-
1
-
-
0016555241
-
The protection and control of information sharing in computer systems
-
Sept.
-
J. H. Saltzer and M. Schroeder, “The protection and control of information sharing in computer systems,” Proc. IEEE, vol. 63, no. 9, Sept. 1975.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.2
-
2
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning, “A lattice model of secure information flow,” Commun. ACM, vol. 19, no. 5, pp. 236–243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
3
-
-
66749185396
-
-
MITRE Corp., Bedford, MA, Tech. Rep. ESD-TR-75-306, June
-
D. E. Bell and L. J. LaPadula, “Computer security model: Unified exposition and multics interpretation,” MITRE Corp., Bedford, MA, Tech. Rep. ESD-TR-75-306, June 1975.
-
(1975)
Computer security model: Unified exposition and multics interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
77952249782
-
-
Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Tech. Rep. ESD-TR-74-176, Dec.
-
J. Whitmore et al., “Design for multics security enhancements,” Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Tech. Rep. ESD-TR-74-176, Dec. 1973.
-
(1973)
Design for multics security enhancements
-
-
Whitmore, J.1
-
5
-
-
84958951541
-
Program confinement in KVM/370
-
Seattle, WA. New York: ACM, Oct.
-
M. Schaefer, B. Gold, R. Linde, and J. Scheid, “Program confinement in KVM/370,” in Proc. 1977 Annu. ACM Conf., Seattle, WA. New York: ACM, Oct. 1977, pp. 404–410.
-
(1977)
Proc. 1977 Annu. ACM Conf.
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
6
-
-
15944417953
-
KSOS development methodology for a secure operating system
-
New York, June
-
T. A. Berson and G. L. Barksdale, “KSOS development methodology for a secure operating system,” in Proc. Nat. Comput. Conf., New York, June 1979.
-
(1979)
Proc. Nat. Comput. Conf.
-
-
Berson, T.A.1
Barksdale, G.L.2
-
7
-
-
0020778471
-
SCOMP: A solution to the multilevel security problem
-
July
-
L. J. Fraim, “SCOMP: A solution to the multilevel security problem,” Computer, pp. 26–34, July 1983.
-
(1983)
Computer
, pp. 26-34
-
-
Fraim, L.J.1
-
8
-
-
84941520546
-
SE/VMS: Implementing mandatory security in VAX/VMS
-
Gaithersburg, MD, Sept.
-
S. Blotcky, K. Lynch, and S. Lipner, “SE/VMS: Implementing mandatory security in VAX/VMS,” in Proc. 9th Nat. Comput. Security Conf., Gaithersburg, MD, Sept. 1986, pp. 47–54.
-
(1986)
Proc. 9th Nat. Comput. Security Conf.
, pp. 47-54
-
-
Blotcky, S.1
Lynch, K.2
Lipner, S.3
-
9
-
-
0023293654
-
Design and implementation of secure Xenix
-
Feb.
-
V. D. Gligor et al., “Design and implementation of secure Xenix,” IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 208–221, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 208-221
-
-
Gligor, V.D.1
-
10
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson, “A note on the confinement problem,” Commun. ACM, vol. 16, no. 10, pp. 842–856, Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 842-856
-
-
Lampson, B.W.1
-
11
-
-
84945721946
-
A comment on the confinement problem
-
Nov.
-
S. B. Lipner, “A comment on the confinement problem,” ACM Operat. Syst. Rev., vol. 9, no. 5, pp. 192–196, Nov. 1975.
-
(1975)
ACM Operat. Syst. Rev.
, vol.9
, Issue.5
, pp. 192-196
-
-
Lipner, S.B.1
-
12
-
-
84987646334
-
The enforcement of security policies for computation
-
Nov.
-
A. K. Jones and R. J. Lipton, “The enforcement of security policies for computation,” ACM Operat. Syst. Rev. (Proc. 5th Symp. Operat. Syst. Principles), vol. 9, no. 5, pp. 197–206, Nov. 1975.
-
(1975)
ACM Operat. Syst. Rev. (Proc. 5th Symp. Operat. Syst. Principles)
, vol.9
, Issue.5
, pp. 197-206
-
-
Jones, A.K.1
Lipton, R.J.2
-
15
-
-
0003400255
-
Integrity considerations for secure computer systems
-
USAF Electron. Syst. Division. Bedford, MA, Tech. Rep. ESD-TR-76, 372, Apr.
-
K. J. Biba, “Integrity considerations for secure computer systems,” USAF Electron. Syst. Division. Bedford, MA, Tech. Rep. ESD-TR-76, 372, Apr. 1977.
-
(1977)
-
-
Biba, K.J.1
-
16
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, Apr.
-
D. D. Clark and D. R. Wilson, “A comparison of commercial and military computer security policies,” in Proc. 1987 IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1987, pp. 184–194.
-
(1987)
Proc. 1987 IEEE Symp. Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
17
-
-
0016951438
-
Security kernel validation in practice
-
May
-
J. K. Millen, “Security kernel validation in practice,” Commun. ACM, vol. 19, no. 5, pp. 243–250, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
18
-
-
0023292228
-
An experience using two covert channel analysis techniques on a real system design
-
Feb.
-
T.J. Haigh et al., “An experience using two covert channel analysis techniques on a real system design,” IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 157–168, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 157-168
-
-
Haigh, T.J.1
-
19
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
Aug.
-
R. A. Kemmerer, “Shared resource matrix methodology: An approach to identifying storage and timing channels,” ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256–277, Aug. 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
20
-
-
0021138308
-
Analysis of a kernel verification
-
Oakland, CA, Apr.
-
T. C. Vickers-Benzel, “Analysis of a kernel verification,” in Proc. 1984 IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1984, pp. 125–131.
-
(1984)
Proc. 1984 IEEE Symp. Security and Privacy
, pp. 125-131
-
-
Vickers-Benzel, T.C.1
-
21
-
-
33646822696
-
-
Ph.D. dissertation, Dep. Elec. Eng., Univ. Maryland, College Park, Aug.
-
C. R. Tsai, “Covert-channel analysis in secure computer systems,” Ph.D. dissertation, Dep. Elec. Eng., Univ. Maryland, College Park, Aug. 1987.
-
(1987)
Covert-channel analysis in secure computer systems
-
-
Tsai, C.R.1
-
22
-
-
0024665833
-
Symbol security condition considered harmful
-
Oakland, CA, Apr.
-
M. Schaefer, “Symbol security condition considered harmful,” in Proc. 1989 IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1989, pp. 20–46.
-
(1989)
Proc. 1989 IEEE Symp. Security and Privacy
, pp. 20-46
-
-
Schaefer, M.1
-
24
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning, “Certification of programs for secure information flow,” Commun. ACM, vol. 20, no. 7, pp. 504–513, July 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
25
-
-
84976840591
-
An axiomatic approach to information flow in programs
-
Jan.
-
G. R. Andrews and R. P. Reitman, “An axiomatic approach to information flow in programs,” ACM Trans. Program. Lang. Syst., vol. 2, no. 1, pp. 56–76, Jan. 1980.
-
(1980)
ACM Trans. Program. Lang. Syst.
, vol.2
, Issue.1
, pp. 56-76
-
-
Andrews, G.R.1
Reitman, R.P.2
-
26
-
-
84939705863
-
The interpretation of the Bell-LaPadula model in Secure Xenix
-
Gaithersburg, MD, Sept.
-
G. Luckenbaugh et al., “The interpretation of the Bell-LaPadula model in Secure Xenix,” in Proc. 9th DOD/NBS Nat. Computer Security Conf., Gaithersburg, MD, Sept. 1986, pp. 113–125.
-
(1986)
Proc. 9th DOD/NBS Nat. Computer Security Conf.
, pp. 113-125
-
-
Luckenbaugh, G.1
-
27
-
-
84941520098
-
Resolving covert channels within a B2 class secure system
-
July
-
K. Loepere, “Resolving covert channels within a B2 class secure system,” ACM Operating Syst. Rev., vol. 19, no. 3, pp. 4–28, July 1985.
-
(1985)
ACM Operating Syst. Rev.
, vol.19
, Issue.3
, pp. 4-28
-
-
Loepere, K.1
|