-
2
-
-
0040670932
-
-
Minneapolis, Minn.: Charles Babbage Institute, Oct. chapter 1 and appendix 1
-
For a good description of batch operation and of the shift to time-sharing, see A.L. Norberg and J.E. O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency. Minneapolis, Minn.: Charles Babbage Institute, Oct. 1992, chapter 1 and appendix 1; an amended version of this report has been published as Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986. Baltimore, Md.: Johns Hopkins Univ. Press, 1996.
-
(1992)
A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency
-
-
Norberg, A.L.1
O'Neill, J.E.2
-
3
-
-
0003911490
-
-
Baltimore, Md.: Johns Hopkins Univ. Press
-
For a good description of batch operation and of the shift to time-sharing, see A.L. Norberg and J.E. O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency. Minneapolis, Minn.: Charles Babbage Institute, Oct. 1992, chapter 1 and appendix 1; an amended version of this report has been published as Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986. Baltimore, Md.: Johns Hopkins Univ. Press, 1996.
-
(1996)
Transforming Computer Technology; Information Processing for the Pentagon, 1962-1986
-
-
-
4
-
-
0003856021
-
-
Cambridge, Mass.: MIT Press
-
K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
-
(1985)
A Century of Electrical Engineering and Computer Science at MIT, 1882-1982
, pp. 348
-
-
Wildes, K.L.1
Lindgren, N.A.2
-
5
-
-
0141725361
-
-
K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
-
Transforming Computer Technology
-
-
Norberg1
O'Neill2
-
6
-
-
0003756768
-
-
Cambridge, Mass.: MIT Press
-
K.L. Wildes and N.A. Lindgren, A Century of Electrical Engineering and Computer Science at MIT, 1882-1982. Cambridge, Mass.: MIT Press, 1985, p. 348. Project MAC had wider aims, captured in the alternative version of the acronym, Machine-Aided Cognition, for which see, e.g., Norberg and O'Neill, Transforming Computer Technology, and P.N. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.
-
(1996)
The Closed World: Computers and the Politics of Discourse in Cold War America
-
-
Edwards, P.N.1
-
7
-
-
0345533636
-
Segmentation and the Design of Multiprogrammed Computer Systems
-
See, for example, J.B. Dennis, "Segmentation and the Design of Multiprogrammed Computer Systems," J. ACM, vol. 12, pp. 589-602, esp. 599, 1965.
-
(1965)
J. ACM
, vol.12
, pp. 589-602
-
-
Dennis, J.B.1
-
9
-
-
0004196079
-
-
Bedford, Mass.: Digital Press
-
Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
-
(1980)
Project Whirlwind: the History of A Pioneer Computer
-
-
Redmond, K.C.1
Smith, T.M.2
-
10
-
-
0039648207
-
-
Santa Monica, Calif.: System Development Corporation
-
Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
-
(1981)
The System Builders: the Story of SDC
-
-
Baum, C.1
-
11
-
-
0040074232
-
-
Norberg and O'Neill, A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency; K.C. Redmond and T.M. Smith, Project Whirlwind: The History of a Pioneer Computer Bedford, Mass.: Digital Press, 1980; C. Baum, The System Builders: The Story of SDC. Santa Monica, Calif.: System Development Corporation, 1981; Edwards, The Closed World.
-
The Closed World
-
-
Edwards1
-
13
-
-
3943054582
-
-
personal communication to D. MacKenzie, 17 Oct.
-
W.H. Ware, personal communication to D. MacKenzie, 17 Oct. 1996.
-
(1996)
-
-
Ware, W.H.1
-
14
-
-
84947659582
-
Security and Privacy in Computer Systems
-
Washington, D.C.: Thompson Books
-
W.H. Ware, "Security and Privacy in Computer Systems," AFIPS Conf. Proc., Spring Joint Computer Conf. Washington, D.C.: Thompson Books, vol. 30, pp. 279-282, at p. 279, 1967.
-
(1967)
AFIPS Conf. Proc., Spring Joint Computer Conf.
, vol.30
, pp. 279-282
-
-
Ware, W.H.1
-
15
-
-
84976815513
-
Security Considerations in a Multi-Programmed Computer System
-
Washington, D.C.: Thompson Books, 1967
-
B. Peters, "Security Considerations in a Multi-Programmed Computer System," AFIPS Conf. Proc., Spring Joint Computer Conf. Washington, D.C.: Thompson Books, 1967, vol. 30, pp. 283-286, at p. 283, 1967.
-
(1967)
AFIPS Conf. Proc., Spring Joint Computer Conf.
, vol.30
, pp. 283-286
-
-
Peters, B.1
-
16
-
-
0038878759
-
-
Cambridge, Mass.: MIT Press
-
E.W. Pugh, L.R. Johnson, and J.H. Palmer, IBM's 360 and Early 370 Systems. Cambridge, Mass.: MIT Press, pp. 362-363, 1991.
-
(1991)
IBM's 360 and Early 370 Systems
, pp. 362-363
-
-
Pugh, E.W.1
Johnson, L.R.2
Palmer, J.H.3
-
20
-
-
3943054583
-
-
personal communication to D. MacKenzie, 17 Oct.
-
W.H. Ware, personal communication to D. MacKenzie, 17 Oct. 1996.
-
(1996)
-
-
Ware, W.H.1
-
21
-
-
0006291871
-
-
Santa Monica, Calif.: Rand Corporation, Feb. R-609. Originally classified "confidential," the report was declassified in Oct. 1975. The quotations are from Ware's foreword to the version reissued by Rand in Oct. 1979 and from p. 18 of the latter
-
W.H. Ware, ed., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security. Santa Monica, Calif.: Rand Corporation, Feb. 1970, R-609. Originally classified "confidential," the report was declassified in Oct. 1975. The quotations are from Ware's foreword to the version reissued by Rand in Oct. 1979 and from p. 18 of the latter.
-
(1970)
Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security
-
-
Ware, W.H.1
-
23
-
-
3943093763
-
-
R. Schell, telephone interview by G. Pottinger, 10 Oct. 1993
-
R. Schell, telephone interview by G. Pottinger, 10 Oct. 1993.
-
-
-
-
24
-
-
3943058039
-
-
personal communication to D. MacKenzie, 21 Oct.
-
W.H. Ware, personal communication to D. MacKenzie, 21 Oct. 1996.
-
(1996)
-
-
Ware, W.H.1
-
25
-
-
3943106618
-
-
Bedford, Mass.: HQ Electronic Systems Division, U.S. Air Force, ESDF-TR-73-51
-
J.P. Anderson, Computer Security Technology Planning Study. Bedford, Mass.: HQ Electronic Systems Division, U.S. Air Force, 1972, ESDF-TR-73-51, vol. 1, pp. 3 and 33.
-
(1972)
Computer Security Technology Planning Study
, vol.1
, pp. 3
-
-
Anderson, J.P.1
-
27
-
-
3943108716
-
Computer Security: The Achilles' Heel of the Electronic Air Force?
-
Jan.-Feb.
-
R.R. Schell, "Computer Security: The Achilles' Heel of the Electronic Air Force?" Air Univ. Rev., vol. 30, pp. 16-33, at pp. 28-29, Jan.-Feb. 1979.
-
(1979)
Air Univ. Rev.
, vol.30
, pp. 16-33
-
-
Schell, R.R.1
-
30
-
-
3943101212
-
-
Bedford Mass.: Electronic Systems Division, Dec. ESD-TR-73-294
-
W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
-
(1973)
Design of A Security Kernel for the PDP-11/45
-
-
Schiller, W.L.1
-
31
-
-
3943077039
-
Computer Security
-
W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
-
Design of A Security Kernel for the PDP-11/45
, pp. 28
-
-
Schell1
-
32
-
-
3943094480
-
-
op. cit.
-
W.L. Schiller, Design of a Security Kernel for the PDP-11/45. Bedford Mass.: Electronic Systems Division, Dec. 1973, ESD-TR-73-294; Schell, "Computer Security," op. cit., p. 28; Wildes and Lindgren, A Century, op. cit., p. 300.
-
A Century
, pp. 300
-
-
Wildes1
Lindgren2
-
33
-
-
3943108716
-
Computer Security: The Achilles Heel of the Electronic Air Force?
-
Jan.-Feb.
-
R.R. Schell, "Computer Security: The Achilles Heel of the Electronic Air Force?" Air Univ. Rev., vol. 30, pp. 16-33, at p. 31, Jan.-Feb. 1979.
-
(1979)
Air Univ. Rev.
, vol.30
, pp. 16-33
-
-
Schell, R.R.1
-
34
-
-
0026254933
-
Retrospective on the VAX VMM Security Kernel
-
emphasis in original
-
P.A. Karger, M.E. Zurko, D.W. Bonin, A.H. Mason, and C.E. Kahn, "Retrospective on the VAX VMM Security Kernel," IEEE Transactions on Software Engineering, vol. 17, pp. 1,147-1,165, at p. 1,159, 1991, emphasis in original.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
38
-
-
4544284713
-
Security Controls in the ADEPT-50 Time-Sharing System
-
quotation at p. 122
-
C. Weissman, "Security Controls in the ADEPT-50 Time-Sharing System," Proc. FJCC, vol. 5, pp. 119-131, quotation at p. 122, 1969.
-
(1969)
Proc. FJCC
, vol.5
, pp. 119-131
-
-
Weissman, C.1
-
39
-
-
3943067560
-
-
Anderson panel, op. cit., vol. 1, p. 4.
-
Proc. FJCC
, vol.1
, pp. 4
-
-
-
40
-
-
3943068905
-
-
Bedford, Mass.: Air Force Electronic Systems Division, 25 Jan. AD-778 467
-
K.G. Walter, W.F. Ogden, W.C. Rounds, F.T. Bradshaw, S.R. Ames, and D.G. Shumway, Primitive Models for Computer Security. Bedford, Mass.: Air Force Electronic Systems Division, 25 Jan. 1974, AD-778 467.
-
(1974)
Primitive Models for Computer Security
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Shumway, D.G.6
-
41
-
-
3943088188
-
-
Bedford, Mass: Air Force Electronic Systems Division, Nov. ESD-TR-73-278
-
D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
42
-
-
3943056662
-
-
personal communication to D. MacKenzie, 29 Oct.
-
D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
-
(1996)
-
-
LaPadula, L.J.1
-
43
-
-
0003575258
-
-
New York: Academic Press
-
D.E. Bell and L.J. LaPadula, Secure Computer Systems: Mathematical Foundations. Bedford, Mass: Air Force Electronic Systems Division, Nov. 1973, ESD-TR-73-278, vol. 1; L.J. LaPadula, personal communication to D. MacKenzie, 29 Oct. 1996; M.D. Mesarovic, D. Macko, and Y. Takahara, Theory of Hierarchical, Multilevel, Systems. New York: Academic Press, 1970.
-
(1970)
Theory of Hierarchical, Multilevel, Systems
-
-
Mesarovic, M.D.1
Macko, D.2
Takahara, Y.3
-
44
-
-
3943070211
-
-
Bedford, Mass: Air Force Electronic Systems Division. Nov. ESD-TR-73-278
-
D.E. Bell and L.J. LaPadula, Secure Computer Systems: A Mathematical Model Bedford, Mass: Air Force Electronic Systems Division. Nov. 1973, ESD-TR-73-278, vol. 2, p. 15.
-
(1973)
Secure Computer Systems: A Mathematical Model
, vol.2
, pp. 15
-
-
Bell, D.E.1
LaPadula, L.J.2
-
47
-
-
0003400251
-
-
Bedford, Mass: Air Force Electronic Systems Division, Mar. ESD-TR-75-306
-
D.E. Bell and L.J. LaPadula, Secure Computer System: Unified Exposition and Multics Interpretation. Bedford, Mass: Air Force Electronic Systems Division, Mar. 1976, ESD-TR-75-306, p. 17.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
, pp. 17
-
-
Bell, D.E.1
LaPadula, L.J.2
-
54
-
-
0020780166
-
The Best Available Technologies for Computer Security
-
C.E. Landwehr, "The Best Available Technologies for Computer Security," Computer, vol. 16, pp. 86-100, at p. 96, 1983.
-
(1983)
Computer
, vol.16
, pp. 86-100
-
-
Landwehr, C.E.1
-
55
-
-
33846152122
-
-
Anderson panel, op. cit., 10.
-
Computer
, pp. 10
-
-
-
57
-
-
0017478274
-
Proof Techniques for Hierarchically Structured Programs
-
L. Robinson and K.N. Levitt, "Proof Techniques for Hierarchically Structured Programs," Comm. ACM, vol. 20, pp. 271-283, 1977.
-
(1977)
Comm. ACM
, vol.20
, pp. 271-283
-
-
Robinson, L.1
Levitt, K.N.2
-
58
-
-
0347229432
-
-
Menlo Park, Calif.: SRI Computer Science Laboratory, May CSL 116
-
P.G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson, A Provably Secure Operating System: The System, Its Applications, and Proofs. Menlo Park, Calif.: SRI Computer Science Laboratory, May 1980, CSL 116.
-
(1980)
A Provably Secure Operating System: the System, Its Applications, and Proofs
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
59
-
-
85072519230
-
The Foundations of a Provably Secure Operating System (PSOS)
-
New York: AFIPS
-
R.J. Feiertag and P.G. Neumann, "The Foundations of a Provably Secure Operating System (PSOS)," National Computer Conference. New York: AFIPS, 1979, pp. 329-343.
-
(1979)
National Computer Conference
, pp. 329-343
-
-
Feiertag, R.J.1
Neumann, P.G.2
-
60
-
-
3943114117
-
-
P. Neumann interviewed by A.J. Dale, Menlo Park, Calif., 25 Mar. 1994
-
P. Neumann interviewed by A.J. Dale, Menlo Park, Calif., 25 Mar. 1994.
-
-
-
-
66
-
-
3943062057
-
-
Bedford, Mass.: Air Force Electronic Systems Division, Apr. ESD-TR-73-278
-
D.E. Bell, Secure Computer Systems: A Refinement of the Mathematical Model. Bedford, Mass.: Air Force Electronic Systems Division, Apr. 1974, ESD-TR-73-278, vol. 3, pp. 29 and 31.
-
(1974)
Secure Computer Systems: A Refinement of the Mathematical Model
, vol.3
, pp. 29
-
-
Bell, D.E.1
-
69
-
-
3943106616
-
-
Bedford, Mass.: Mitre Corporation, Oct. M79-225
-
A term used, e.g., by G.H. Nibaldi, Proposed Technical Evaluation Criteria for Trusted Computer Systems. Bedford, Mass.: Mitre Corporation, Oct. 1979, M79-225, p. 9.
-
(1979)
Proposed Technical Evaluation Criteria for Trusted Computer Systems
, pp. 9
-
-
Nibaldi, G.H.1
-
70
-
-
0015672289
-
A Note on the Confinement Problem
-
B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, pp. 613-615, 1973.
-
(1973)
Comm. ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.W.1
-
71
-
-
3943114118
-
Design of a Security Kernel
-
Schiller et al., "Design of a Security Kernel," op. cit., p. 7; C.E. Landwehr, "Formal Models for Computer Security," Computing Surveys, vol. 13, pp. 247-278, at p. 252, Sept. 1981.
-
Comm. ACM
, pp. 7
-
-
Schiller1
-
72
-
-
0019608720
-
Formal Models for Computer Security
-
Sept.
-
Schiller et al., "Design of a Security Kernel," op. cit., p. 7; C.E. Landwehr, "Formal Models for Computer Security," Computing Surveys, vol. 13, pp. 247-278, at p. 252, Sept. 1981.
-
(1981)
Computing Surveys
, vol.13
, pp. 247-278
-
-
Landwehr, C.E.1
-
74
-
-
84958951541
-
Program Confinement in KVM/370
-
New York: Association for Computing Machinery
-
See, e.g., M. Schaefer, B. Gold, R. Linde, and J. Scheid, "Program Confinement in KVM/370," ACM 77: Proceedings of the Annual Conference. New York: Association for Computing Machinery 1977, pp. 404-410; J.T. Haigh, R.A. Kemmerer, J. McHugh, and W.D. Young, "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Transactions on Software Engineering, vol. 13, pp. 157-168, 1987.
-
(1977)
ACM 77: Proceedings of the Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
75
-
-
0023292228
-
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
-
See, e.g., M. Schaefer, B. Gold, R. Linde, and J. Scheid, "Program Confinement in KVM/370," ACM 77: Proceedings of the Annual Conference. New York: Association for Computing Machinery 1977, pp. 404-410; J.T. Haigh, R.A. Kemmerer, J. McHugh, and W.D. Young, "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Transactions on Software Engineering, vol. 13, pp. 157-168, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, pp. 157-168
-
-
Haigh, J.T.1
Kemmerer, R.A.2
McHugh, J.3
Young, W.D.4
-
76
-
-
0016951438
-
Security Kernel Validation in Practice
-
See, e.g., J.K. Millen, "Security Kernel Validation in Practice," Comm. ACM, vol. 19, pp. 244-250, 1976.
-
(1976)
Comm. ACM
, vol.19
, pp. 244-250
-
-
Millen, J.K.1
-
77
-
-
0016984825
-
Protection in Operating Systems
-
M.A. Harrison, W.L. Ruzzo, and J.C. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, pp. 461-471, at p. 470, 1976.
-
(1976)
Comm. ACM
, vol.19
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.C.3
-
78
-
-
3943061369
-
Program Confinement in KVM/370
-
Schaefer et al., "Program Confinement in KVM/370," op. cit., p. 409.
-
Comm. ACM
, pp. 409
-
-
Schaefer1
-
79
-
-
0004253615
-
-
London: Sphere
-
See D. Kahn, The Codebreakers. London: Sphere, 1973; and J. Barnford, The Puzzle Palace: A Report on America's Most Secret Agency. Boston: Houghton Mifflin, 1982.
-
(1973)
The Codebreakers
-
-
Kahn, D.1
-
81
-
-
3943093761
-
-
Cambridge, Mass.: Harvard Univ., Center for Information Policy Research, June P-85-8
-
G.F. Jelen, Information Security: An Elusive Goal. Cambridge, Mass.: Harvard Univ., Center for Information Policy Research, June 1985, P-85-8, pp. III-43, I-II.
-
(1985)
Information Security: An Elusive Goal
-
-
Jelen, G.F.1
-
84
-
-
3943109384
-
-
parenthetical remark in original
-
Anderson panel, op. cit., vol. 1, p. 4, parenthetical remark in original.
-
Transforming Computer Technology
, vol.1
, pp. 4
-
-
-
87
-
-
3943099175
-
-
S.T. Walker, interviewed by G. Pottinger, Glenwood, Md., 24 Mar. 1993
-
S.T. Walker, interviewed by G. Pottinger, Glenwood, Md., 24 Mar. 1993.
-
-
-
-
90
-
-
46149145265
-
A Plan for the Evaluation of Trusted Computer Systems
-
type-script, 22 Feb. reprinted in Jelen, op. cit.
-
"A Plan for the Evaluation of Trusted Computer Systems," type-script, 22 Feb. 1980, reprinted in Jelen, Information Security, op. cit., pp. V-2 to V-9.
-
(1980)
Information Security
-
-
-
91
-
-
3943053216
-
-
Walker interview
-
Walker interview.
-
-
-
-
94
-
-
3943107317
-
-
as interviewed by G. Jelen, as quoted in Jelen, op. cit.
-
Admiral B.R. Inman, as interviewed by G. Jelen, as quoted in Jelen, Information Security, op. cit., p. II-81.
-
Information Security
-
-
Inman, B.R.1
-
95
-
-
3943100506
-
-
personal communication to D. MacKenzie, 22 Aug.
-
S.T. Walker, personal communication to D. MacKenzie, 22 Aug. 1996.
-
(1996)
-
-
Walker, S.T.1
-
96
-
-
46149153066
-
Computer Security Evaluation Center
-
Department of Defense Directive 5215.1, 25 Oct. reproduced in Jelen, op. cit.
-
F.C. Carlucci, Department of Defense Directive 5215.1, "Computer Security Evaluation Center," 25 Oct. 1982, reproduced in Jelen, Information Security, op. cit., pp. V-11 to V-17.
-
(1982)
Information Security
-
-
Carlucci, F.C.1
-
98
-
-
3943087498
-
Thoughts on the Impact of Verification Technology on Trusted Computer Systems (and Vice Versa)
-
July
-
S.T. Walker, "Thoughts on the Impact of Verification Technology on Trusted Computer Systems (and Vice Versa)," Software Engineering Notes, vol. 5, p. 8, July 1980.
-
(1980)
Software Engineering Notes
, vol.5
, pp. 8
-
-
Walker, S.T.1
-
99
-
-
0023207669
-
Coding for a Believable Specification to Implementation Mapping
-
Washington, D.C., emphasis in original
-
W.D. Young and J. McHugh, "Coding for a Believable Specification to Implementation Mapping," IEEE Computer Society Symp. Security and Privacy, pp. 140-148, at p. 140, Washington, D.C., 1987, emphasis in original.
-
(1987)
IEEE Computer Society Symp. Security and Privacy
, pp. 140-148
-
-
Young, W.D.1
McHugh, J.2
-
100
-
-
0003969633
-
-
Washington, D.C.: Department of Defense, Dec. DOD 5200.28-STD
-
Department of Defense, Trusted Computer System Evaluation Criteria. Washington, D.C.: Department of Defense, Dec. 1985, DOD 5200.28-STD, pp. 19, 26, 40, and 50.
-
(1985)
Trusted Computer System Evaluation Criteria
, pp. 19
-
-
-
101
-
-
3943049837
-
Program Verification
-
R.S. Boyer and J.S. Moore, "Program Verification," J. Automated Reasoning, vol. 1, pp. 17-23, at p. 22, 1985.
-
(1985)
J. Automated Reasoning
, vol.1
, pp. 17-23
-
-
Boyer, R.S.1
Moore, J.S.2
-
104
-
-
3943066881
-
Verification Technology and the A1 Criteria
-
Aug.
-
T.C.V. Benzel, "Verification Technology and the A1 Criteria," Software Engineering Notes, vol. 10, pp. 108-109, at p. 109, Aug. 1985.
-
(1985)
Software Engineering Notes
, vol.10
, pp. 108-109
-
-
Benzel, T.C.V.1
-
105
-
-
0019612720
-
Verifying Security
-
Sept.
-
For descriptions of them, see M.H. Cheheyl, M. Gasser, G.A. Huff, and J.K. Millen, "Verifying Security," Computing Surveys, vol. 13, pp. 279-339, Sept. 1981.
-
(1981)
Computing Surveys
, vol.13
, pp. 279-339
-
-
Cheheyl, M.H.1
Gasser, M.2
Huff, G.A.3
Millen, J.K.4
-
107
-
-
3943059331
-
-
personal communication to G. Pottinger, 18 Dec.
-
C. Weissman, personal communication to G. Pottinger, 18 Dec. 1993.
-
(1993)
-
-
Weissman, C.1
-
108
-
-
3943080492
-
-
Ibid.
-
(1993)
-
-
-
109
-
-
0026851778
-
Blacker: Security for the DDN. Examples of A1 Security Engineering Trades
-
C. Weissman, "Blacker: Security for the DDN. Examples of A1 Security Engineering Trades," IEEE Computer Society Symp. Research in Security and Privacy, pp. 286-292, at p. 289, 1992. This paper was presented by Weissman to the 1988 IEEE Symp. Research and Privacy, but "not published at that time because of a four year rescission of publication release," ibid., p. 286.
-
(1992)
IEEE Computer Society Symp. Research in Security and Privacy
, pp. 286-292
-
-
Weissman, C.1
-
110
-
-
0026851778
-
-
ibid.
-
C. Weissman, "Blacker: Security for the DDN. Examples of A1 Security Engineering Trades," IEEE Computer Society Symp. Research in Security and Privacy, pp. 286-292, at p. 289, 1992. This paper was presented by Weissman to the 1988 IEEE Symp. Research and Privacy, but "not published at that time because of a four year rescission of publication release," ibid., p. 286.
-
(1988)
IEEE Symp. Research and Privacy
, pp. 286
-
-
Weissman1
-
114
-
-
0004184890
-
-
Washington, D.C.: National Academy Press
-
National Research Council, System Security Study Committee, Computers at Risk: Safe Computing in the Information Age. Washington, D.C.: National Academy Press, 1991, p. 195.
-
(1991)
Computers at Risk: Safe Computing in the Information Age
, pp. 195
-
-
-
115
-
-
3943110773
-
-
personal communication to G. Pottinger, 22 Oct.
-
S. Lipner, personal communication to G. Pottinger, 22 Oct. 1993.
-
(1993)
-
-
Lipner, S.1
-
116
-
-
0026254933
-
Retrospective on the VAX VMM Security Kernel
-
P.A. Karger, M.E. Zurko, D.W. Bonin, A.H. Mason, and C.E. Kahn, "Retrospective on the VAX VMM Security Kernel," IEEE Transactions on Software Engineering, vol. 17, pp. 1,147-1,165 at p. 1.147, 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
123
-
-
3943084655
-
-
C. Bonneau, telephone interview by G. Pottinger, 20 Nov. 1993
-
C. Bonneau, telephone interview by G. Pottinger, 20 Nov. 1993.
-
-
-
-
125
-
-
3943053217
-
-
op. cit.
-
National Research Council, Computers at Risk, op. cit., p. 143.
-
Computers at Risk
, pp. 143
-
-
-
127
-
-
3943053217
-
-
op. cit.
-
National Research Council, Computers at Risk, op. cit., p. 154.
-
Computers at Risk
, pp. 154
-
-
-
129
-
-
3943103935
-
Verification Technology
-
Benzel, "Verification Technology," op. cit., p. 108.
-
Computers at Risk
, pp. 108
-
-
Benzel1
-
136
-
-
84976780900
-
A Security Model for Military Message Systems
-
C.E. Landwehr, C.L. Heitmeyer, and J. McLean, "A Security Model for Military Message Systems," ACM Trans. Computer Systems, vol. 2, pp. 198-222, 1984.
-
(1984)
ACM Trans. Computer Systems
, vol.2
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
137
-
-
0022012611
-
A Comment on the 'Basic Security Theorem' of Bell and LaPadula
-
J. McLean, "A Comment on the 'Basic Security Theorem' of Bell and LaPadula," Information Processing Letters, vol. 20, pp. 67-70, 1985.
-
(1985)
Information Processing Letters
, vol.20
, pp. 67-70
-
-
McLean, J.1
-
138
-
-
0020299523
-
Security Policies and Security Models
-
Los Alamitos, Calif.: IEEE CS Press
-
J.A. Goguen and J. Meseguer, "Security Policies and Security Models," Proc. Berkeley Conf. Computer Security. Los Alamitos, Calif.: IEEE CS Press, 1982, pp. 11-22.
-
(1982)
Proc. Berkeley Conf. Computer Security
, pp. 11-22
-
-
Goguen, J.A.1
Meseguer, J.2
-
139
-
-
0024877148
-
Noninterference and Unwinding for LOCK
-
Franconia, N.H., 11 June
-
T. Fine, J.T. Haigh, R.C. O'Brien, and D.L. Toups, "Noninterference and Unwinding for LOCK," Computer Security Foundation Workshop, Franconia, N.H., 11 June 1989. For a description of LOCK, see National Research Council, Computers at Risk, op. cit., pp. 251-252. LOCK is now known as the Secure Network Server, and the Honeywell division responsible for it is now the Secure Computing Corporation.
-
(1989)
Computer Security Foundation Workshop
-
-
Fine, T.1
Haigh, J.T.2
O'Brien, R.C.3
Toups, D.L.4
-
140
-
-
3943053217
-
-
op. cit.
-
T. Fine, J.T. Haigh, R.C. O'Brien, and D.L. Toups, "Noninterference and Unwinding for LOCK," Computer Security Foundation Workshop, Franconia, N.H., 11 June 1989. For a description of LOCK, see National Research Council, Computers at Risk, op. cit., pp. 251-252. LOCK is now known as the Secure Network Server, and the Honeywell division responsible for it is now the Secure Computing Corporation.
-
Computers at Risk
, pp. 251-252
-
-
-
141
-
-
3943083252
-
-
Malvern, Worcestershire, U.K.: Defence Research Agency, typescript
-
C.T. Sennett, Formal Methods for Computer Security. Malvern, Worcestershire, U.K.: Defence Research Agency, 1995, typescript, p. 2.
-
(1995)
Formal Methods for Computer Security
, pp. 2
-
-
Sennett, C.T.1
-
142
-
-
3943053217
-
-
op cit.
-
National Research Council, Computers at Risk, op cit.
-
Computers at Risk
-
-
-
143
-
-
84876757522
-
-
op. cit.
-
See, e.g., General Accounting Office, Information Security, op. cit.
-
Information Security
-
-
-
144
-
-
3943110082
-
Microsoft Admits Limited NT Security
-
4 July
-
Anon, "Microsoft Admits Limited NT Security," Computing, 4 July 1996, p. 3.
-
(1996)
Computing
, pp. 3
-
-
|