-
1
-
-
0018055076
-
Design of a message processing system for a multilevel secure environment
-
AFIPS Press, Arlington, Va
-
Ames, S. R., And Oestreicher, D. R. “Design of a message processing system for a multilevel secure environment,” in Proc AFIPS Nat Computer Conf., vol. 47, AFIPS Press, Arlington, Va, 1978, pp. 765-771.
-
(1978)
Proc AFIPS Nat Computer Conf.
, vol.47
, pp. 765-771
-
-
Ames, S.R.1
Oestreicher, D.R.2
-
2
-
-
84976652219
-
Demonstrating security for trusted apphcatlons on a security kernel
-
MITRE Corp, Bedford, Mass., April
-
Ames, S. R., And Keeton-Williams, J. G. “Demonstrating security for trusted apphcatlons on a security kernel,” MITRE Corp, Bedford, Mass., April 1980
-
(1980)
-
-
Ames, S.R.1
Keeton-Williams, J.G.2
-
3
-
-
23844435685
-
Computer security technology planning study
-
ESD-TR-73-51 ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. NTISAD-758 206
-
Anderson, J. P. “Computer security technology planning study,” ESD-TR-73-51, vol 1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. 1972 (NTISAD-758 206)
-
(1972)
, vol.1
-
-
Anderson, J.P.1
-
4
-
-
84976840591
-
An axiomatic approach to informahon flow in programs
-
Jan.
-
Andrews, G. R., And Reitman, R. P. “An axiomatic approach to informahon flow in programs,” ACM Trans Program Lang Syst 2, 1 (Jan. 1980), 56-76.
-
(1980)
ACM Trans Program Lang Syst
, vol.2
, Issue.1
, pp. 56-76
-
-
Andrews, G.R.1
Reitman, R.P.2
-
5
-
-
0003400251
-
Secure computer systems Mathematical foundations
-
ESD-TR-73-278 ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. (MTR-2547, vol. 1, MITRE Corp., Bedford, Mass.)
-
Bell, D. E., And Lapadula, L. J. “Secure computer systems Mathematical foundations,” ESD-TR-73-278, vol. 1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. 1973 (MTR-2547, vol. 1, MITRE Corp., Bedford, Mass.)
-
(1973)
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
6
-
-
0003400257
-
Secure computer systems A mathematmal model
-
ESD-TR-73-278 ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov (MTR-2547, vol 2, MITRE Corp., Bedford, Mass.)
-
Bell, D. E., And Lapadula, L. J. “Secure computer systems A mathematmal model,” ESD-TR-73-278, vol. 2, ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. 1973 (MTR-2547, vol 2, MITRE Corp., Bedford, Mass.).
-
(1973)
, vol.2
-
-
Bell, D.E.1
Lapadula, L.J.2
-
7
-
-
0003400251
-
Secure Computer systems: A refinement of the mathematmal model
-
ESD-TR-73-278, ESD/AFSC, Hanscom AFB, Bedford, Mass, April, MTR 2547, MITRE Corp., Bedford, Mass.
-
Bell, D. E. “Secure Computer systems: A refinement of the mathematmal model,” ESD-TR-73-278, vol. 3, ESD/AFSC, Hanscom AFB, Bedford, Mass, April 1974 (MTR 2547, vol. 3, MITRE Corp., Bedford, Mass.).
-
(1974)
, vol.3-3
-
-
Bell, D.E.1
-
8
-
-
0003400257
-
Secure computer systems. Mathematical foundations and model
-
M74-244, MITRE Corp, Bedford, Mass., Oct.
-
Bell, D. E., And Lapadula, L. J. “Secure computer systems. Mathematical foundations and model,” M74-244, MITRE Corp, Bedford, Mass., Oct. 1974.
-
(1974)
-
-
Bell, D.E.1
Lapadula, L.J.2
-
9
-
-
0003400251
-
Secure computer system. Unified exposition and multIcs interpretatmn
-
MTR-2997, MITRE Corp., Bedford, Mass., July
-
Bell, D. E., And Lapadula, L. J. “Secure computer system. Unified exposition and multIcs interpretatmn,” MTR-2997, MITRE Corp., Bedford, Mass., July 1975.
-
(1975)
-
-
Bell, D.E.1
Lapadula, L.J.2
-
10
-
-
0003400255
-
Integrity considerations for secure computer systems
-
ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, Mass., April MITRE MTR-3153, NTIS AD A039324
-
Biea, K. J. “Integrity considerations for secure computer systems,” ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, Mass., April 1977 (MITRE MTR-3153, NTIS AD A039324)
-
(1977)
-
-
Biea, K.J.1
-
11
-
-
0004336715
-
-
McGraw-Hill, New York
-
Birkhoff, G., And Barter, T. C. Modern Applied Algebra, McGraw-Hill, New York, 1970, p. 260.
-
(1970)
Modern Applied Algebra
, pp. 260
-
-
Birkhoff, G.1
Barter, T.C.2
-
12
-
-
0018685670
-
The transfer of reformation and authomty in a protection system
-
Dec
-
Bishop, M., And Snyder, L. “The transfer of reformation and authomty in a protection system,” Proc. 7th Syrup Operating Systems Pnnciples, ACM SIGOPS Operating Syst. Rev. 13, 4 (Dec. 1979), 45-54.
-
(1979)
Proc. 7th Syrup Operating Systems Pnnciples, ACM SIGOPS Operating Syst. Rev.
, vol.13
, Issue.4
, pp. 45-54
-
-
Bishop, M.1
Snyder, L.2
-
13
-
-
84976832941
-
Secure communications processor kernel software, detailed specification, part I, rev. D
-
Honeywell Inc, Avionics Diwsion, St. Petersburg, Fla.
-
Bonneau, C. H. “Secure communications processor kernel software, detailed specification, part I, rev. D,” Honeywell Inc, Avionics Diwsion, St. Petersburg, Fla., 1980.
-
(1980)
-
-
Bonneau, C.H.1
-
14
-
-
84976846871
-
A new model of computer security with integrity and aggregatmn consideratmns
-
I. P. Sharp Assoc, Ottawa, Ont., Canada, March
-
Bonyun, D. “A new model of computer security with integrity and aggregatmn consideratmns,” I. P. Sharp Assoc, Ottawa, Ont., Canada, March 1978.
-
(1978)
-
-
Bonyun, D.1
-
15
-
-
84915673441
-
A theorem-prover for recursive functions A user's manual
-
Tech. Rep. CSL-91, SRI Internatmnal, Menlo Park, Calif, June
-
Boyer, R. S., And Moore, J. S. “A theorem-prover for recursive functions A user's manual,” Tech. Rep. CSL-91, SRI Internatmnal, Menlo Park, Calif, June 1979.
-
(1979)
-
-
Boyer, R.S.1
Moore, J.S.2
-
16
-
-
84976675687
-
Information transmission in computational systems
-
Nov
-
Cohen, E. “Information transmission in computational systems,” Proc. 6th Syrup. Operating Systems Principles, ACM SIGOPS Operating Syst Rev. 11, 5 (Nov. 1977), 133-140.
-
(1977)
Proc. 6th Syrup. Operating Systems Principles, ACM SIGOPS Operating Syst Rev.
, vol.11
, Issue.5
, pp. 133-140
-
-
Cohen, E.1
-
17
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P., Dobkin, A. K Jones, and R. J. Lipton (Eds.), Academic Press, New York
-
Cohen, E. “Information transmission in sequential programs,” in Foundation of secure computation, R. A. DeMillo, D. P., Dobkin, A. K Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp. 297-336.
-
(1978)
Foundation of secure computation
, pp. 297-336
-
-
Cohen, E.1
-
18
-
-
0017907186
-
Even databases that lie can be compromised
-
Jan
-
Demillo, R. A., Dobkin, D., And Lipton, R.J. “Even databases that lie can be compromised,” IEEE Trans Softw. Eng. SE-4, 1 (Jan. 1977), 74-75.
-
(1977)
IEEE Trans Softw. Eng.
, vol.SE-4
, Issue.1
, pp. 74-75
-
-
Demillo, R.A.1
Dobkin, D.2
Lipton, R.J.3
-
19
-
-
0015200983
-
Third generation computer systems
-
Dec
-
Denning, P. J. “Third generation computer systems,”Computing Surveys 3, 4 (Dec. 1971), 171-216.
-
(1971)
Computing Surveys
, vol.3
, Issue.4
, pp. 171-216
-
-
Denning, P.J.1
-
20
-
-
0041684496
-
Secure information flow in computer systems
-
Ph D. dissertation, Purdue Univ., West Lafayette, Ind., May
-
Denning, D. E. “Secure information flow in computer systems,” Ph D. dissertation, Purdue Univ., West Lafayette, Ind., May 1975.
-
(1975)
-
-
Denning, D.E.1
-
21
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning, D. E. “A lattice model of secure information flow,” Commun. ACM 19, 5 (May 1976), 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
22
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Denning, D. E., And Denning, P. J.“Certification of programs for secure information flow,” Commun ACM 20, 7 (July 1977), 504-512.
-
(1977)
Commun ACM
, vol.20
, Issue.7
, pp. 504-512
-
-
Denning, D.E.1
Denning, P.J.2
-
23
-
-
0018442066
-
The tracker: A threat to statmtical database security
-
March
-
Denning, D. E., Denning, P. J., And Schwartz, M. D. “The tracker: A threat to statmtical database security,” ACM Trans. Database Syst. 4, 1 (March 1979), 76-96.
-
(1979)
ACM Trans. Database Syst
, vol.4
, Issue.1
, pp. 76-96
-
-
Denning, D.E.1
Denning, P.J.2
Schwartz, M.D.3
-
24
-
-
0018519346
-
Data security
-
Sept
-
Denning, D. E., And Denning, P. J. “Data security,” Comput. Surv 11, 3 (Sept. 1979), 227-249.
-
(1979)
Comput. Surv
, vol.11
, Issue.3
, pp. 227-249
-
-
Denning, D.E.1
Denning, P.J.2
-
25
-
-
0018444418
-
Secure databases: protection against user Influence [sw]
-
March
-
Dobkin, D., Jones, A. K. And Lipton, R. J. “Secure databases: protection against user Influence [sw],” ACM Trans. Database Syst. 4, (March 1979), 97-106.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
26
-
-
84976738413
-
Proving multilevel security of a system design
-
Nov
-
Feiertag, R. J., Levitt, K. N., And Robinson, L. “Proving multilevel security of a system design,” in Proc. 6th ACM Symp. Operating Systems Prmctples, ACM SIGOPS Operattng Syst Rev 11, 5 (Nov 1977), 57-65.
-
(1977)
Proc. 6th ACM Symp. Operating Systems Prmctples, ACM SIGOPS Operattng Syst Rev
, vol.11
, Issue.5
, pp. 57-65
-
-
Feiertag, R.J.1
Levitt, K.N.2
Robinson, L.3
-
27
-
-
85072519230
-
The foundations of a provably secure operating system (PSOS)
-
AFIPS Press, Arlington, Va
-
Feiertag, R. J., And Neumann, P. G. “The foundations of a provably secure operating system (PSOS),” in Proc AFIPS Nat. Computer Conf., vol. 48, AFIPS Press, Arlington, Va, 1979, pp. 329-334.
-
(1979)
Proc AFIPS Nat. Computer Conf.
, vol.48
, pp. 329-334
-
-
Feiertag, R.J.1
Neumann, P.G.2
-
28
-
-
0016382977
-
Memoryless subsystems
-
May
-
Fenton, J. S. “Memoryless subsystems,” Comput. J 17, 2 (May 1974), 143-147.
-
(1974)
Comput. J
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
29
-
-
84976721711
-
A validation technique for computer security based on the theory of constraints
-
ESD-TR-78-182, ESD/AFSC, Hanscom AFB, Bedford, Mass., Dec (MITRE MTR-3661, NTIS ADA065111)
-
Furtek, F. C.“A validation technique for computer security based on the theory of constraints,” ESD-TR-78-182, ESD/AFSC, Hanscom AFB, Bedford, Mass., Dec 1978 (MITRE MTR-3661, NTIS ADA065111).
-
(1978)
-
-
Furtek, F.C.1
-
30
-
-
84949036570
-
Constraints and compromise
-
R. A. DeMillo, D. P Dobkin, A K. Jones, and R. J. Lipton (Eds.), Academic Press, New York
-
Furtek, F. C. “Constraints and compromise,” in Foundations of secure computation, R. A. DeMillo, D. P Dobkin, A K. Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp. 189-204.
-
(1978)
Foundations of secure computation
, pp. 189-204
-
-
Furtek, F.C.1
-
32
-
-
84976741353
-
Specification and verification of real-time, distributed systems using the theory of constraints
-
Tech Rep. P-1027, Charles Stark Draper Laboratory, Cambridge, Mass., April
-
Furtek, F. C. “Specification and verification of real-time, distributed systems using the theory of constraints,” Tech Rep. P-1027, Charles Stark Draper Laboratory, Cambridge, Mass., April 1980.
-
(1980)
-
-
Furtek, F.C.1
-
33
-
-
84976672259
-
GNOSIS External Specifications
-
Tymshare, Cupertino, Calif.
-
“GNOSIS External Specifications,“ Tymshare, Cupertino, Calif., 1980.
-
(1980)
-
-
-
34
-
-
85072542009
-
A security retrofit of VM/370
-
AFIPS Press, Arlington, va
-
Gold, B. D., Linde, R. R., Peeler, R. J., Schaefer, M., Scheid, J. F., And Ward, P. D. “A security retrofit of VM/370,” In Proc. AFIPS Nat. Computer Conf., vol. 48, AFIPS Press, Arlington, va., 1979, pp 335-342
-
(1979)
Proc. AFIPS Nat. Computer Conf.
, vol.48
, pp. 335-342
-
-
Gold, B.D.1
Linde, R.R.2
Peeler, R.J.3
Schaefer, M.4
Scheid, J.F.5
Ward, P.D.6
-
35
-
-
84942812332
-
Protectlon-Prmciples and practice
-
AFIPS Press, Arlmgton, Va
-
Graham, G. S., And Denning, P. J. “Protectlon-Prmciples and practice,” in Proc 1972 AFIPS Spring Jt Computer Conf, vol. 40, AFIPS Press, Arlmgton, Va, pp. 417-429.
-
Proc 1972 AFIPS Spring Jt Computer Conf
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
36
-
-
0042992510
-
A model of a protected data management system
-
ESD-TR-76-289, ESD/AFSC, Hanscom AFB, Bedford, Mass, June (I P. Sharp, Ottawa, Canada NTIS ADA 035256)
-
Grohn, M.J. ”A model of a protected data management system,” ESD-TR-76-289, ESD/AFSC, Hanscom AFB, Bedford, Mass, June 1976 (I P. Sharp, Ottawa, Canada NTIS ADA 035256).
-
(1976)
-
-
Grohn, M.J.1
-
37
-
-
0016984825
-
Protection in operating systems
-
Aug
-
Harrison, M. A., Ruzzo, W. L., And Ullman, J.D. “Protection in operating systems,” Commun. ACM 19, 8 (Aug. 1976), 461-471.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
38
-
-
48349088544
-
Secure data management system
-
RADC-TR-75-266, Rome Air Dev. Center, AFSC, GriffiNS AFB, N Y., Nov (NTIS AD A019201)
-
Hinke, T. H., And Schaefer, M. “Secure data management system,” RADC-TR-75-266, Rome Air Dev. Center, AFSC, GriffiNS AFB, N Y., Nov 1975 (NTIS AD A019201)
-
(1975)
-
-
Hinke, T.H.1
Schaefer, M.2
-
39
-
-
84945708698
-
An axiomatic basis for computer programming
-
Oct
-
Hoare, C. A. R. “An axiomatic basis for computer programming,” Commun. ACM 12, 10 (Oct. 1969), 576-583.
-
(1969)
Commun. ACM
, vol.12
, Issue.10
, pp. 576-583
-
-
Hoare, C.A.R.1
-
40
-
-
84987646334
-
The enforcement of security policies for computation
-
Nov
-
Jones, A. K., And Lipton, R. J. “The enforcement of security policies for computation,” Proc 5th Syrup Operating Systems Principles, ACM SIGOPS Operatmg Syst Rev. 9, 5 (Nov. 1975), 197-206.
-
(1975)
Proc 5th Syrup Operating Systems Principles, ACM SIGOPS Operatmg Syst Rev.
, vol.9
, Issue.5
, pp. 197-206
-
-
Jones, A.K.1
Lipton, R.J.2
-
41
-
-
0007826833
-
A linear time algorithm for deciding subject-object security
-
Houston, Tex.
-
Jones, A. K., Lipton, R. J., And Snyder, L. “A linear time algorithm for deciding subject-object security,” Proc 17th Ann Foundatmns Computer Sci Conf., Houston, Tex., 1976, pp. 33-41.
-
(1976)
Proc 17th Ann Foundatmns Computer Sci Conf.
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
42
-
-
33646744335
-
Protection mechanism models: Their usefulness
-
R. A. DeMillo, D. P Dobkin, A. K. Jones, and R. J Lipton (Eds.), Academic Press, New York
-
Jones, A. K. “Protection mechanism models: Their usefulness,” in Foundatmns of secure computation, R. A. DeMillo, D. P Dobkin, A. K. Jones, and R. J Lipton (Eds.), Academic Press, New York, 1978, pp. 237-254.
-
(1978)
Foundatmns of secure computation
, pp. 237-254
-
-
Jones, A.K.1
-
43
-
-
0017999069
-
The enforcement of security policies for cormputation
-
Aug
-
Jones, A. K., And Lipton, R.J. “The enforcement of security policies for cormputation,” J. Compt. Syst. Sci, 17, 1, (Aug. 1978), 35-55.
-
(1978)
J. Compt. Syst. Sci
, vol.17
, Issue.1
, pp. 35-55
-
-
Jones, A.K.1
Lipton, R.J.2
-
44
-
-
35048844102
-
Verification of the UCLA security kernel: Abstract model, mapping, theorem generatmn and proof
-
Ph.D. dissertation, UCLA, Losangeles, Calif
-
Kemmerer, R.A. “Verification of the UCLA security kernel: Abstract model, mapping, theorem generatmn and proof,” Ph.D. dissertation, UCLA, Losangeles, Calif., 1979.
-
(1979)
-
-
Kemmerer, R.A.1
-
45
-
-
84976834237
-
KSOS Verification Plan
-
WDLTR7809, Ford Aerospace and Communications Corp, Western Development Lab. Div., Palo Alto, Calif., and SRI International, Menlo Park, Calif
-
“KSOS Verification Plan,” WDLTR7809, Ford Aerospace and Communications Corp, Western Development Lab. Div., Palo Alto, Calif., and SRI International, Menlo Park, Calif, 1978.
-
(1978)
-
-
-
47
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
Lampson, B.W. “A note on the confinement problem,” Commun ACM 16, 10 (Oct. 1973), 613-615.
-
(1973)
Commun ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
48
-
-
84976849179
-
Assertions for verafication of multilevel secure military message systems
-
contribution to Workshop on Formal Verification, SRI International, Menlo Park, Calif., April
-
Landwehr, C. E. “Assertions for verafication of multilevel secure military message systems,” contribution to Workshop on Formal Verification, SRI International, Menlo Park, Calif., April 1980
-
(1980)
-
-
Landwehr, C.E.1
-
49
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
July
-
Lipton, R. J., And Snyder, L. “A linear time algorithm for deciding subject security,” J ACM 24, 3 (July 1977), 455-464.
-
(1977)
J ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
50
-
-
0018320025
-
KSOS: The design of a secure operating system
-
AFIPS Press, Arlington, Va
-
Mccauley, E. J., And Drongowski, P.J. “KSOS: The design of a secure operating system,” in Proc. AFIPS Nat Computer Conf., vol 48, AFIPS Press, Arlington, Va., 1979, pp. 345-353.
-
(1979)
Proc. AFIPS Nat Computer Conf.
, vol.48
, pp. 345-353
-
-
Mccauley, E.J.1
Drongowski, P.J.2
-
51
-
-
0016951438
-
Security kernel validation in practme
-
May
-
Millen, J. K. “Security kernel validation in practme,” Commun. ACM 19, 5 (May 1976), 243-250.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
53
-
-
84976688714
-
Constramts and multilevel security
-
R A. DeMfllo, D. P. Dobkin, A. K. Jones, and R. J. Lipton (Eds.), Academic Press, New York
-
Millen, J.K. “Constramts and multilevel security,” In Foundatwns of Secure Computation, R A. DeMfllo, D. P. Dobkin, A. K. Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp 205-222
-
(1978)
Foundatwns of Secure Computation
, pp. 205-222
-
-
Millen, J.K.1
-
54
-
-
84976672107
-
Causal system security
-
ESD-TR-78-171, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct (MITRE MTR-3614)
-
Millen, J. K. “Causal system security,” ESD-TR-78-171, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. 1978 (MITRE MTR-3614).
-
(1978)
-
-
Millen, J.K.1
-
55
-
-
0347229432
-
A provably secure operating system. The system, its applications, and proofs
-
SRI International, Menlo Park, Calif., Feb
-
Neumann, P. G., Boyer, R. S., Feiertag, R. J., Levitt, K. N., And Robinson, L. “A provably secure operating system. The system, its applications, and proofs,” SRI International, Menlo Park, Calif., Feb. 1977.
-
(1977)
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
56
-
-
84976762601
-
Opnavinst 5239.1, Department of the Navy
-
Op-942E, April
-
Opnavinst 5239.1, Department of the Navy, Chief of Naval Operations, Op-942E, April 2, 1979.
-
(1979)
Chief of Naval Operations
, vol.2
-
-
-
58
-
-
84976661859
-
Using memory access control as the only protection mechanism
-
IRIA/LABORIA, Rocquencourt, France, Aug
-
Parnas D. L., And Price, W. R. “Using memory access control as the only protection mechanism,” in Proc. Int Workshop Protection in Operattng Systems, IRIA/LABORIA, Rocquencourt, France, Aug. 1974, 177-181.
-
(1974)
Proc. Int Workshop Protection in Operattng Systems
, pp. 177-181
-
-
Parnas, D.L.1
Price, W.R.2
-
59
-
-
84976725676
-
Access control models
-
ESD-TR-73-106 ESD/AFSC, L. G Hanscom Field, Bedford, Mass, Feb (NTIS AD-761 807)
-
Popek, G.J. “Access control models,” ESD-TR-73-106 ESD/AFSC, L. G Hanscom Field, Bedford, Mass, Feb 1973 (NTIS AD-761 807).
-
(1973)
-
-
Popek, G.J.1
-
60
-
-
0016674276
-
A verifiable protection system
-
June
-
Popek, G. J., And Kline, C. “A verifiable protection system,” in Proc Int. Conf. Reliable Software, ACM Sigplan Notices 10, 6 (June 1975), 294-304.
-
(1975)
Proc Int. Conf. Reliable Software, ACM Sigplan Notices
, vol.10
, Issue.6
, pp. 294-304
-
-
Popek, G.J.1
Kline, C.2
-
61
-
-
0018019384
-
A model for verification of data security in operating systems
-
Sept
-
Popek, G. J., And Farber, D. A. “A model for verification of data security in operating systems,” Commun ACM 21, 9 (Sept. 1978), 737-749.
-
(1978)
Commun ACM
, vol.21
, Issue.9
, pp. 737-749
-
-
Popek, G.J.1
Farber, D.A.2
-
62
-
-
84976863146
-
UCLA Secure Unix
-
UCLA Tech Rep. (Draft), Feb
-
Popek, G. J., Kline, C. S., And Walton, E. J. “UCLA Secure Unix,” UCLA Tech Rep. (Draft), Feb. 1978.
-
(1978)
-
-
Popek, G.J.1
Kline, C.S.2
Walton, E.J.3
-
63
-
-
0018322448
-
UCLA secure Unix
-
AFIPS Press, Arlington, Va
-
Popek, G. J., Kampe, M., Kline, C. S., Stoughton, A., Urban, M., And Walton, E. J. “UCLA secure Unix,” in Proc. AFIPS Nat. Computer Conf., vol. 48, AFIPS Press, Arlington, Va., 1979, pp 355-364.
-
(1979)
Proc. AFIPS Nat. Computer Conf.
, vol.48
, pp. 355-364
-
-
Popek, G.J.1
Kampe, M.2
Kline, C.S.3
Stoughton, A.4
Urban, M.5
Walton, E.J.6
-
64
-
-
84933366233
-
Implications of a vtrtual memory mechanism for implementing protection in a family of operating systems
-
Ph.D. dissertation, Carnegie-Mellon University, Pittsburgh, Pa
-
Price, W.R. “Implications of a vtrtual memory mechanism for implementing protection in a family of operating systems,” Ph.D. dissertation, Carnegie-Mellon University, Pittsburgh, Pa, 1973.
-
(1973)
-
-
Price, W.R.1
-
65
-
-
84976686145
-
A mechanism for mformation control m parallel systems
-
Dec
-
Reitman, R.P. “A mechanism for mformation control m parallel systems,” in Proc 7th Symp. Operating Systems Principles, ACM SIGOPS Operating Syst. Rev 13, 4 (Dec 1979), 55-63
-
(1979)
Proc 7th Symp. Operating Systems Principles, ACM SIGOPS Operating Syst. Rev
, vol.13
, Issue.4
, pp. 55-63
-
-
Reitman, R.P.1
-
66
-
-
84909476257
-
Special reference manual
-
3rd ed, SRI International, Menlo Park, Calif
-
Roubine, O., And Robinson, L. “Special reference manual,” 3rd ed, SRI International, Menlo Park, Calif., 1977.
-
(1977)
-
-
Roubine, O.1
Robinson, L.2
-
67
-
-
3042750861
-
Preliminary notes on the design of secure military computer systems
-
MCI-73-1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Jan
-
Schell, R. R., Downey, P. J., And Popek, G.J. “Preliminary notes on the design of secure military computer systems,” MCI-73-1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Jan. 1973
-
(1973)
-
-
Schell, R.R.1
Downey, P.J.2
Popek, G.J.3
-
68
-
-
77952276178
-
The design and specification of a security kernel for the PDP-11/45
-
ESD-TR-75-69, MITRE Corp., Bedford, Mass, March
-
Schiller, W. L. “The design and specification of a security kernel for the PDP-11/45,” ESD-TR-75-69, MITRE Corp., Bedford, Mass, March 1975.
-
(1975)
-
-
Schiller, W.L.1
-
69
-
-
84983183538
-
The Multics kernel design project
-
Nov
-
Schroeder, M. D., Clark, D. D., And Saltzer, J. H. “The Multics kernel design project,” in Proc. 6th ACM Symp. Operating Systems Principles, ACM SIGOPS Operating Syst Rev 11, 5 (Nov. 1977), 43-56.
-
(1977)
Proc. 6th ACM Symp. Operating Systems Principles, ACM SIGOPS Operating Syst Rev
, vol.11
, Issue.5
, pp. 43-56
-
-
Schroeder, M.D.1
Clark, D.D.2
Saltzer, J.H.3
-
70
-
-
0018479599
-
Linear queries in statistical databases
-
June
-
Schwartz, M. D., Denning, D. E., And Denning, P. J. “Linear queries in statistical databases,“ ACM Trans Database Syst. 4, 2 (June 1979), 156-167
-
(1979)
ACM Trans Database Syst.
, vol.4
, Issue.2
, pp. 156-167
-
-
Schwartz, M.D.1
Denning, D.E.2
Denning, P.J.3
-
71
-
-
84893640965
-
On the synthesis and analysis of protection systems
-
Nov
-
Snyder, L. “On the synthesis and analysis of protection systems,” Proc 6th Symp Operating Systems Principles, ACM SIGOPS Operating Syst. Rev 11, 5 (Nov. 1977), 141-150
-
(1977)
Proc 6th Symp Operating Systems Principles, ACM SIGOPS Operating Syst. Rev
, vol.11
, Issue.5
, pp. 141-150
-
-
Snyder, L.1
-
72
-
-
84910507346
-
Formal models of capability-based protection systems
-
Tech Rep 151, Dept. Computer Science, Yale Univ., New Haven, Conn, April
-
Snyder, L. “Formal models of capability-based protection systems,” Tech Rep 151, Dept. Computer Science, Yale Univ., New Haven, Conn, April 1979.
-
(1979)
-
-
Snyder, L.1
-
73
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
Feb
-
Walker, B J, Kemmerer, R A, And Popek, G.J. “Specification and verification of the UCLA Unix security kernel,” Commun. ACM 23, 2 (Feb. 1980), 118-131
-
(1980)
Commun. ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
74
-
-
3943068905
-
Primitive models for computer security
-
ESDTR-4-117, AF/ESD, Hanscom AFB, Bedford, Mass., Jan (NTIS AD-778 467)
-
Walter, K. G., Ogden, W. F., Rounds, W. C., Bradshaw, F. T., Ames, S. R., And Shumway, D. G. “Primitive models for computer security,” ESDTR-4-117, AF/ESD, Hanscom AFB, Bedford, Mass., Jan., 1974 (NTIS AD-778 467).
-
(1974)
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Shumway, D.G.6
-
75
-
-
0016726281
-
Structured specification of a security kernel
-
June 75
-
Walter, K. G., Schaen, S. I., Ogden, W. F., Rounds, W. C., Shumway, D. G., Schaeffer, D. D., Biba, K. J., Bradshaw, F. T., Ames, S. R., And Gilligan, J. M. “Structured specification of a security kernel,” in Proc. Int. Conf. Reliable Software, ACM SIGPLAN Notices 10, 6 (June 75), 285-293.
-
Proc. Int. Conf. Reliable Software, ACM SIGPLAN Notices
, vol.10
, Issue.6
, pp. 285-293
-
-
Walter, K.G.1
Schaen, S.I.2
Ogden, W.F.3
Rounds, W.C.4
Shumway, D.G.5
Schaeffer, D.D.6
Biba, K.J.7
Bradshaw, F.T.8
Ames, S.R.9
Gilligan, J.M.10
-
76
-
-
84961857319
-
Initial Structured Specifications for an uncompromlsable computer security system
-
ESD-TR-75-82, ESD/AFSC, Hanscom AFB, Bedford, Mass., July (NTIS AD-A022 49O)
-
Walter, K. G., Ogden, W. F., Gilligan, J. M., Schaeffer, D. D., Schaen, S. I., And Shumway, D. G. “Initial Structured Specifications for an uncompromlsable computer security system,” ESD-TR-75-82, ESD/AFSC, Hanscom AFB, Bedford, Mass., July 1975 (NTIS AD-A022 49O).
-
(1975)
-
-
Walter, K.G.1
Ogden, W.F.2
Gilligan, J.M.3
Schaeffer, D.D.4
Schaen, S.I.5
Shumway, D.G.6
-
77
-
-
4544284713
-
Security controls in the ADEPT-50 time sharing system
-
AFIPS Press, Arlington, Va
-
Weissman, C. “Security controls in the ADEPT-50 time sharing system,” Proc. 1969 AFIPS Fall Jt Computer Conf., vol. 35, AFIPS Press, Arlington, Va., pp. 119-133.
-
Proc. 1969 AFIPS Fall Jt Computer Conf.
, vol.35
, pp. 119-133
-
-
Weissman, C.1
-
78
-
-
84937350764
-
Military message experiment quick look report
-
III NRL Memorandum Rep. 3992, Naval Research Lab., Washington, D.C., April
-
Wilson, S. H., Kallander, J. W., Thomas, N. M., III, Klitzkie, L. C., And Bunch, J. R., Jr. “Military message experiment quick look report,” NRL Memorandum Rep. 3992, Naval Research Lab., Washington, D.C., April 1979, p. 10.
-
(1979)
, pp. 10
-
-
Wilson, S.H.1
Kallander, J.W.2
Thomas, N.M.3
Klitzkie, L.C.4
Bunch, J.R.5
-
79
-
-
84976652325
-
The trusted function in secure decentralized processing
-
MITRE MTR-3892, MITRE Corp., Bedford, Mass, Sept
-
Withington, P.T. “The trusted function in secure decentralized processing,” MITRE MTR-3892, MITRE Corp., Bedford, Mass, Sept. 1979.
-
(1979)
-
-
Withington, P.T.1
-
80
-
-
84976839322
-
The XIVUS environment XIVUS working paper no. 1
-
USC/Information Sciences Institute, Marina del Rey, Calif., April
-
Yonke, M. D. “The XIVUS environment XIVUS working paper no. 1,” USC/Information Sciences Institute, Marina del Rey, Calif., April 1976.
-
(1976)
-
-
Yonke, M.D.1
-
81
-
-
0004200684
-
Computer security technology planning study
-
Tech. Rep ESD-TR-73-51 James P. Anderson and Co., Fort Washington, Pa., Oct
-
Anderson, J.P. “Computer security technology planning study,” Tech. Rep ESD-TR-73-51, vols. 1 and 2, James P. Anderson and Co., Fort Washington, Pa., Oct. 1972.
-
(1972)
, vol.1-2
-
-
Anderson, J.P.1
|