-
1
-
-
0018806907
-
Security Kernels: Are they the Answer to the Computer Security Problem?
-
Presented at the, San Francisco, CA
-
Ames, S.R. Jr.., “Security Kernels: Are they the Answer to the Computer Security Problem?”, Presented at the 1979 WESCON Professional Program, San Francisco, CA. (September 1979).
-
(1979)
WESCON Professional Program
-
-
Ames, S.R.1
-
3
-
-
0016873760
-
Penetrating an Operating System: A Study of VM/370 Integrity
-
Attanasio, C.R., P.W. Markstein, and R.J. Phillips, “Penetrating an Operating System: a Study of VM/370 Integrity”, IBM Systems Journal Vol. 15(1), pp.102–116 (1976).
-
(1976)
IBM Systems Journal
, vol.15
, Issue.1
, pp. 102-116
-
-
Attanasio, C.R.1
Markstein, P.W.2
Phillips, R.J.3
-
5
-
-
85072523275
-
KSOS - Development Methodology for a Secure Operating System
-
Berson, T.A. and G.L. Barksdale Jr.., “KSOS - Development Methodology for a Secure Operating System”, AFIPS Conference Proceedings Vol. 48, pp. 365–371 (1979).
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 365-371
-
-
Berson, T.A.1
Barksdale, G.L.2
-
6
-
-
85034220137
-
-
Technical Report 170, Computing Laboratory, University of Newcastle upon Tyne, England, To appear in Acta Informatica)
-
Cristian, F., “Robust Data Types”, Technical Report 170, Computing Laboratory, University of Newcastle upon Tyne, England (1981). (To appear in Acta Informatica).
-
(1981)
Robust Data Types
-
-
Cristian, F.1
-
7
-
-
84976738413
-
Proving Multilevel Security of a System Design
-
Feiertag, R.J., K.N. Levitt, and L. Robinson, “Proving Multilevel Security of a System Design”, Proceedings of the Sixth ACM Symposium on Operating System Principles, pp.57–65 (1977).
-
(1977)
Proceedings of the Sixth ACM Symposium on Operating System Principles
, pp. 57-65
-
-
Feiertag, R.J.1
Levitt, K.N.2
Robinson, L.3
-
8
-
-
0003562729
-
-
CSL-109, SRI International, Menlo Park, CA, January
-
Feiertag, R.J., “A Technique for Proving Specifications are Multilevel Secure”, CSL-109, SRI International, Menlo Park, CA. (January 1980).
-
(1980)
A Technique for Proving Specifications are Multilevel Secure
-
-
Feiertag, R.J.1
-
9
-
-
84976834237
-
-
WDL-TR7809, Ford Aerospace and Communications Corporation, Palo Alto, CA. (March
-
“KSOS Verification Plan”, WDL-TR7809, Ford Aerospace and Communications Corporation, Palo Alto, CA. (March 1978).
-
(1978)
KSOS Verification Plan
-
-
-
10
-
-
85034225214
-
-
SRI International, Menlo Park, CA
-
Goguen, J.A. and J. Meseuger, “Security Policies and Security Models”, Internal Report, SRI International, Menlo Park, CA. (December 1981).
-
(1981)
Security Policies and Security Models, Internal Report
-
-
Goguen, J.A.1
Meseuger, J.2
-
11
-
-
85072542009
-
A Security Retrofit of VM/370
-
Gold, B.D. et al., “A Security Retrofit of VM/370”, AFIPS Conference Proceedings Vol. 48, pp.335–344 (1979).
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 335-344
-
-
Gold, B.D.1
-
12
-
-
85034225567
-
-
Draft, Mitre Corporation, Bedford, MA
-
Hathaway, A., “LSI Guard System Specification (type A)”, Draft, Mitre Corporation, Bedford, MA. (July 1980).
-
(1980)
LSI Guard System Specification (Type A)
-
-
Hathaway, A.1
-
13
-
-
0018907788
-
A Penetration Analysis of the Michigan Terminal System
-
Hebbard, B. et al., “A Penetration Analysis of the Michigan Terminal System”, ACM Operating Systems Review Vol. 14(1), pp.7–20 (January 1980).
-
(1980)
ACM Operating Systems Review
, vol.14
, Issue.1
, pp. 7-20
-
-
Hebbard, B.1
-
14
-
-
0015672289
-
A Note on the Confinement Problem
-
Lampson, B.W., “A Note on the Confinement Problem”, CACM Vol. 16(10), pp.613–615 (October 1973).
-
(1973)
CACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
15
-
-
0016600186
-
Operating System Penetration
-
Linde, R.R., “Operating System Penetration”, AFIPS Conference Proceedings Vol. 44, pp.361–368 (1975).
-
(1975)
AFIPS Conference Proceedings
, vol.44
, pp. 361-368
-
-
Linde, R.R.1
-
16
-
-
0016951438
-
Security Kernel Validation in Practice
-
Millen, J.K., “Security Kernel Validation in Practice”, CACM Vol. 19(5), pp.243–250 (May 1976).
-
(1976)
CACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
18
-
-
0018019384
-
A Model for Verification of Data Security in Operating Systems
-
Popek, G.J. and D.A. Farber, “A Model for Verification of Data Security in Operating Systems”, CACM Vol. 21(9), pp.737–749 (September 1978).
-
(1978)
CACM
, vol.21
, Issue.9
, pp. 737-749
-
-
Popek, G.J.1
Farber, D.A.2
-
19
-
-
85041481084
-
The Design and Verification of Secure Systems
-
Asilomar, CA., December
-
Rushby, J.M., “The Design and Verification of Secure Systems”, Proceedings of the 8th ACM Symposium on Operating System Principles, Asilomar, CA., pp.12–21 (December 1981).
-
(1981)
Proceedings of the 8Th ACM Symposium on Operating System Principles
, pp. 12-21
-
-
Rushby, J.M.1
-
20
-
-
84909774589
-
-
Technical Report, Computing Laboratory, University of Newcastle upon Tyne
-
Rushby, J.M., “Verification of Secure Systems”, Technical Report No. 166, Computing Laboratory, University of Newcastle upon Tyne (September 1981).
-
(1981)
Verification of Secure Systems
, vol.166
-
-
Rushby, J.M.1
-
21
-
-
33748188187
-
A Penetration Study of a Burroughs Large System
-
Wilkinson, A.L. et al., “A Penetration Study of a Burroughs Large System”, ACM Operating Systems Review Vol. 15(1), pp.14–25 (January 1981).
-
(1981)
ACM Operating Systems Review
, vol.15
, Issue.1
, pp. 14-25
-
-
Wilkinson, A.L.1
-
22
-
-
85072531344
-
Applications for Multilevel Secure Operating Systems
-
Woodward, J.P.L., “Applications for Multilevel Secure Operating Systems”, AFIPS Conference Proceedings Vol. 48, pp.319–328 (1979).
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 319-328
-
-
Woodward, J.P.L.1
|