HTML updated 12/01/94

archive-name: multics/bibliography

01/10/95 THVV Two more references from Prof. Fano
01/13/95 THVV Added several papers by Saltzer from his www page
03/14/95 THVV Added available online section 
04/04/95 THVV Added Berstel book & some other papers

Please post updates to alt.os.multics or mail to <thvv@best.com>

I regret that I do not have the time to copy, scan, OCR, convert, or mail 
copies of these documents.  I don't even have copies of all of them.  
 -- tom

================Materials available online

* The Charles Babbage Institute at the University of Minnesota has a
  collection of oral interviews with computer pioneers, including Corby,
  Licklider, and others who made Multics possible, and pointers to other
  historical information.


* MIT Laboratory for Computer Science has an on-line list of MAC and LCS
  publications available via FTP.


* An index of 770 Multics Technical Bulletins from 1973 to 1987 (100K,
  08/17/96) is available online.
* Paul McJones has a fine summary description of MRDS on his System R web
  site.



Papers and books


* Adleman, N., Effects of Producing a Multics Security Kernel. Honeywell
  Information Systems Inc., Mclean Va Federal Systems Operations (NTIS AD
  -A031 220/7), October 1975.
* Adleman, N., Engineering Investigations in Support of Multics Security
  Kernel Software Development, Honeywell Information Systems Inc., Mclean
  Va Federal Systems Operations. (NTIS AD-A040 329/5), October 19, 1976.
* Adleman, N., J. R. Gilson, R. J. Sestak, and R. J. Ziller, Security
  Kernel Evaluation for Multics and Secure Multics Design, Development
  and Certification. Semi-annual progress rept. 1 Jan-30 June 76,
  Honeywell Information Systems Inc., Mclean Va Federal Systems
  Operations (NTIS AD-A038 261/4), August 1976.
* Adleman, N., J. R. Gilson, R. J. Sestak, and R. J. Ziller, Semi-Annual
  Progress Report July 1975 to December 1975. Honeywell Information
  Systems Inc., Mclean Va Federal Systems Operations (NTIS AD-A037
  501/4), January 1976.
* Adleman, N., R. J. Ziller, and J. C. Whitmore, Multics Security
  Integration Requirements, 1 January 1976-31 December 1980. Honeywell
  Information Systems Inc., Mclean Va Federal Systems Operations (NTIS AD
  -A041 514/1), March 1976.
* Ames, Stanley R. , Jr., and D. K. Kallman, Multics Security Kernel
  Validation: Proof Description, Volume I. MITRE Corp Bedford MA (NTIS AD
  -A056 901/2), July 1978.
* Ames, Stanley R. , Jr., and J. G. Keeton-Williams, Demonstrating
  security for trusted applications on a security kernel base. IEEE Comp.
  Soc. Proc. 1980 Symp. Security and Privacy, April 1980.
* Ames, Stanley R. , Jr., and Jonathan K. Millen, Interface Verification
  for a Security Kernel. 1978. System Reliability and Integrity, Vol 2,
  Infotech State of the Art report pp.1-21
* Ames, Stanley R. , Jr., and Peter G. Neumann, Computer Security
  Technology: Introduction. IEEE Computer 16(7) p.11, July 1983.
* Anderson, James P., Multics Evaluation. Anderson (James P) and Co Fort
  Washington Pa (NTIS AD-777 593/5), October 1973.
* Benedict, G. G., An Enciphering Module for Multics. (NTIS AD-782
  658/9), 1974 Jul.
* Banatre, Jean-Pierre, Banatre, Michel, Lapalme, Guy and Ployette,
  Florimond, The design and building of Enchere, a distributed electronic
  marketing system, Commun. ACM 29, 1 (Jan. 1986), 19-29.
* Bensoussan, A., C. T. Clingen, and R. C. Daley, The Multics virtual
  memory: concepts and design, Proc Second ACM SOSP, Princeton NJ,
  October 1969; Commun. ACM 15, 5, pp 308-318, May 1972.
* Bell, D. E. and L. J. LaPadula, Computer Security Model: Unified
  Exposition and Multics Interpretation, ESD-TR-75-306, Hanscom AFB, MA,
  1975. (also available as DTIC AD-A023588)
* Bell, D. E., and L. J. LaPadula, Secure Computer Systems: Unified
  Exposition and Multics Interpretation, Mitre Technical Report MTR-2997,
  rev 2, March 1976. (Also available as NTIS AD-A023 588/7)
* Berstel, J. Perrot, J.-F., MULTICS: guide de l'usager., Manuels
  informatiques Masson, Paris [etc.]: Masson, 1986.
* Biba, K. J., S. R. Ames, Jr., E. L. Burke, P. A. Karger, W. R. Price,
  R. R. Schell, W. L. Schiller, The top level specification of a Multics
  security kernel, WP-20377, MITRE Corp, Bedford MA, August 1975.
* Bull HN Information Systems Inc., Multics Data Security and Data
  Privacy, USA: Bull HN Information Systems.
* Clingen, C. T., Program naming problems in a shared tree-structured
  hierarchy, Proc Conf on Techniques in Software Engineering, October
  1969.
* Colijn, A. W., A note on the Multics command language, Software --
  Practice and Experience 11, 6, pp 741-744, Jul 1981.
* Corbato, F. J., A paging experiment with the Multics system, In Honor
  of P. M. Morse, MIT Press, Cambridge MA, 217-228, 1969.
* Corbato, F. J., and Clingen, C. T., A Managerial View of the Multics
  System Development, an article in the book Research Directions in
  Software Technology edited by P. Wegner, M.I.T. Press, 1979. (Also
  published in Tutorial: Software Management, Reifer, Donald J. (ed),
  IEEE Computer Society Press, l979; Second Edition l981; Third Edition,
  1986.)
* Corbato, F. J., and J. H. Saltzer, Some considerations of supervisor
  program design for multiplexed computer systems, Proc IFIP 4th Global
  Conf, Edinburgh, August 1968.
* Corbato, F. J., and V. A. Vyssotsky, Introduction and overview of the
  Multics system, AFIPS Conf Proc 27, 185-196, 1965.
* Corbato, F. J., C. T. Clingen, and J. H. Saltzer, Multics -- the first
  seven years, Proc SJCC, 571-583, May 1972.
* Corbato, F. J., M. M. Daggett, and R. C. Daley, An experimental time-
  sharing system, AFIPS Conf Proc 21, 335-344, 1962.
* Corbato, F. J., PL/I as a Tool for System Programming, Datamation 15,
  68-76, May 6, 1969.
* Corbato, F. J., Sensitive issues in the design of multi-use systems,
  MIT Project MAC MAC-M-383, December 1968.
* Corbato, F. J., On building systems that will fail (A. M. Turing Award
  lecture), Commun. ACM 34 No. 9, September 1991.
* Couleur, J. F., and E. L. Glaser, US Patent no 3,412,382, Shared-access
  data processing sytstem, filed November 26, 1965, awarded November 19,
  1968.
* Crisman, P. A., Ed, The compatible time-sharing system: a programmer's
  guide, 2nd ed, MIT Press, 1965.
* Daley, R. C., and J. B. Dennis, Virtual memory, processes, and sharing
  in Multics, Commun. ACM 11, 306-312, May 1968.
* Daley, R. C., and P. G. Neumann, A general-purpose file system for
  secondary storage, AFIPS Conf Proc 27, 212-230, 1965.
* Datapro, An Overview of Operating Systems Security, Datapro IS56-001,
  Datapro Reports on Information Security, June 1986.
* Datapro, Bull HN Information Systems Inc: Security Capabilities of
  Multics. USA: Datapro Research; IS56-115-101. Datapro Reports on
  Information Security; Vol 3, April 1989.
* David, E. E., Jr. and R. M. Fano, Some thoughts about the social
  implications of accessible computing, AFIPS Conf Proc 27, 243-248,
  1965.
* Denning, P. J., The working set model for program behavior, Commun. ACM
  11, 5, 323-333, May 1968.
* Denning, P. J., Virtual memory, Computing Surveys 2, 3, 153-189,
  September 1970.
* Dennis, J. B., A multiuser computation facility for education and
  research, Commun. ACM 7, 521-529, September 1964.
* Dennis, J. B., Segmentation and the design of multiprogrammed computer
  systems, IEEE Intl Convention Rec 3, 214-225, 1965.
* Deutsch, L. P. and B. W. Lampson, An online editor, (qed) Commun. ACM
  10, 12, pp 793-799, December 1967.
* Diamond, D. S., and L. L. Selwyn, Considerations for computer utility
  pricing policies, Proc ACM 23d Natl Conf, 189-200, 1968.
* Downey, P. J., MULTICS Security Evaluation: Password and File
  Encryption Techniques, US Air Force, Electronic Systems Div, Hanscom
  AFB Mass, (NTIS AD-A045 279/7), Jun 1977.
* Fano, R. M., and Elias, P., Project MAC 25th Anniversary, MIT LCS,
  1989.
* Fano, R. M., The computer utility and the community, 1967 IEEE Int
  Convention Record 12, 30-37, 1967.
* Fano, R. M., The MAC system: The computer utility approach, IEEE
  Spectrum 2, 56-64, January 1965.
* Fano, R. M., and F. J. Corbato, Time-sharing on computers, Scientific
  American 215, 3, September, 1966, pp. 129-140; also in Information, A
  Scientific American Book, W. H. Freeman & Co., pp. 76-95, 1966.
* Fano, R. M., Project MAC, Encyclopedia of Computer Science and
  Technology, Vol 12, Marcel Dekker, Inc. New York and Basel, 1979.
* Feiertag, R. J., and E. I. Organick, The Multics input/output system,
  ACM Third SOSP, 35-41, October 1971.
* Fenichel, R. R., and J. C. Yochelson, A LISP garbage collector for
  virtual memory computer systems, Commun. ACM 12, 611-612, 1969.
* Freiburghouse, R. A., A user's guide to the Multics FORTRAN compiler
  implementation, CISL, October 1969.
* Freiburghouse, R. A., The Multics PL/I compiler, Proc 1969 FJCC, 187-
  199, 1969.
* Frenkel, K. A., An interview with Fernando Jose Corbato, Commun. ACM 34
  No. 9, September 1991.
* Friesen, O. D. and J. A. Weeldreyer, Multics Integrated Data Store: An
  Implementation of a Network Data Base Manager Utilizing Relational Data
  Base Methodology, Proc 11th Hawaii Intl Conf on System Sciences, Vol 1,
  pp. 67-84, 1978.
* Friesen, O. D., N.S. Davids, and R. E. Brinegar, MRDS/LINUS: System
  Evaluation, in Relational Database Systems: Analysis and Comparison, J.
  W. Schmidt and M. L. Brodie, eds., Berlin, Springer-Verlag, 1983.
* Gasser, M., A Random Word Generator for Pronouncable Passwords MTR-
  3006, The Mitre Corporation, Bedford, MA 01730, ESD-TR-75-97, HQ
  Electronic Systems Division, Hanscom AFB, MA 01731
* Gifford, D., Hardware Estimation of a Process's Primary Memory
  Requirements, Commun. ACM, September 1977.
* Glaser, Edward L., A brief description of privacy measures in the
  Multics operating system, Proc AFIPS 1967 SJCC, pp 303-304.
* Glaser, E. L., J. F. Couleur, and G. A. Oliver, System design of a
  computer for time-sharing applications, AFIPS Conf Proc 27, 197-202,
  1965.
* Goldstein, R. C. and A. L. Strnad, The MacAIMS Data Management System,
  ACM SIGFIDET , Houston TX, 1970.
* Graham, R. M., Protection in an information processing utility, Commun.
  ACM 11, 5, 365-369, May 1968.
* Greenberg, B. S., Multics Emacs: an experiment in computer interaction,
  Proc Fourth Honeywell Software Conf, March 1980.
* Greenberg, B. S., Prose and CONS (Multics Emacs: production text-
  processing in Lisp), 1980.
* Greenberg, B. S., "Multics Emacs: The History, Design and
  Implementation", 1979.
* Greenberg, B. S., The Multics MACLISP Compiler. The Basic Hackery. A
  tutorial, 1977.
* Greenberg, B. S., and S. H. Webber, The Multics Multilevel Paging
  Hierarchy, Proc 1975 IEEE Intercon, 1975.
* Grochow, J. M., MOO in Multics, Software -- Practice and Experience 2,
  303-308, 1972.
* Grochow, J. M., Real-time graphic display of time-sharing system
  operating characteristics, AFIPS Conf Proc 35 (1969 FJCC), AFIPS Press,
  pp. 379-385, 1969.
* Honeywell, Design for Multics security enhancements, ESD-TR-74-176, ESD
  AFSC Hanscom AFB Mass, 1974.
* Honeywell, Prototype Secure MULTICS Specification. Preliminary draft,
  Honeywell Information Systems Inc., Mclean Va Federal Systems
  Operations, (NTIS AD-A055 166/3), January 1976.
* Honeywell, Multics Security Kernel Certification Plan, Honeywell
  Information Systems Inc Mclean Va Federal Systems Operations (NTIS AD-
  A055 171/3), July 1976.
* Ikeda, Katsuo, Structure of a computer utility: anatomy of Multics (in
  Japanese), 2nd ed, Shokoda Co Ltd, Tokyo, Japan, 1976.
* Iuorno, Normand, Rzepka, Kobziar, LaMonica, White, and McCauley,
  RADC/MULTICS evaluation, RADC-TR-71-121, May 1971.
* Jarvis, J. E., The many faces of Multics, 1973.
* Jones, Malcolm M., et. al., The SIMPL Primer, Oct 1971.
* Jordan, D. M., Multics Data Security, Scientific Honeyweller 2, 2, June
  1981.
* Kanodia, R. K., Performance improvement in ARPANET file transfers from
  Multics, RFC 662, Nov 1974.
* Karger, Paul A., and Roger R. Schell, Multics security evaluation:
  vulnerability anaysis, ESD-TR-74-193, Vol 2, (NTIS AD-A001 120/5),
  Electronic Systems Division, USAF, June 1974.
* Karger, Paul A. (Digital Equipment Corporation), New Methods for
  Immediate Revocation, in: Proc. 1989 IEEE Symposium on Security and
  Privacy, Oakland, California, USA: IEEE Computer Society, pp 48-55,
  May, 1989.
* Lackey, R. D., Penetration of Computer Systems, an Overview, Honeywell
  Computer Journal 8, 2, 1974.
* Landwehr, Carl E., The Best Available Technologies for Computer
  Security. IEEE Computer 16(7) pp.86-100, July 1983.
* Landwehr, Carl E., Bull, Alan R., McDermott, John P. and Choi, William
  S., A taxonomy of computer program security flaws, ACM Comput. Surv.
  26, 3 (Sept. 1994), 211-254.
* Lipner, S. B., Computer security research and development requirements,
  MTP-142, MITRE Corp, Bedford MA, February 1973.
* Margulies, Benson I. (Honeywell Information Systems), Security in a
  Multics environment, USA: Auerbach Publishers Inc. Honeywell
  Information Systems, 1985.
* McCarthy, J., A time-sharing operator program for our projected IBM
  709, MIT Computation Center memo, 1959.
* McClure, R. M., TMG -- a syntax directed compiler, Proc 20th ACM
  National Conf, 262-274, 1965.
* Montgomery, W. A., Measurements of Sharing in Multics, ACM SIGOPS OSR
  11(5) Proc. 6th Symp. OSP, November 1977.
* Mullen, R. E., Automated merging of software modifications, Proc
  Honeywell Software Productivity Symposium, April 1977.
* NCSC staff, Department of Defense Trusted Computer System Evaluation
  Criteria, DOD 5200.28-STD, (the "Orange Book"), December 1985.
* Neumann, P. G., The role of motherhood in the pop art of system
  programming, Proc Second ACM SOSP, October 1969.
* Organick, E. I., The Multics System: An Examination of its Structure,
  MIT Press, Cambridge MA, 1972.
* Ossanna, J. F., and J. H. Saltzer, Technical and human engineering
  problems in connecting terminals to a time-sharing system, AFIPS Conf
  Proc 37 (1970 FJCC), 355-362, 1970.
* Ossanna, J. F., L. Mikus, and S. D. Dunten, Communications and input-
  output switching in a multiplexed computing system, AFIPS Conf Proc 27,
  231-242, 1965.
* Padlipsky, M. A., New Multics network software features, RFC 411, Nov
  1972.
* Padlipsky, M. A., Multics sampling timeout change, RFC 450, Feb 1973.
* Padlipsky, M. A., Multics address change, RFC 590, Nov 1973.
* Pozzo, M. M. Life Cycle Assurance for Trusted Computer Systems: a
  Configuration Management Strategy for Multics, 7th DOD/NBS Computer
  Security Conf, September 1984.
* Pugh, Emerson, et al, IBMs 360 and early 370 systems.
* Reynolds, G. E., Multics Security Evaluation. Volume IV. Exemplary
  Performance Under Demanding Workload, Electronic Systems Div Hanscom
  AFB Mass (NTIS AD-A038 231/7), November, 1976.
* Ritchie, D. M., The evolution of the UNIX time-sharing system, Bell
  System Technical Journal 63, 8, Oct 1984.
* Ritchie, D. M., The development of the C language, ACM SIGPLAN Notices
  28, 3, 201-208 (ACM HOPL-II Conf), March 1993.
* Rus, T., Data Structures and Operating Systems, John Wiley & Sons,
  Chichester, 1979.
* Saltzer, J. H., A simple linear model of demand paging performance,
  Project MAC memo M0131, November 1972. Also Commun. ACM 17, 4, April,
  1974.
* Saltzer, J. H., and J. F. Ossanna, Remote terminal character stream
  processing in Multics, AFIPS Conf Proc 36 (1970 SJCC), 621-627, 1970.
* Saltzer, J. H., and J. W. Gintell, The instrumentation of Multics,
  Commun. ACM 13, No. 8, 495-500, August 1970.
* Saltzer, J. H., Information protection and the control of sharing in
  the Multics system, Commun. ACM 17, 7, July 1974.
* Saltzer, J. H., and M. D. Schroeder, The protection of information in
  computer systems, IEEE Tutorial, 1974.
* Saltzer, J. H., Ongoing research and development on information
  protection, ACM Operating Systems Review 8, 3, pp. 8-24, July, 1974.
* Saltzer, J. H., Naming and binding of objects, in R. Bayer, R. M.
  Graham, and G. Seegmuller (eds.), Operating Systems: An Advanced
  Course, Springer Verlag, New York, 1979, pp. 99-208. [Appendix A: Case
  Study of Naming in Multics, pp. 193-208.]
* Saltzer, J. H., On the modeling of paging algorithms, ACM Forum,
  Commun. ACM 19, 5, May 1976.
* Saltzer, J. H., Technical possibilities and problems in protecting data
  in computer systems, in Dierstein et al, eds, Datenschutz und
  Datensicherung, J. P. Bachem Verlag, Cologne, 1976.
* Salus, Peter H., A Quarter Century of UNIX, Addison Wesley, 1994.
* Schell, R. R., Effectiveness -- the Reason for a Security Kernel,
  Proceedings of the National Computer Conference, 1974, pp. 975-976.
* Schiller, W. L., K. J. Biba, E. L. Burke, A preliminary specification
  of a Multics security kernel, WP-20119, MITRE Corp, Bedford MA, April
  1975.
* Schiller, W. L., Design and Abstract Specification of a Multics
  Security Kernel, MITRE Corp Bedford MA (NTIS AD-048 576), 1977.
* Schroeder, M. D., and J. H. Saltzer, A hardware architecture for
  implementing protection rings, ACM Third SOSP, 42-54, October 1971.
  Commun. ACM 15, 3, pp.157-170, March 1972.
* Schroeder, M. D., Engineering a security kernel for Multics, ACM
  Operating Systems Review 9, 5, pp. 25-32, Proc. 5th Symp. OSP,
  November, 1975.
* Schroeder, M. D., Performance of the GE-645 associative memory while
  Multics is in operation, Proc ACM SIGOPS Workshop on System Performance
  Evaluation, Harvard, April 1971.
* Schroeder, M. D., Clark, D. D., and J. H. Saltzer, The Multics kernel
  design project, ACM Operating Systems Review 11, 5, Proc. 6th Symp.
  OSP, November 1977.
* Sebring, Michael M., Eric W. Shellhouse, Mary E. Hanna,and R. Alan
  Whitehurst (SRI International), Expert Systems in Intrusion Detection:
  A Case Study, 11th NCSC, Baltimore. USA: NBS/NCSC: pp.74-81, October
  17, 1988.
* Sekino, A., Response time distribution of multiprogrammed time-shared
  computing systems, Sixth Annual Princeton Conf on Information Sciences
  and Systems, Princeton, March 1972.
* Spier, M. J., and E. I. Organick, The Multics inter-process
  communication facility, Proc ACM Second SOSP, 83-91, October 1969.
* Stern, J. A., Multics Security Kernel Top Level Specification,
  Honeywell Information Systems Inc Mclean Va Federal Systems Operations
  (NTIS AD-A060 000/7), November 1976.
* Van Vleck, T. H., An example of industry-university cooperation:
  Multics, at IRIA Tenth Anniversary Conf, Paris, June 1978.
* Van Vleck, T. H., and C. T. Clingen, Implementation of security
  concepts in a large-scale operating system, Honeywell Security
  Symposium, Monaco, December 1980.
* Van Vleck, T. H., and C. T. Clingen, The Multics system programming
  process, Proc IEEE COMPCON 78, Atlanta, May 1978. Reprinted in IEEE
  Tutorial on Software Maintenance, 1981.
* Van Vleck, T. H., Control of access to computer system resources, Proc
  IEEE COMPCON 74, San Francisco, February 1974.
* Van Vleck, T. H., The administration and management of Multics, Project
  MAC Multics Symp, January 1971.
* Vinograd, D. R., What's a system to do? -- Assuring system data
  integrity, Proc IEEE Conf, September 1971.
* Vyssotsky, V. A., F. J. Corbato, and R. M. Graham, Structure of the
  Multics Supervisor, AFIPS Conf Proc 27, 203-212, 1965.
* Watson, R., Time-Sharing System Concepts, McGraw Hill, 1970.
* Weeldreyer, J. A., and O. D. Friesen, Multics Relational Data Store: An
  Implementation of a Relational Data Base Manager, Proc 11th Hawaii Intl
  Conf on System Sciences, Vol 1, pp. 52-66. 1978.
* Whitmore, J., A. Bensoussan, P. Green, D. Hunt, and A. Kobziar, Design
  for Multics Security Enhancements, Honeywell Information Systems Inc.,
  Cambridge Mass, (NTIS AD-A030 801/5), December 1973.
* Whiteside, Thomas, Computer Capers. Published as a book and in the New
  Yorker as a two-part series in late 1977 or early 1978.
* Withington, P. T., Design and Abstract Specification of a Multics
  Security Kernel. Volume 2, MITRE Corp Bedford MA (NTIS AD-A053 148/3),
  March 1978.
* Wolman, B. L., Debugging PL/I programs in the Multics environment,
  AFIPS Conf Proc 41, Part I, (1972 FJCC), 507-514, AFIPS Press, 1972.
* Woodward, J. P. L. Design and Abstract Specification of a Multics
  Security Kernel. Volume 3, MITRE Corp Bedford MA (NTIS AD-A053 149/1),
  March 1978.



Newspaper & magazine articles about Multics


* Schell, R. R., "Computer Security: The Achilles' Heel of the Electronic
  Air Force", Air University Review, January - February 1979, p. 16.
* staff reporter, Honeywell introduces commercial version of its large
  Multics computer system, Wall Street Journal, p 9, January 18, 1973.
* staff, FORD WEIGHING HONEYWELL BOYCOTT?, Datamation, June 1, 1986, p.
  10. In the LOOK AHEAD column.
* Korzeniowski, Paul, Honeywell phasing out Multics line, Computerworld,
  Vol. XX, No. 2, p 1, January 13, 1986.
* Kornel, Amiel, Honeywell decision puts Groupe Bull in sticky situation,
  Computwerworld Vol. XX, No. 2, p 15, January 13, 1986.
* Verity, John W., Multics users face their maker, Datamation, Vol. 32,
  No. 9, 102-112, May 1, 1986.



MIT Project MAC TRs and TMs

Source: LCS document handed out at the Project MAC 25th reunion.

See also the LCS on-line list of publications.
* Bawden, Alan, Burke, Glenn S., and Hoffman, Carl W., MacLisp
  Extensions, MAC-TM-203, July 1981.
* Bratt, R. G., Minimizing the naming facilities requiring protection in
  a computer utility, MAC-TR-156 (S.M. thesis), September 1975.
* Clark, D. D., An input-ouput architecture for virtual memory computer
  systems, MAC-TR-117 (Ph.D. thesis), January 1974.
* Clark, D. D., Ancillary reports: kernel design project, MAC-TM-87, June
  1977.
* Clark, D. D., R. M. Graham, J. H. Saltzer, and M. D. Schroeder, The
  classroom information and computing service, MAC-TR-80, January 1971.
* Corbato, F. J., System requirements for multiple-access time-shared
  computers, MAC-TR-3, May 1964.
* Deitel, H. M., Absentee computations in a multiple-access computer
  system, MAC-TR-52 (S.M. thesis), August 1968.
* Denning, P. J., Resource allocation in multiprocess computer systems,
  MAC-TR-50 (Ph.D. Thesis), May 1968.
* Dennis, J. B., and E. C. Van Horn, Programming semantics for
  multiprogrammed computations, MAC-TR-21, 1966.
* Dennis, J. B., Program structure in a multi-access computer, MAC-TR-11,
  May 1964.
* Fillat, A. I., and A. L. Kraning, Generalized organization of large
  data-bases: a set-theoretic approach to relations, MAC-TR-70 (S.M. and
  S.B. thesis), June 1970.
* Frankston, R. M., A Limited Service System on Multics (S.B. thesis),
  MIT, June 1970.
* Frankston, R. M., The computer utility as a marketplace for computer
  services, MAC-TR-128 (S.M. & E.E. thesis), May 1974.
* Gifford, D., Hardware estimation of a process's primary memory
  requirements, MAC-TM-81 (S.B. Thesis), May, 1976.
* Graham, R. M., File management and related topics, MAC-TM-12, September
  1970.
* Graham, R. M., Use of high level language for systems programming, MAC-
  TM-13, September 1970.
* Greenbaum, H. J., A simulator of multiple interactive users to drive a
  time-shared computer system, MAC-TR-58 (S.M. Thesis), October 1968.
* Greenberg, B. S., An experimental analysis of program reference
  patterns in the Multics virtual memory, MAC-TR-127 (S.M. thesis), May
  1974.
* Grochow, J. M., The graphic display as an aid in the monitoring of a
  time-shared computer system, MAC-TR-54 (S.M. thesis), November 1968.
* Huber, A. R., A multi-process design of a paging system, MAC- TR-171
  (S.M. thesis), December 1976.
* Hunt, D. H., A case study of intermodule dependencies in a virtual
  memory system, MAC-TR-174 (S.M. thesis), December 1976.
* Janson, P. A., Removing the dynamic linker from the security kernel of
  a computing utility, MAC-TR-132 (S.M. thesis), June 1974.
* Janson, P. A., Using type extension to organize virtual memory
  mechanisms, MAC-TR-167 (Ph.D. thesis), September 1976.
* Karger, P. A., Non-discretionary access control for decentralized
  computing systems, MAC-TR-179 (S.M. thesis), May 1977. (Also available
  as NTIS AD-A040 808/8)
* Luniewski, A. W., A simple and flexible system initialization
  mechanism, MAC-TR-180 (S.M. thesis), May 1977.
* Mason, A. H., A layered virtual memory manager, MAC-TR-177 (S.M. & E.E.
  thesis), May 1977.
* Montgomery, W. A., A secure and flexible model of process initiation
  for a computer utility, MAC-TR-163 (S.M. & E.E. thesis), June 1976.
* Rappaport, R. L., Implementing multi-process primitives in a
  multiplexed computer system, MAC-TR-55 (S.M. thesis), November 1968.
* Reed, D. P., Processor multiplexing in a layered operating system, MAC-
  TR-164 (S.M. thesis), July 1976.
* Richards, M., A. Evans, and R. Mabee, The BCPL reference manual, MAC-TR
  -141, December 1974.
* Rodriguez, H., Jr, Measuring user characteristics on the Multics
  system, MAC-TM-89 (S. B. Thesis), August 1977.
* Saltzer, J. H., Introduction to Multics, MAC-TR-123, February 1974.
* Saltzer, J. H., Traffic control in a multiplexed computer system, MAC-
  TR-30 (Sc.D. Thesis), July, 1966.
* Schell, R. R., Dynamic reconfiguration in a modular computer system,
  Project MAC TR-86, 1971.
* Schroeder, M. D., Cooperation of mutually suspicious subsystems in a
  computer utility, MAC-TR-104 (Ph.D. Thesis), September 1972.
* Schroeder, M. D., D. D. Clark, J. H. Saltzer, and D. M. Wells, Final
  report of the Multics kernel design project, MAC-TR-196, March 1978.
* Sekino, A., Performance evaluation of multiprogrammed time-shared
  computer systems, MAC-TR-103 (Ph.D. thesis), September 1972.
* Smith, A. A., Input-output in time-shared, sgemented multiprocessor
  systems, MAC-TR-28 (S.M. thesis), June 1966.
* Stern, J. A., Backup and recovery of on-line information in a computer
  utility, MAC-TR-116 (S.M. & E.E. thesis), January 1974.
* Van Horn, E. C., Computer design for asynchronously reproducible
  multiprocessing, MAC-TR-34 (Ph.D. thesis), November 1966.
* Vogt, C. M., Suspension of processes in a multiplexed computer system,
  MAC-TM-14, September 1970.



Multics Manuals

.. still incomplete, please help.
* AG90, Multics Programmer's manual: Introduction to Programming on
  Multics.
* AG91, Multics Programmer's manual: Reference Guide.
* AG92, Multics Programmer's manual: Commands and Active Functions.
* AG93, Multics Programmer's manual: Subroutines and I/O Modules.
* AG94, Multics PL/I Language Specification.
* AG95, The Multics Virtual Memory, 1972. (reprint of Bensoussan,
  Clingen, and Daley paper; "Access Control to the Multics Virtual
  Memory"; and "Series 6000 Features for the Multics Virtual Memory")
* AK15, The Multics System Summary Description (brochure), 1974.
* AK24, Multics Software Overview Product Brief, Honewyell, 1973.
* AK26, Multics Model 6180 Hardware Product Brief, Honewyell, 1973.
* AK27, The Multics System (brochure).
* AK50, Multics System Administrators' Manual. The Trusted Facilities
  Manual required for B2 certification is contained in Part VI "Assuring
  System Security" and Appendix B "Audit Tables and Include Files" of
  AK50-03 (Renamed the "Multics System Administration Procedures Manual",
  May 1985). Part VI consists of Chapters 18 through 26 of the manual and
  provides guidelines for the system administrator on how to manage
  Multics as a secure system. [info from Ed Ranzenbach]
* AK51, Multics Project Administrators' Manual.
* AK52, Multics Administrative Functions Product Brief. 1973.
* AK92, Multics Programmer's manual: Subsystem Writer's Guide.
* AK95, Multics APL Users' Guide.
* AK96, Multics Programmer's manual: System Programmer' Supplement.
* AL39, Multics Processor Manual.
* AM81, Multics Operator's Handbook.
* AM82, Multics BASIC.
* AM83, Multics PL/1 Reference Manual.
* AN05, GCOS Environment Simulator.
* AN50, Guide to Multics Manuals.
* AN52, Multics System Metering. February 1979.
* AN53, Multics System Dump Analysis, June 1975.
* AN61, Multics Storage System: Program Logic Manual. July 1977.
* AN63, Multics ALM Assembler SDN, February 1975.
* AN70, System Initialization Program Logic Manual, February 1975.
* AN71, Reconfiguration Program Logic Manual, June 1974.
* AN76, Multics Carry Facility.
* AN80, Level 68 & DPS8/M Library Maintenance SDN, March 1982.
* AN82, Multics Standards Program Logic Manual, June 1980.
* AN87, Multics Hardware and Software Formats PLM, March 1980.
* AR97, Multics System Diagnostic Aids, December 1983.
* AS40, Multics Graphics System.
* AS43, Multics COBOL Users' Guide.
* AS44, Multics COBOL Reference Manual.
* AS68, Multics Administrator's Manual - Registration and Accounting
* AT58, Multics FORTRAN.
* AT59, Multics DFAST Subsystem Users' Guide.
* AU25, Multics FAST Subsystem Reference Guide.
* AU77, Multics Online Test and Diagnostics Reference Manual.
* AW17, Multics Pocket Guide: Commands and Active Functions. April 1980.
* AW32, Multics SORT/MERGE.
* AW53, Multics Relational Data Store (MRDS) -- Reference Manual.
* AX49, Multics Peripheral Input/Output.
* AZ03, TECO (extracted from AZ03).
* AZ49, Logical Inquiry and Update System (LINUS).
* AZ98, Mutlics WORDPRO Reference Guide.
* CC34, Multics Bulk Input/Output
* CC69, Multics Report Program Generator (MRPG) Reference Manual.
* CC70, FORTRAN Users' Guide.
* CC74, Multics Administrator's Manual - Resource Control
* CC75, Communications Administration .
* CC92, Multics Communications Input/Output.
* CC96, Multics Transaction Processing Reference Manual
* CG18, Multics Remote Batch Facility (Level 68 to Level 6)
* CG40, QEDX Text Editor User's Guide.
* CH23, Multics Extended Mail System User's Guide.
* CH24, New Users' Introduction to Multics -- Part I.
* CH25, New Users' Introduction to Multics -- Part II.
* CH26, Multics Error Messages: Primer and Reference Manual.
* CH27, Emacs Text Editor User's Guide. December 1979.
* CJ52, Emacs Extension Writer's Guide. January 1980.
* CJ97, Multics Page Processing System Utility Manual.
* CP31, Level 68 Introduction to Emacs.
* CP50, Multics Text Editor (TED) Reference Manual.
* CP51, Multics Menu Creation Facilities.
* CX20, Fundamentals of Multics Executive Mail.
* CX72, Executive Facilities Editing Operations Ref Card, Honeyewll.
* CY73, Inter-Multics File Transfer Facility Ref Manual.
* CY74, Multics Forum Interactive Meeting System Users' Guide.
* DF48, Series 60 Level 68 DPS Pocket Guide. June 1978.
* DL92, Honeywell Multics Distributed Processing System, Summary
  Overview. 1982.
* DS44, Honewyell Multics (brochure), 1983.
* DS45, Honeywell DPS8/Multics (brochure), 1983.
* DJ18, Guide to Multics Wordpro for New Users.
* DU06, Fundamentals of Multics Forum Interactive Meeting System.
* DV74, Texto Reference Manual.
* DW19, Multics MegaCalc User's Guide.
* DX71, Fundamentals of Multics Executive Forum.
* GA01, Multics Data Security (brochure).
* GB58, Multics Common Commands Manual.
* GB59, DPS 6/Multics Satellite 6M Reference Manual.
* GB60, Multics HASP Service and Utility.
* GB61, Operator's Guide to Multics.
* GB62, Multics Pascal User's Guide.
* GB63, Multics Report Writer Reference Manual.
* GB64, Administration, Maintenance, and Operations Commands.
* GB65, Multics/Personal Computer File Transmission Facility.
* GB66, Multics On-Line Work Station Environment User's Guide.
* GL71, Multics Simplified Computing and Filing Facility.
* GN08, Multics Emacs Reference Card.
* HH07, Multics C User's Guide.
* YL77, Multics Cray Station Users' Guide.



Multics Design Document Series

The Multics Design Document series, specifically produced for the B2
  effort, includes some documents written for the project. Others were
  existing manuals that were found to be adequate for the evaluation but
  were to eventually be re-written for consistency. [info from Ed
  Ranzenbach]
* MDD-001 Overview and Index of Multics Design Documents (B. Margulies)
* MDD-002 Multics Security Model -- Bell and LaPadula (B. Margulies)
* MDD-003 Overview of the Multics TCB
* MDD-004 Multics Functional Test Suite: Goals, Standards, and
  Maintenance Policy (E. Ranzenbach)
* MDD-005 System Initialization (K. Loepere)
* MDD-006 Directory Control (K. Loepere)
* MDD-007 VTOCE File System (B. Margulies)
* MDD-008 Online Storage Volume Management
* MDD-009 Resource Control Package
* MDD-010 System / User Control (E. Swenson)
* MDD-011 Security Auditing
* MDD-012 I/O Interface (IOI)
* MDD-013 MSEG: Message Segments and Mailboxes
* MDD-014 Page Control
* MDD-015 Segment Control
* MDD-016 Volume Backup Dumper
* MDD-017 Hierarchy Backup Dumper
* MDD-018 Interprocess Communication
* MDD-019 Traffic Control
* MDD-020 I/O Daemon, Miscellaneous I/O Modules
* MDD-021 Reconfiguration
* MDD-022 Name and Address Space Management
* MDD-023 Run Time Environment
* MDD-024 Fault and Interrupt Handling
* MDD-025 System Administration
* MDD-026 Online Tests and Diagnostics
* MDD-027 Ring-0 Auditing and Logging