-
1
-
-
0003400251
-
-
Air Force Electronic Systems Division, Hanscom AFB, MA. ESD-TR-75-306. Also available through National Technical Information Service, Springfield, VA as NTIS AD-A023588
-
D.E. Bell and L.J. La Padula. 1975. Secure Computer Systems: Unified Exposition and Multics Interpretation. Air Force Electronic Systems Division, Hanscom AFB, MA. ESD-TR-75-306. (Also available through National Technical Information Service, Springfield, VA as NTIS AD-A023588).
-
(1975)
Secure Computer Systems: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
La Padula, L.J.2
-
2
-
-
0342386257
-
-
January 1997
-
William J. Bolosky, Richard P. Draves, Robert P. Fitzgerald, Christopher W. Fraser, Michael B. Jones, Todd B. Knoblock, and Rick Rashid. 1997. Operating System Directions for the Next Millennium. http://www.research.microsoft.com/research/os/Millennium/mgoals.html. January 1997.
-
(1997)
Operating System Directions for the next Millennium
-
-
Bolosky, W.J.1
Draves, R.P.2
Fitzgerald, R.P.3
Fraser, C.W.4
Jones, M.B.5
Knoblock, T.B.6
Rashid, R.7
-
3
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, April 1987
-
David D. Clark and David R. Wilson. 1987. A comparison of commercial and military computer security policies. In Proceedings IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.
-
(1987)
Proceedings IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
5
-
-
0542358540
-
-
July 2, 1997
-
DARPA/ITO. 1997. Research Challenges in Operating System Security. http://www.ito.arpa.mil/Proceedings/OS_Security/challenges/challenges_long.html. July 2, 1997.
-
(1997)
Research Challenges in Operating System Security
-
-
-
6
-
-
85084163247
-
-
Providing Policy Control Over Object Operations in a Mach Based System. June 1995
-
Spencer E. Minear. 1995. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
, pp. 141-156
-
-
Minear, S.E.1
-
10
-
-
0542358539
-
-
Volume 6 of TAFIM - The DGSA is available through http://www-library.itsi.disa.mil:8018/tafim/as Volume 6 of Version 3.0 and may be downloaded in a variety of forms. The DGSA is available from the NIST Security BBS in WordPerfect and Post-Script formats. The NIST BBS is accessible by anonymous FTP Internet service at csrc.nist.gov (129.6.54.11) and by dial-up modem (9600 baud) at 301-948-5140. For FTP, the files are located in the /bbs/secpubs directory. For download the files are located in #13 directory. Refer to V6README.TXT for a list of the individual files.
-
Volume 6 of TAFIM
-
-
-
19
-
-
0016555241
-
The Protection of Information in Computer Systems
-
September 1975. IEEE, Piscataway, N.J.
-
Jerome H. Saltzer and Michael D. Schroeder. 1975. The Protection of Information in Computer Systems. Proceedings of the IEEE Volume 63, September 1975. IEEE, Piscataway, N.J. pp 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
20
-
-
0001982732
-
A Survey of Active Network Research
-
January 1997
-
David L. Tennenhouse, Jonathan M. Smith, W. David Sincoskie, David J. Wetherall, and Gary J. Minden. 1997. A Survey of Active Network Research. IEEE Communications Magazine, Volume 35, Number 1. pages 80-86. January 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.1
, pp. 80-86
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
21
-
-
0542358541
-
-
A New Security Model for Distributed Systems, Lake Arrowhead, California. 1996
-
William A. Wulf, Chenxi Wang, and Darrell Kienzle, 1996. A New Security Model for Distributed Systems, Proceeding of the New Security Paradigms Workshop, Lake Arrowhead, California. 1996.
-
(1996)
Proceeding of the New Security Paradigms Workshop
-
-
Wulf, W.A.1
Wang, C.2
Kienzle, D.3
-
22
-
-
0003563348
-
-
Van Nostrand Rheinhold Company, New York, ISBN 0-442-23022-2, 1988
-
Morrie Gasser. 1988. Building a Secure Computer System. Van Nostrand Rheinhold Company, New York, ISBN 0-442-23022-2, 1988.
-
(1988)
Building a Secure Computer System
-
-
Gasser, M.1
-
23
-
-
0005314068
-
-
National Computer Security Center, Fort George G. Meade, MD. September 1991
-
_. 1991. Integrity in Automated Information Systems. National Computer Security Center, Fort George G. Meade, MD. September 1991.
-
(1991)
Integrity in Automated Information Systems
-
-
|