.1145/850733.850736},
  doi       = {10.1145/850733.850736},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/NeedhamHM83},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Needham83,
  author    = {Roger M. Needham},
  title     = {Protection},
  booktitle = {Local Area Networks: An Advanced Course, Glasgow, UK, July 11-22,
               1983, Proceedings},
  pages     = {260--281},
  year      = {1983},
  crossref  = {DBLP:conf/ac/1983lan},
  url       = {https://doi.org/10.1007/3-540-15191-5\_23},
  doi       = {10.1007/3-540-15191-5\_23},
  timestamp = {Tue, 19 Jun 2018 18:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ac/Needham83},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/RichardsonN83,
  author    = {M. F. Richardson and
               Roger M. Needham},
  title     = {The {TRIPOS} Filing Machine, a Front End to a File Server},
  booktitle = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles,
               {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983},
  pages     = {120--128},
  year      = {1983},
  crossref  = {DBLP:conf/sosp/1983},
  url       = {https://doi.org/10.1145/800217.806620},
  doi       = {10.1145/800217.806620},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/RichardsonN83},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SchroederBN83,
  author    = {Michael D. Schroeder and
               Andrew Birrell and
               Roger M. Needham},
  title     = {Experience with Grapevine: The Growth of a Distributed System (Summary)},
  booktitle = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles,
               {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983},
  pages     = {141--142},
  year      = {1983},
  crossref  = {DBLP:conf/sosp/1983},
  url       = {https://doi.org/10.1145/800217.806622},
  doi       = {10.1145/800217.806622},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/SchroederBN83},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BirrellLNS82,
  author    = {Andrew Birrell and
               Roy Levin and
               Roger M. Needham and
               Michael D. Schroeder},
  title     = {Grapevine: An Exercise in Distributed Computing},
  journal   = {Commun. {ACM}},
  volume    = {25},
  number    = {4},
  pages     = {260--274},
  year      = {1982},
  url       = {https://doi.org/10.1145/358468.358487},
  doi       = {10.1145/358468.358487},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/BirrellLNS82},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/Needham81,
  author    = {Roger M. Needham},
  title     = {Design Considerations for a Processing Server},
  booktitle = {Proceedings of the 8th Annual Symposium on Computer Architecture,
               Minneapolis, MN, USA, May 1981},
  pages     = {501--504},
  year      = {1981},
  crossref  = {DBLP:conf/isca/1981},
  url       = {http://dl.acm.org/citation.cfm?id=801900},
  timestamp = {Mon, 09 Jul 2018 08:55:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isca/Needham81},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/HerbertN81,
  author    = {A. J. Herbert and
               Roger M. Needham},
  title     = {Sequencing Computation Steps in a Network},
  booktitle = {Proceedings of the Eighth Symposium on Operating System Principles,
               {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California,
               USA, December 14-16, 1981},
  pages     = {59--63},
  year      = {1981},
  crossref  = {DBLP:conf/sosp/1981},
  url       = {https://doi.org/10.1145/800216.806592},
  doi       = {10.1145/800216.806592},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/HerbertN81},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BirrellLNS81,
  author    = {Andrew Birrell and
               Roy Levin and
               Roger M. Needham and
               Michael D. Schroeder},
  title     = {Gravevine: An Exercise in Distributed Computing (summary)},
  booktitle = {Proceedings of the Eighth Symposium on Operating System Principles,
               {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California,
               USA, December 14-16, 1981},
  pages     = {178--179},
  year      = {1981},
  crossref  = {DBLP:conf/sosp/1981},
  url       = {https://doi.org/10.1145/800216.806606},
  doi       = {10.1145/800216.806606},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/BirrellLNS81},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/WilkesN80,
  author    = {Maurice V. Wilkes and
               Roger M. Needham},
  title     = {The Cambridge Model Distributed System},
  journal   = {Operating Systems Review},
  volume    = {14},
  number    = {1},
  pages     = {21--29},
  year      = {1980},
  url       = {https://doi.org/10.1145/850693.850695},
  doi       = {10.1145/850693.850695},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/WilkesN80},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/GarnettN80,
  author    = {N. H. Garnett and
               Roger M. Needham},
  title     = {An Asynchronous Garbage Collector for the Cambridge File Server},
  journal   = {Operating Systems Review},
  volume    = {14},
  number    = {4},
  pages     = {36--40},
  year      = {1980},
  url       = {https://doi.org/10.1145/850708.850711},
  doi       = {10.1145/850708.850711},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/GarnettN80},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BirrellN80,
  author    = {Andrew Birrell and
               Roger M. Needham},
  title     = {A Universal File Server},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {6},
  number    = {5},
  pages     = {450--453},
  year      = {1980},
  url       = {https://doi.org/10.1109/TSE.1980.230493},
  doi       = {10.1109/TSE.1980.230493},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tse/BirrellN80},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/Needham80,
  author    = {Roger M. Needham},
  title     = {Capabilities and Protection},
  booktitle = {{GI} - 10. Jahrestagung, Saarbr{\"{u}}cken, 30. September - 2.
               Oktober 1980, Proceedings},
  pages     = {45--53},
  year      = {1980},
  crossref  = {DBLP:conf/gi/1980},
  url       = {https://doi.org/10.1007/978-3-642-67838-7\_3},
  doi       = {10.1007/978-3-642-67838-7\_3},
  timestamp = {Tue, 23 May 2017 01:10:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gi/Needham80},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Needham79,
  author    = {Roger M. Needham},
  title     = {Adding Capability to Conventional File Servers},
  journal   = {Operating Systems Review},
  volume    = {13},
  number    = {1},
  pages     = {3--4},
  year      = {1979},
  url       = {https://doi.org/10.1145/850652.850653},
  doi       = {10.1145/850652.850653},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/Needham79},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/LauerN79,
  author    = {Hugh C. Lauer and
               Roger M. Needham},
  title     = {On the Duality of Operating System Structures},
  journal   = {Operating Systems Review},
  volume    = {13},
  number    = {2},
  pages     = {3--19},
  year      = {1979},
  url       = {https://doi.org/10.1145/850657.850658},
  doi       = {10.1145/850657.850658},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/LauerN79},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham79,
  author    = {Roger M. Needham},
  title     = {Systems Aspects of the Cambridge Ring},
  booktitle = {Proceedings of the Seventh Symposium on Operating System Principles,
               {SOSP} 1979, Asilomar Conference Grounds, Pacific Grove, California,
               USA, 10-12, December 1979},
  pages     = {82--85},
  year      = {1979},
  crossref  = {DBLP:conf/sosp/1979},
  url       = {https://doi.org/10.1145/800215.806573},
  doi       = {10.1145/800215.806573},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/Needham79},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/NeedhamS78,
  author    = {Roger M. Needham and
               Michael D. Schroeder},
  title     = {Using Encryption for Authentication in Large Networks of Computers},
  journal   = {Commun. {ACM}},
  volume    = {21},
  number    = {12},
  pages     = {993--999},
  year      = {1978},
  url       = {https://doi.org/10.1145/359657.359659},
  doi       = {10.1145/359657.359659},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/NeedhamS78},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BirrellN78,
  author    = {Andrew Birrell and
               Roger M. Needham},
  title     = {An Asynchronous Garbage Collector for the {CAP} Filing System},
  journal   = {Operating Systems Review},
  volume    = {12},
  number    = {2},
  pages     = {31--33},
  year      = {1978},
  url       = {https://doi.org/10.1145/775332.775338},
  doi       = {10.1145/775332.775338},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/BirrellN78},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BirrellN78a,
  author    = {Andrew Birrell and
               Roger M. Needham},
  title     = {Character Streams},
  journal   = {Operating Systems Review},
  volume    = {12},
  number    = {3},
  pages     = {29--31},
  year      = {1978},
  url       = {https://doi.org/10.1145/775396.775399},
  doi       = {10.1145/775396.775399},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/BirrellN78a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamW77,
  author    = {Roger M. Needham and
               R. D. H. Walker},
  title     = {The Cambridge {CAP} Computer and its Protection System},
  booktitle = {Proceedings of the Sixth Symposium on Operating System Principles,
               {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
               16-18, 1977},
  pages     = {1--10},
  year      = {1977},
  crossref  = {DBLP:conf/sosp/1977},
  url       = {https://doi.org/10.1145/800214.806541},
  doi       = {10.1145/800214.806541},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/NeedhamW77},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamB77,
  author    = {Roger M. Needham and
               Andrew Birrell},
  title     = {The Cap Filing System},
  booktitle = {Proceedings of the Sixth Symposium on Operating System Principles,
               {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
               16-18, 1977},
  pages     = {11--16},
  year      = {1977},
  crossref  = {DBLP:conf/sosp/1977},
  url       = {https://doi.org/10.1145/800214.806542},
  doi       = {10.1145/800214.806542},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/NeedhamB77},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham77,
  author    = {Roger M. Needham},
  title     = {The {CAP} Project - An Interim Evaluation},
  booktitle = {Proceedings of the Sixth Symposium on Operating System Principles,
               {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
               16-18, 1977},
  pages     = {17--22},
  year      = {1977},
  crossref  = {DBLP:conf/sosp/1977},
  url       = {https://doi.org/10.1145/800214.806543},
  doi       = {10.1145/800214.806543},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/Needham77},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NeedhamW74,
  author    = {Roger M. Needham and
               Maurice V. Wilkes},
  title     = {Domains of Protection and the Management of Processes},
  journal   = {Comput. J.},
  volume    = {17},
  number    = {2},
  pages     = {117--120},
  year      = {1974},
  url       = {https://doi.org/10.1093/comjnl/17.2.117},
  doi       = {10.1093/comjnl/17.2.117},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/NeedhamW74},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/Needham73,
  author    = {Roger M. Needham},
  title     = {Note on evaluation},
  journal   = {Information Storage and Retrieval},
  volume    = {9},
  number    = {8},
  pages     = {474},
  year      = {1973},
  url       = {https://doi.org/10.1016/0020-0271(73)90098-3},
  doi       = {10.1016/0020-0271(73)90098-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipm/Needham73},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/Needham72,
  author    = {Roger M. Needham},
  title     = {Protection systems and protection implementations},
  booktitle = {American Federation of Information Processing Societies: Proceedings
               of the {AFIPS} '72 Fall Joint Computer Conference, December 5-7, 1972,
               Anaheim, California, {USA} - Part {I}},
  pages     = {571--578},
  year      = {1972},
  crossref  = {DBLP:conf/afips/1972f1},
  url       = {https://doi.org/10.1145/1479992.1480073},
  doi       = {10.1145/1479992.1480073},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/afips/Needham72},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/LandyN71,
  author    = {B. Landy and
               Roger M. Needham},
  title     = {Software Engineering Techniques used in the Development of the Cambridge
               Multiple-Access System},
  journal   = {Softw., Pract. Exper.},
  volume    = {1},
  number    = {2},
  pages     = {167--173},
  year      = {1971},
  url       = {https://doi.org/10.1002/spe.4380010207},
  doi       = {10.1002/spe.4380010207},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/spe/LandyN71},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Needham71,
  author    = {Roger M. Needham},
  title     = {Handling Difficult Faults in Operating Systems},
  booktitle = {Proceedings of the Third Symposium on Operating System Principles,
               {SOSP} 1971, Stanford University, Palo Alto, California, USA, October
               18-20, 1971},
  pages     = {55--57},
  year      = {1971},
  crossref  = {DBLP:conf/sosp/1971},
  url       = {https://doi.org/10.1145/800212.806499},
  doi       = {10.1145/800212.806499},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/Needham71},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/NeedhamH69,
  author    = {Roger M. Needham and
               D. F. Hartley},
  title     = {Theory and practice in operating system design},
  booktitle = {Proceedings of the Second Symposium on Operating Systems Principles,
               {SOSP} 1969, Princeton, NJ, USA, October 20-22, 1969},
  pages     = {8--12},
  year      = {1969},
  crossref  = {DBLP:conf/sosp/1969},
  url       = {https://doi.org/10.1145/961053.961058},
  doi       = {10.1145/961053.961058},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/NeedhamH69},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/JonesN68,
  author    = {Karen Sparck Jones and
               Roger M. Needham},
  title     = {Automatic term classifications and retrieval},
  journal   = {Information Storage and Retrieval},
  volume    = {4},
  number    = {2},
  pages     = {91--100},
  year      = {1968},
  url       = {https://doi.org/10.1016/0020-0271(68)90013-2},
  doi       = {10.1016/0020-0271(68)90013-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipm/JonesN68},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/BarronFHLN67,
  author    = {D. W. Barron and
               A. G. Fraser and
               D. F. Hartley and
               B. Landy and
               Roger M. Needham},
  title     = {File handling at Cambridge University},
  booktitle = {American Federation of Information Processing Societies: Proceedings
               of the {AFIPS} '67 Spring Joint Computer Conference, April 18-20,
               1967, Atlantic City, New Jersey, {USA}},
  pages     = {163--167},
  year      = {1967},
  crossref  = {DBLP:conf/afips/1967s},
  url       = {https://doi.org/10.1145/1465482.1465508},
  doi       = {10.1145/1465482.1465508},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/afips/BarronFHLN67},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mtcl/Needham65,
  author    = {Roger M. Needham},
  title     = {Applications of the theory of clumps},
  journal   = {Mech. Translat. {\&} Comp. Linguistics},
  volume    = {8},
  number    = {3-4},
  pages     = {113--127},
  year      = {1965},
  url       = {http://www.mt-archive.info/MT-1965-Needham.pdf},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mtcl/Needham65},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Needham62,
  author    = {Roger M. Needham},
  title     = {A Method for Using Computers in Information Classification},
  booktitle = {{IFIP} Congress},
  pages     = {284--287},
  year      = {1962},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ifip/Needham62},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Parker-RhodesN59,
  author    = {A. F. Parker{-}Rhodes and
               Roger M. Needham},
  title     = {A reduction method for non-arithmetic data, and its application to
               thesauric translation},
  booktitle = {{IFIP} Congress},
  pages     = {321--325},
  year      = {1959},
  timestamp = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ifip/Parker-RhodesN59},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2002,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               James A. Malcolm and
               Michael Roe},
  title     = {Security Protocols, 10th International Workshop, Cambridge, UK, April
               17-19, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2845},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b94819},
  doi       = {10.1007/b94819},
  isbn      = {3-540-20830-5},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2001,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               James A. Malcolm and
               Michael Roe},
  title     = {Security Protocols, 9th International Workshop, Cambridge, UK, April
               25-27, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2467},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45807-7},
  doi       = {10.1007/3-540-45807-7},
  isbn      = {3-540-44263-4},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2000,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               Michael Roe},
  title     = {Security Protocols, 8th International Workshop, Cambridge, UK, April
               3-5, 2000, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2133},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44810-1},
  doi       = {10.1007/3-540-44810-1},
  isbn      = {3-540-42566-7},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1999,
  title     = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
               USA, May 9-12, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6220},
  isbn      = {0-7695-0176-1},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1999,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               James A. Malcolm and
               Michael Roe},
  title     = {Security Protocols, 7th International Workshop, Cambridge, UK, April
               19-21, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1796},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10720107},
  doi       = {10.1007/10720107},
  isbn      = {3-540-67381-4},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/1998,
  editor    = {David Aucsmith},
  title     = {Information Hiding, Second International Workshop, Portland, Oregon,
               USA, April 14-17, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1525},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49380-8},
  doi       = {10.1007/3-540-49380-8},
  isbn      = {3-540-65386-4},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lics/1998,
  title     = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
               Indiana, USA, June 21-24, 1998},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5684},
  isbn      = {0-8186-8506-9},
  timestamp = {Fri, 21 Nov 2014 14:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lics/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1998,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               William S. Harbison and
               Michael Roe},
  title     = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1550},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49135-X},
  doi       = {10.1007/3-540-49135-X},
  isbn      = {3-540-65663-4},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1995,
  editor    = {Don Coppersmith},
  title     = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {963},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-44750-4},
  doi       = {10.1007/3-540-44750-4},
  isbn      = {3-540-60221-6},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1995},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/CStoday1995,
  editor    = {Jan van Leeuwen},
  title     = {Computer Science Today: Recent Trends and Developments},
  series    = {Lecture Notes in Computer Science},
  volume    = {1000},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0015232},
  doi       = {10.1007/BFb0015232},
  isbn      = {3-540-60105-8},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/CStoday1995},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1994,
  editor    = {Bart Preneel},
  title     = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
               14-16 December 1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1008},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-60590-8},
  doi       = {10.1007/3-540-60590-8},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1994,
  title     = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  publisher = {{IEEE} Computer Society},
  year      = {1994},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=968},
  isbn      = {0-8186-5675-1},
  timestamp = {Mon, 12 Jan 2015 17:20:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1993,
  editor    = {Dorothy E. Denning and
               Raymond Pyle and
               Ravi Ganesan and
               Ravi S. Sandhu and
               Victoria Ashby},
  title     = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  publisher = {{ACM}},
  year      = {1993},
  url       = {http://dl.acm.org/citation.cfm?id=168588},
  isbn      = {0-89791-629-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1993},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nossdav/1992,
  editor    = {P. Venkat Rangan},
  title     = {Network and Operating System Support for Digital Audio and Video,
               Third International Workshop, La Jolla, California, USA, November
               12-13, 1992, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {712},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/3-540-57183-3},
  doi       = {10.1007/3-540-57183-3},
  isbn      = {3-540-57183-3},
  timestamp = {Sat, 20 May 2017 15:32:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nossdav/1992},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/1991os,
  editor    = {Arthur I. Karshmer and
               J{\"{u}}rgen Nehmer},
  title     = {Operating Systems of the 90s and Beyond, International Workshop, Dagstuhl
               Castle, Germany, July 8-12, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {563},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/BFb0024513},
  doi       = {10.1007/BFb0024513},
  isbn      = {3-540-54987-0},
  timestamp = {Sat, 20 May 2017 15:32:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/1991os},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1990,
  title     = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, May 7-9, 1990},
  publisher = {{IEEE} Computer Society},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=300},
  isbn      = {0-8186-2060-9},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs2,
  editor    = {Joan Feigenbaum and
               Michael Merritt},
  title     = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {2},
  publisher = {{DIMACS/AMS}},
  year      = {1991},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol02.html},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dimacs/dimacs2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pdos/1989,
  editor    = {Wolfgang Schr{\"{o}}der{-}Preikschat and
               Wolfgang Zimmer},
  title     = {Process in Distributed Operating Systems and Distributed Systems Management,
               European Workshop, Berlin, Germany, April 18-19, 1889},
  series    = {Lecture Notes in Computer Science},
  volume    = {433},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/3-540-52609-9},
  doi       = {10.1007/3-540-52609-9},
  isbn      = {3-540-52609-9},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdos/1989},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1989,
  editor    = {Gregory R. Andrews},
  title     = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
               {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
               1989},
  publisher = {{ACM}},
  year      = {1989},
  url       = {https://doi.org/10.1145/74850},
  doi       = {10.1145/74850},
  isbn      = {0-89791-338-8},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1989},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tark/1988,
  editor    = {Moshe Y. Vardi},
  title     = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning
               about Knowledge, Pacific Grove, CA, USA, March 1988},
  publisher = {Morgan Kaufmann},
  year      = {1988},
  isbn      = {0-934613-66-4},
  timestamp = {Thu, 21 Jun 2018 07:50:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tark/1988},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigopsE/1986,
  title     = {Proceedings of the 2nd {ACM} {SIGOPS} European Workshop, Amsterdam,
               Netherlands, September 8-10, 1986},
  publisher = {{ACM}},
  year      = {1986},
  timestamp = {Wed, 04 Feb 2004 15:49:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigopsE/1986},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1986,
  title     = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, April 7-9, 1986},
  publisher = {{IEEE} Computer Society},
  year      = {1986},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6234845},
  isbn      = {0-8186-0716-5},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1986},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1985,
  editor    = {Forest Baskett and
               Andrew Birrell and
               David R. Cheriton},
  title     = {Proceedings of the Tenth {ACM} Symposium on Operating System Principles,
               {SOSP} 1985, Orcas Island, Washington, USA, December 1-4, 1985},
  publisher = {{ACM}},
  year      = {1985},
  url       = {https://doi.org/10.1145/323647},
  doi       = {10.1145/323647},
  isbn      = {0-89791-174-1},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1985},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1983lan,
  editor    = {David Hutchison and
               John A. Mariani and
               Doug Shepherd},
  title     = {Local Area Networks: An Advanced Course, Glasgow, UK, July 11-22,
               1983, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {184},
  publisher = {Springer},
  year      = {1985},
  url       = {https://doi.org/10.1007/3-540-15191-5},
  doi       = {10.1007/3-540-15191-5},
  isbn      = {3-540-15191-5},
  timestamp = {Tue, 19 Jun 2018 18:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ac/1983lan},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1983,
  editor    = {Jerome H. Saltzer and
               Roy Levin and
               David D. Redell},
  title     = {Proceedings of the Ninth {ACM} Symposium on Operating System Principles,
               {SOSP} 1983, Bretton Woods, New Hampshire, USA, October 10-13, 1983},
  publisher = {{ACM}},
  year      = {1983},
  url       = {https://doi.org/10.1145/800217},
  doi       = {10.1145/800217},
  isbn      = {0-89791-115-6},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1983},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/1981,
  editor    = {Richard Y. Kain and
               William R. Franta},
  title     = {Proceedings of the 8th Annual Symposium on Computer Architecture,
               Minneapolis, MN, USA, May 1981},
  publisher = {{IEEE} Computer Society},
  year      = {1981},
  url       = {http://dl.acm.org/citation.cfm?id=800052},
  timestamp = {Mon, 09 Jul 2018 08:55:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isca/1981},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1981,
  editor    = {John Howard and
               David P. Reed},
  title     = {Proceedings of the Eighth Symposium on Operating System Principles,
               {SOSP} 1981, Asilomar Conference Grounds, Pacific Grove, California,
               USA, December 14-16, 1981},
  publisher = {{ACM}},
  year      = {1981},
  url       = {https://doi.org/10.1145/800216},
  doi       = {10.1145/800216},
  isbn      = {0-89791-062-1},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1981},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gi/1980,
  editor    = {Reinhard Wilhelm},
  title     = {{GI} - 10. Jahrestagung, Saarbr{\"{u}}cken, 30. September - 2.
               Oktober 1980, Proceedings},
  series    = {Informatik-Fachberichte},
  volume    = {33},
  publisher = {Springer},
  year      = {1980},
  url       = {https://doi.org/10.1007/978-3-642-67838-7},
  doi       = {10.1007/978-3-642-67838-7},
  isbn      = {3-540-10388-0},
  timestamp = {Tue, 23 May 2017 01:10:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gi/1980},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1979,
  editor    = {Michael D. Schroeder and
               Anita K. Jones},
  title     = {Proceedings of the Seventh Symposium on Operating System Principles,
               {SOSP} 1979, Asilomar Conference Grounds, Pacific Grove, California,
               USA, 10-12, December 1979},
  publisher = {{ACM}},
  year      = {1979},
  url       = {https://doi.org/10.1145/800215},
  doi       = {10.1145/800215},
  isbn      = {0-89791-009-5},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1979},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1977,
  editor    = {Saul Rosen and
               Peter J. Denning},
  title     = {Proceedings of the Sixth Symposium on Operating System Principles,
               {SOSP} 1977, Purdue University, West Lafayette, Indiana, USA, November
               16-18, 1977},
  publisher = {{ACM}},
  year      = {1977},
  url       = {https://doi.org/10.1145/800214},
  doi       = {10.1145/800214},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1977},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/afips/1972f1,
  title     = {American Federation of Information Processing Societies: Proceedings
               of the {AFIPS} '72 Fall Joint Computer Conference, December 5-7, 1972,
               Anaheim, California, {USA} - Part {I}},
  series    = {{AFIPS} Conference Proceedings},
  volume    = {41},
  publisher = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}},
  year      = {1972},
  url       = {http://dl.acm.org/citation.cfm?id=1479992},
  timestamp = {Mon, 18 Feb 2013 13:53:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/afips/1972f1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1971,
  editor    = {Edward J. McCluskey and
               Nicholas A. Fortis and
               Butler W. Lampson and
               Thomas H. Bredt},
  title     = {Proceedings of the Third Symposium on Operating System Principles,
               {SOSP} 1971, Stanford University, Palo Alto, California, USA, October
               18-20, 1971},
  publisher = {{ACM}},
  year      = {1972},
  url       = {https://doi.org/10.1145/800212},
  doi       = {10.1145/800212},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1971},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/1969,
  editor    = {Peter J. Denning and
               Edward G. Coffman Jr.},
  title     = {Proceedings of the Second Symposium on Operating Systems Principles,
               {SOSP} 1969, Princeton, NJ, USA, October 20-22, 1969},
  publisher = {{ACM}},
  year      = {1969},
  url       = {https://doi.org/10.1145/961053},
  doi       = {10.1145/961053},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/1969},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/afips/1967s,
  title     = {American Federation of Information Processing Societies: Proceedings
               of the {AFIPS} '67 Spring Joint Computer Conference, April 18-20,
               1967, Atlantic City, New Jersey, {USA}},
  series    = {{AFIPS} Conference Proceedings},
  volume    = {30},
  publisher = {{AFIPS} / {ACM} / Thomson Book Company, Washington {D.C.}},
  year      = {1967},
  timestamp = {Fri, 28 Mar 2014 11:30:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/afips/1967s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier