메뉴 건너뛰기




Volumn 19, Issue 3, 1997, Pages 41-59

Mathematics, technology, and trust: Formal verification, computer security, and the U.S. Military

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; TIME SHARING SYSTEMS; COMPUTER SYSTEMS; CRYPTOGRAPHY; HISTORY; TECHNOLOGY;

EID: 0031173082     PISSN: 10586180     EISSN: None     Source Type: Journal    
DOI: 10.1109/85.601735     Document Type: Article
Times cited : (30)

References (145)
  • 2
    • 0040670932 scopus 로고    scopus 로고
    • Minneapolis, Minn.: Charles Babbage Institute, Oct. chapter 1 and appendix 1
    • For a good description of batch operation and of the shift to time-sharing, see A.L. Norberg and J.E. O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency. Minneapolis, Minn.: Charles Babbage Institute, Oct. 1992, chapter 1 and appendix 1; an amended version of this report has been published as Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986. Baltimore, Md.: Johns Hopkins Univ. Press, 1996.
    • (1992) A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency
    • Norberg, A.L.1    O'Neill, J.E.2
  • 3
    • 0003911490 scopus 로고    scopus 로고
    • Baltimore, Md.: Johns Hopkins Univ. Press
    • For a good description of batch operation and of the shift to time-sharing, see A.L. Norberg and J.E. O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency. Minneapolis, Minn.: Charles Babbage Institute, Oct. 1992, chapter 1 and appendix 1; an amended version of this report has been published as Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986. Baltimore, Md.: Johns Hopkins Univ. Press, 1996.
    • (1996) Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986
  • 4
    • 0003856021 scopus 로고
    • Cambridge, Mass.: MIT Press
    • K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
    • (1985) A Century of Electrical Engineering and Computer Science at MIT, 1882-1982 , pp. 348
    • Wildes, K.L.1    Lindgren, N.A.2
  • 5
    • 0141725361 scopus 로고    scopus 로고
    • K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
    • Transforming Computer Technology
    • Norberg1    O'Neill2
  • 6
    • 0003756768 scopus 로고    scopus 로고
    • Cambridge, Mass.: MIT Press
    • K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
    • (1996) The Closed World: Computers and the Politics of Discourse in Cold War America
    • Edwards, P.N.1
  • 7
    • 0345533636 scopus 로고
    • Segmentation and the Design of Multiprogrammed Computer Systems
    • See, for example, J.B. Dennis, "Segmentation and the Design of Multiprogrammed Computer Systems," J. ACM, vol. 12, pp. 589-602, esp. 599, 1965.
    • (1965) J. ACM , vol.12 , pp. 589-602
    • Dennis, J.B.1
  • 9
    • 0004196079 scopus 로고
    • Bedford, Mass.: Digital Press
    • Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
    • (1980) Project Whirlwind: the History of A Pioneer Computer
    • Redmond, K.C.1    Smith, T.M.2
  • 10
    • 0039648207 scopus 로고
    • Santa Monica, Calif.: System Development Corporation
    • Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
    • (1981) The System Builders: the Story of SDC
    • Baum, C.1
  • 11
    • 0040074232 scopus 로고    scopus 로고
    • Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
    • The Closed World
    • Edwards1
  • 13
    • 3943054582 scopus 로고    scopus 로고
    • personal communication to D. MacKenzie, 17 Oct.
    • W.H. Ware, personal communication to D. MacKenzie, 17 Oct. 1996.
    • (1996)
    • Ware, W.H.1
  • 14
    • 84947659582 scopus 로고
    • Security and Privacy in Computer Systems
    • Washington, D.C.: Thompson Books
    • W.H. Ware, "Security and Privacy in Computer Systems," AFIPS Conf. Proc., Spring Joint Computer Conf. Washington, D.C.: Thompson Books, vol. 30, pp. 279-282, at p. 279, 1967.
    • (1967) AFIPS Conf. Proc., Spring Joint Computer Conf. , vol.30 , pp. 279-282
    • Ware, W.H.1
  • 15
    • 84976815513 scopus 로고
    • Security Considerations in a Multi-Programmed Computer System
    • Washington, D.C.: Thompson Books, 1967
    • B. Peters, "Security Considerations in a Multi-Programmed Computer System," AFIPS Conf. Proc., Spring Joint Computer Conf. Washington, D.C.: Thompson Books, 1967, vol. 30, pp. 283-286, at p. 283, 1967.
    • (1967) AFIPS Conf. Proc., Spring Joint Computer Conf. , vol.30 , pp. 283-286
    • Peters, B.1
  • 20
    • 3943054583 scopus 로고    scopus 로고
    • personal communication to D. MacKenzie, 17 Oct.
    • W.H. Ware, personal communication to D. MacKenzie, 17 Oct. 1996.
    • (1996)
    • Ware, W.H.1
  • 21
    • 0006291871 scopus 로고
    • Santa Monica, Calif.: Rand Corporation, Feb. R-609. Originally classified "confidential," the report was declassified in Oct. 1975. The quotations are from Ware's foreword to the version reissued by Rand in Oct. 1979 and from p. 18 of the latter
    • W.H. Ware, ed., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security. Santa Monica, Calif.: Rand Corporation, Feb. 1970, R-609. Originally classified "confidential," the report was declassified in Oct. 1975. The quotations are from Ware's foreword to the version reissued by Rand in Oct. 1979 and from p. 18 of the latter.
    • (1970) Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security
    • Ware, W.H.1
  • 23
    • 3943093763 scopus 로고    scopus 로고
    • R. Schell, telephone interview by G. Pottinger, 10 Oct. 1993
    • R. Schell, telephone interview by G. Pottinger, 10 Oct. 1993.
  • 24
    • 3943058039 scopus 로고    scopus 로고
    • personal communication to D. MacKenzie, 21 Oct.
    • W.H. Ware, personal communication to D. MacKenzie, 21 Oct. 1996.
    • (1996)
    • Ware, W.H.1
  • 25
    • 3943106618 scopus 로고
    • Bedford, Mass.: HQ Electronic Systems Division, U.S. Air Force, ESDF-TR-73-51
    • J.P. Anderson, Computer Security Technology Planning Study. Bedford, Mass.: HQ Electronic Systems Division, U.S. Air Force, 1972, ESDF-TR-73-51, vol. 1, pp. 3 and 33.
    • (1972) Computer Security Technology Planning Study , vol.1 , pp. 3
    • Anderson, J.P.1
  • 27
    • 3943108716 scopus 로고
    • Computer Security: The Achilles' Heel of the Electronic Air Force?
    • Jan.-Feb.
    • R.R. Schell, "Computer Security: The Achilles' Heel of the Electronic Air Force?" Air Univ. Rev., vol. 30, pp. 16-33, at pp. 28-29, Jan.-Feb. 1979.
    • (1979) Air Univ. Rev. , vol.30 , pp. 16-33
    • Schell, R.R.1
  • 30
    • 3943101212 scopus 로고
    • Bedford Mass.: Electronic Systems Division, Dec. ESD-TR-73-294
    • W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
    • (1973) Design of A Security Kernel for the PDP-11/45
    • Schiller, W.L.1
  • 31
    • 3943077039 scopus 로고    scopus 로고
    • Computer Security
    • W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
    • Design of A Security Kernel for the PDP-11/45 , pp. 28
    • Schell1
  • 32
    • 3943094480 scopus 로고    scopus 로고
    • op. cit.
    • W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
    • A Century , pp. 300
    • Wildes1    Lindgren2
  • 33
    • 3943108716 scopus 로고
    • Computer Security: The Achilles Heel of the Electronic Air Force?
    • Jan.-Feb.
    • R.R. Schell, "Computer Security: The Achilles Heel of the Electronic Air Force?" Air Univ. Rev., vol. 30, pp. 16-33, at p. 31, Jan.-Feb. 1979.
    • (1979) Air Univ. Rev. , vol.30 , pp. 16-33
    • Schell, R.R.1
  • 38
    • 4544284713 scopus 로고
    • Security Controls in the ADEPT-50 Time-Sharing System
    • quotation at p. 122
    • C. Weissman, "Security Controls in the ADEPT-50 Time-Sharing System," Proc. FJCC, vol. 5, pp. 119-131, quotation at p. 122, 1969.
    • (1969) Proc. FJCC , vol.5 , pp. 119-131
    • Weissman, C.1
  • 39
    • 3943067560 scopus 로고    scopus 로고
    • Anderson panel, op. cit., vol. 1, p. 4.
    • Proc. FJCC , vol.1 , pp. 4
  • 41
    • 3943088188 scopus 로고
    • Bedford, Mass: Air Force Electronic Systems Division, Nov. ESD-TR-73-278
    • D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
    • (1973) Secure Computer Systems: Mathematical Foundations , vol.1
    • Bell, D.E.1    LaPadula, L.J.2
  • 42
    • 3943056662 scopus 로고    scopus 로고
    • personal communication to D. MacKenzie, 29 Oct.
    • D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
    • (1996)
    • LaPadula, L.J.1
  • 43
    • 0003575258 scopus 로고
    • New York: Academic Press
    • D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
    • (1970) Theory of Hierarchical, Multilevel, Systems
    • Mesarovic, M.D.1    Macko, D.2    Takahara, Y.3
  • 44
  • 54
    • 0020780166 scopus 로고
    • The Best Available Technologies for Computer Security
    • C.E. Landwehr, "The Best Available Technologies for Computer Security," Computer, vol. 16, pp. 86-100, at p. 96, 1983.
    • (1983) Computer , vol.16 , pp. 86-100
    • Landwehr, C.E.1
  • 55
    • 33846152122 scopus 로고    scopus 로고
    • Anderson panel, op. cit., 10.
    • Computer , pp. 10
  • 57
    • 0017478274 scopus 로고
    • Proof Techniques for Hierarchically Structured Programs
    • L. Robinson and K.N. Levitt, "Proof Techniques for Hierarchically Structured Programs," Comm. ACM, vol. 20, pp. 271-283, 1977.
    • (1977) Comm. ACM , vol.20 , pp. 271-283
    • Robinson, L.1    Levitt, K.N.2
  • 59
    • 85072519230 scopus 로고
    • The Foundations of a Provably Secure Operating System (PSOS)
    • New York: AFIPS
    • R.J. Feiertag and P.G. Neumann, "The Foundations of a Provably Secure Operating System (PSOS)," National Computer Conference. New York: AFIPS, 1979, pp. 329-343.
    • (1979) National Computer Conference , pp. 329-343
    • Feiertag, R.J.1    Neumann, P.G.2
  • 60
    • 3943114117 scopus 로고    scopus 로고
    • P. Neumann interviewed by A.J. Dale, Menlo Park, Calif., 25 Mar. 1994
    • P. Neumann interviewed by A.J. Dale, Menlo Park, Calif., 25 Mar. 1994.
  • 70
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, pp. 613-615, 1973.
    • (1973) Comm. ACM , vol.16 , pp. 613-615
    • Lampson, B.W.1
  • 71
    • 3943114118 scopus 로고    scopus 로고
    • Design of a Security Kernel
    • Schiller et al., "Design of a Security Kernel," op. cit., p. 7; C.E. Landwehr, "Formal Models for Computer Security," Computing Surveys, vol. 13, pp. 247-278, at p. 252, Sept. 1981.
    • Comm. ACM , pp. 7
    • Schiller1
  • 72
    • 0019608720 scopus 로고
    • Formal Models for Computer Security
    • Sept.
    • Schiller et al., "Design of a Security Kernel," op. cit., p. 7; C.E. Landwehr, "Formal Models for Computer Security," Computing Surveys, vol. 13, pp. 247-278, at p. 252, Sept. 1981.
    • (1981) Computing Surveys , vol.13 , pp. 247-278
    • Landwehr, C.E.1
  • 74
    • 84958951541 scopus 로고
    • Program Confinement in KVM/370
    • New York: Association for Computing Machinery
    • See, e.g., M. Schaefer, B. Gold, R. Linde, and J. Scheid, "Program Confinement in KVM/370," ACM 77: Proceedings of the Annual Conference. New York: Association for Computing Machinery 1977, pp. 404-410; J.T. Haigh, R.A. Kemmerer, J. McHugh, and W.D. Young, "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Transactions on Software Engineering, vol. 13, pp. 157-168, 1987.
    • (1977) ACM 77: Proceedings of the Annual Conference , pp. 404-410
    • Schaefer, M.1    Gold, B.2    Linde, R.3    Scheid, J.4
  • 75
    • 0023292228 scopus 로고
    • An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
    • See, e.g., M. Schaefer, B. Gold, R. Linde, and J. Scheid, "Program Confinement in KVM/370," ACM 77: Proceedings of the Annual Conference. New York: Association for Computing Machinery 1977, pp. 404-410; J.T. Haigh, R.A. Kemmerer, J. McHugh, and W.D. Young, "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Transactions on Software Engineering, vol. 13, pp. 157-168, 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.13 , pp. 157-168
    • Haigh, J.T.1    Kemmerer, R.A.2    McHugh, J.3    Young, W.D.4
  • 76
    • 0016951438 scopus 로고
    • Security Kernel Validation in Practice
    • See, e.g., J.K. Millen, "Security Kernel Validation in Practice," Comm. ACM, vol. 19, pp. 244-250, 1976.
    • (1976) Comm. ACM , vol.19 , pp. 244-250
    • Millen, J.K.1
  • 77
    • 0016984825 scopus 로고
    • Protection in Operating Systems
    • M.A. Harrison, W.L. Ruzzo, and J.C. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, pp. 461-471, at p. 470, 1976.
    • (1976) Comm. ACM , vol.19 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.C.3
  • 78
    • 3943061369 scopus 로고    scopus 로고
    • Program Confinement in KVM/370
    • Schaefer et al., "Program Confinement in KVM/370," op. cit., p. 409.
    • Comm. ACM , pp. 409
    • Schaefer1
  • 79
    • 0004253615 scopus 로고
    • London: Sphere
    • See D. Kahn, The Codebreakers. London: Sphere, 1973; and J. Barnford, The Puzzle Palace: A Report on America's Most Secret Agency. Boston: Houghton Mifflin, 1982.
    • (1973) The Codebreakers
    • Kahn, D.1
  • 81
    • 3943093761 scopus 로고
    • Cambridge, Mass.: Harvard Univ., Center for Information Policy Research, June P-85-8
    • G.F. Jelen, Information Security: An Elusive Goal. Cambridge, Mass.: Harvard Univ., Center for Information Policy Research, June 1985, P-85-8, pp. III-43, I-II.
    • (1985) Information Security: An Elusive Goal
    • Jelen, G.F.1
  • 84
    • 3943109384 scopus 로고    scopus 로고
    • parenthetical remark in original
    • Anderson panel, op. cit., vol. 1, p. 4, parenthetical remark in original.
    • Transforming Computer Technology , vol.1 , pp. 4
  • 87
    • 3943099175 scopus 로고    scopus 로고
    • S.T. Walker, interviewed by G. Pottinger, Glenwood, Md., 24 Mar. 1993
    • S.T. Walker, interviewed by G. Pottinger, Glenwood, Md., 24 Mar. 1993.
  • 90
    • 46149145265 scopus 로고
    • A Plan for the Evaluation of Trusted Computer Systems
    • type-script, 22 Feb. reprinted in Jelen, op. cit.
    • "A Plan for the Evaluation of Trusted Computer Systems," type-script, 22 Feb. 1980, reprinted in Jelen, Information Security, op. cit., pp. V-2 to V-9.
    • (1980) Information Security
  • 91
    • 3943053216 scopus 로고    scopus 로고
    • Walker interview
    • Walker interview.
  • 94
    • 3943107317 scopus 로고    scopus 로고
    • as interviewed by G. Jelen, as quoted in Jelen, op. cit.
    • Admiral B.R. Inman, as interviewed by G. Jelen, as quoted in Jelen, Information Security, op. cit., p. II-81.
    • Information Security
    • Inman, B.R.1
  • 95
    • 3943100506 scopus 로고    scopus 로고
    • personal communication to D. MacKenzie, 22 Aug.
    • S.T. Walker, personal communication to D. MacKenzie, 22 Aug. 1996.
    • (1996)
    • Walker, S.T.1
  • 96
    • 46149153066 scopus 로고
    • Computer Security Evaluation Center
    • Department of Defense Directive 5215.1, 25 Oct. reproduced in Jelen, op. cit.
    • F.C. Carlucci, Department of Defense Directive 5215.1, "Computer Security Evaluation Center," 25 Oct. 1982, reproduced in Jelen, Information Security, op. cit., pp. V-11 to V-17.
    • (1982) Information Security
    • Carlucci, F.C.1
  • 98
    • 3943087498 scopus 로고
    • Thoughts on the Impact of Verification Technology on Trusted Computer Systems (and Vice Versa)
    • July
    • S.T. Walker, "Thoughts on the Impact of Verification Technology on Trusted Computer Systems (and Vice Versa)," Software Engineering Notes, vol. 5, p. 8, July 1980.
    • (1980) Software Engineering Notes , vol.5 , pp. 8
    • Walker, S.T.1
  • 99
    • 0023207669 scopus 로고
    • Coding for a Believable Specification to Implementation Mapping
    • Washington, D.C., emphasis in original
    • W.D. Young and J. McHugh, "Coding for a Believable Specification to Implementation Mapping," IEEE Computer Society Symp. Security and Privacy, pp. 140-148, at p. 140, Washington, D.C., 1987, emphasis in original.
    • (1987) IEEE Computer Society Symp. Security and Privacy , pp. 140-148
    • Young, W.D.1    McHugh, J.2
  • 100
    • 0003969633 scopus 로고
    • Washington, D.C.: Department of Defense, Dec. DOD 5200.28-STD
    • Department of Defense, Trusted Computer System Evaluation Criteria. Washington, D.C.: Department of Defense, Dec. 1985, DOD 5200.28-STD, pp. 19, 26, 40, and 50.
    • (1985) Trusted Computer System Evaluation Criteria , pp. 19
  • 104
    • 3943066881 scopus 로고
    • Verification Technology and the A1 Criteria
    • Aug.
    • T.C.V. Benzel, "Verification Technology and the A1 Criteria," Software Engineering Notes, vol. 10, pp. 108-109, at p. 109, Aug. 1985.
    • (1985) Software Engineering Notes , vol.10 , pp. 108-109
    • Benzel, T.C.V.1
  • 107
    • 3943059331 scopus 로고
    • personal communication to G. Pottinger, 18 Dec.
    • C. Weissman, personal communication to G. Pottinger, 18 Dec. 1993.
    • (1993)
    • Weissman, C.1
  • 108
    • 3943080492 scopus 로고
    • Ibid.
    • (1993)
  • 109
    • 0026851778 scopus 로고
    • Blacker: Security for the DDN. Examples of A1 Security Engineering Trades
    • C. Weissman, "Blacker: Security for the DDN. Examples of A1 Security Engineering Trades," IEEE Computer Society Symp. Research in Security and Privacy, pp. 286-292, at p. 289, 1992. This paper was presented by Weissman to the 1988 IEEE Symp. Research and Privacy, but "not published at that time because of a four year rescission of publication release," ibid., p. 286.
    • (1992) IEEE Computer Society Symp. Research in Security and Privacy , pp. 286-292
    • Weissman, C.1
  • 110
    • 0026851778 scopus 로고
    • ibid.
    • C. Weissman, "Blacker: Security for the DDN. Examples of A1 Security Engineering Trades," IEEE Computer Society Symp. Research in Security and Privacy, pp. 286-292, at p. 289, 1992. This paper was presented by Weissman to the 1988 IEEE Symp. Research and Privacy, but "not published at that time because of a four year rescission of publication release," ibid., p. 286.
    • (1988) IEEE Symp. Research and Privacy , pp. 286
    • Weissman1
  • 114
    • 0004184890 scopus 로고
    • Washington, D.C.: National Academy Press
    • National Research Council, System Security Study Committee, Computers at Risk: Safe Computing in the Information Age. Washington, D.C.: National Academy Press, 1991, p. 195.
    • (1991) Computers at Risk: Safe Computing in the Information Age , pp. 195
  • 115
    • 3943110773 scopus 로고
    • personal communication to G. Pottinger, 22 Oct.
    • S. Lipner, personal communication to G. Pottinger, 22 Oct. 1993.
    • (1993)
    • Lipner, S.1
  • 123
    • 3943084655 scopus 로고    scopus 로고
    • C. Bonneau, telephone interview by G. Pottinger, 20 Nov. 1993
    • C. Bonneau, telephone interview by G. Pottinger, 20 Nov. 1993.
  • 125
    • 3943053217 scopus 로고    scopus 로고
    • op. cit.
    • National Research Council, Computers at Risk, op. cit., p. 143.
    • Computers at Risk , pp. 143
  • 127
    • 3943053217 scopus 로고    scopus 로고
    • op. cit.
    • National Research Council, Computers at Risk, op. cit., p. 154.
    • Computers at Risk , pp. 154
  • 129
    • 3943103935 scopus 로고    scopus 로고
    • Verification Technology
    • Benzel, "Verification Technology," op. cit., p. 108.
    • Computers at Risk , pp. 108
    • Benzel1
  • 137
    • 0022012611 scopus 로고
    • A Comment on the 'Basic Security Theorem' of Bell and LaPadula
    • J. McLean, "A Comment on the 'Basic Security Theorem' of Bell and LaPadula," Information Processing Letters, vol. 20, pp. 67-70, 1985.
    • (1985) Information Processing Letters , vol.20 , pp. 67-70
    • McLean, J.1
  • 138
    • 0020299523 scopus 로고
    • Security Policies and Security Models
    • Los Alamitos, Calif.: IEEE CS Press
    • J.A. Goguen and J. Meseguer, "Security Policies and Security Models," Proc. Berkeley Conf. Computer Security. Los Alamitos, Calif.: IEEE CS Press, 1982, pp. 11-22.
    • (1982) Proc. Berkeley Conf. Computer Security , pp. 11-22
    • Goguen, J.A.1    Meseguer, J.2
  • 139
    • 0024877148 scopus 로고
    • Noninterference and Unwinding for LOCK
    • Franconia, N.H., 11 June
    • T. Fine, J.T. Haigh, R.C. O'Brien, and D.L. Toups, "Noninterference and Unwinding for LOCK," Computer Security Foundation Workshop, Franconia, N.H., 11 June 1989. For a description of LOCK, see National Research Council, Computers at Risk, op. cit., pp. 251-252. LOCK is now known as the Secure Network Server, and the Honeywell division responsible for it is now the Secure Computing Corporation.
    • (1989) Computer Security Foundation Workshop
    • Fine, T.1    Haigh, J.T.2    O'Brien, R.C.3    Toups, D.L.4
  • 140
    • 3943053217 scopus 로고    scopus 로고
    • op. cit.
    • T. Fine, J.T. Haigh, R.C. O'Brien, and D.L. Toups, "Noninterference and Unwinding for LOCK," Computer Security Foundation Workshop, Franconia, N.H., 11 June 1989. For a description of LOCK, see National Research Council, Computers at Risk, op. cit., pp. 251-252. LOCK is now known as the Secure Network Server, and the Honeywell division responsible for it is now the Secure Computing Corporation.
    • Computers at Risk , pp. 251-252
  • 141
    • 3943083252 scopus 로고
    • Malvern, Worcestershire, U.K.: Defence Research Agency, typescript
    • C.T. Sennett, Formal Methods for Computer Security. Malvern, Worcestershire, U.K.: Defence Research Agency, 1995, typescript, p. 2.
    • (1995) Formal Methods for Computer Security , pp. 2
    • Sennett, C.T.1
  • 142
    • 3943053217 scopus 로고    scopus 로고
    • op cit.
    • National Research Council, Computers at Risk, op cit.
    • Computers at Risk
  • 143
    • 84876757522 scopus 로고    scopus 로고
    • op. cit.
    • See, e.g., General Accounting Office, Information Security, op. cit.
    • Information Security
  • 144
    • 3943110082 scopus 로고    scopus 로고
    • Microsoft Admits Limited NT Security
    • 4 July
    • Anon, "Microsoft Admits Limited NT Security," Computing, 4 July 1996, p. 3.
    • (1996) Computing , pp. 3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.