-
2
-
-
0034997267
-
MAGE: A distributed programming model
-
Mesa, AZ, April
-
Earl Barr, Raju Pandey, and Michael Haungs. MAGE: A distributed programming model. In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS '01), pages 303-312, Mesa, AZ, April 2001.
-
(2001)
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS '01)
, pp. 303-312
-
-
Barr, E.1
Pandey, R.2
Haungs, M.3
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
ESD/AFSC, Hanscom AFB, Bedford, MA
-
David E. Bell and Leonard J. La Padula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA, 1975. Available at http://csrc.nist.gov/publications/ history/.
-
(1975)
Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.E.1
La Padula, L.J.2
-
4
-
-
1842550314
-
-
Viktors Berstis. Fundamentals of grid computing, 2002. Available at http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/redp3613.%html? Open.
-
(2002)
Fundamentals of Grid Computing
-
-
Berstis, V.1
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2):107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
58049148314
-
A separation kernel formal security policy
-
Boulder, CO, July
-
David Greve, Matthew Wilding, and W. Mark Vanfleet. A separation kernel formal security policy. In Fourth International Workshop on the ACL2 Prover and Its Applications (ACL2-2003), Boulder, CO, July 2003. Available at http://hokiepokie.org/docs/.
-
(2003)
Fourth International Workshop on the ACL2 Prover and Its Applications (ACL2-2003)
-
-
Greve, D.1
Wilding, M.2
Vanfleet, W.M.3
-
10
-
-
0035783986
-
A micromodularity mechanism
-
Vienna, Austria, September
-
Daniel Jackson, Ilya Shlyakhter, and Manu Sridharan. A micromodularity mechanism. In Proceedings of the ACM SIGSOFT Conference on the Foundations of Software Engineering / European Software Engineering Conference, pages 62-73, Vienna, Austria, September 2001.
-
(2001)
Proceedings of the ACM SIGSOFT Conference on the Foundations of Software Engineering / European Software Engineering Conference
, pp. 62-73
-
-
Jackson, D.1
Shlyakhter, I.2
Sridharan, M.3
-
11
-
-
0002426352
-
Lightweight formal methods
-
April
-
Daniel Jackson and Jeannette M. Wing. Lightweight formal methods. IEEE Computer, pages 21-22, April 1996.
-
(1996)
IEEE Computer
, pp. 21-22
-
-
Jackson, D.1
Wing, J.M.2
-
13
-
-
0024663305
-
New methods for immediate revocation
-
Oakland, CA, USA, May. IEEE Computer Society
-
Paul A. Karger. New methods for immediate revocation. In 1989 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1989. IEEE Computer Society. Available at http://www.multicians.org/biblio.html.
-
(1989)
1989 IEEE Symposium on Security and Privacy
-
-
Karger, P.A.1
-
14
-
-
0141562559
-
-
January
-
Lockheed Sanders, Inc., Hughes Aircraft, Motorola, and ISX Corporation. RASSP architecture guide rev. b, January 1995. Available at http://www.eda.org/ rassp/documents/sanders/arch_guide_b.pdf.
-
(1995)
RASSP Architecture Guide Rev. B
-
-
-
15
-
-
84860940620
-
-
Gemini Computers, Incorporated, Gemini Trusted Network Processor, version 1.01, June
-
National Computer Security Center. Final evaluation report, Gemini Computers, Incorporated, Gemini Trusted Network Processor, version 1.01, June 1995. Available at http://www.geminisecure.com/resource.htm.
-
(1995)
Final Evaluation Report
-
-
-
17
-
-
84860952929
-
-
network component M only, EPL entry CSC-EPL-94/008, September
-
National Security Agency. GTNP version 1.01, network component M only, EPL entry CSC-EPL-94/008, September 1994. Available at http://www.radium.ncsc. mil/tpep/epl/entries/CSC-EPL-94-008.html.
-
(1994)
GTNP Version 1.01
-
-
-
18
-
-
84860954647
-
-
network component MDIA, EPL entry CSC-EPL-94/006, September
-
National Security Agency. MLS LAN version 2.1, network component MDIA, EPL entry CSC-EPL-94/006, September 1994. Available at http://www.radium.ncsc. mil/tpep/epl/entries/CSC-EPL-94-006.html.
-
(1994)
MLS LAN Version 2.1
-
-
-
20
-
-
85041481084
-
Design and verification of secure systems
-
Pacific Grove, CA, USA, December. ACM Press
-
J. M. Rushby. Design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating Systems Principles, volume 15, pages 12 - 21, Pacific Grove, CA, USA, December 1981. ACM Press. Available at http://www.csl.sri.com/papers/sosp81/.
-
(1981)
Proceedings of the Eighth ACM Symposium on Operating Systems Principles
, vol.15
, pp. 12-21
-
-
Rushby, J.M.1
-
21
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Computer Science Laboratory, SRI International, Menlo Park, CA, December
-
John Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, Computer Science Laboratory, SRI International, Menlo Park, CA, December 1992. Available at http://www.csl.sri. com/papers/csl-92-2/.
-
(1992)
Technical Report
, vol.CSL-92-02
-
-
Rushby, J.1
-
22
-
-
0003954843
-
Formal methods and their role in the certification of critical systems
-
Computer Science Laboratory, SRI International, Menlo Park, CA, March
-
John Rushby. Formal methods and their role in the certification of critical systems. Technical Report SRI-CSL-95-1, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1995.
-
(1995)
Technical Report
, vol.SRI-CSL-95-1
-
-
Rushby, J.1
-
23
-
-
84860948040
-
NASA Contractor Report 4673
-
August
-
Also available as NASA Contractor Report 4673, August 1995, and to be issued as part of the FAA Digital Systems Validation Handbook http://www.csl.sri.com/papers/csl-95-1/.
-
(1995)
FAA Digital Systems Validation Handbook
-
-
-
24
-
-
0020779556
-
A distributed secure system
-
July
-
John Rushby and Brian Randell. A distributed secure system. IEEE Computer, 16(7):55-67, July 1983. Available at http://www.csl.sri.com/users/ rushby/abstracts/computer83.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 55-67
-
-
Rushby, J.1
Randell, B.2
-
25
-
-
0027699087
-
Lattice-based access control models
-
Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993. Available at http://citeseer.nj.nee.com/article/ sandhu93latticebased.html.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
26
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
6th European Symposium on Research in Computer Security (ESORICS), Toulouse, France, October. Springer
-
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, and David Toll. Verification of a formal security model for multiapplicative smart cards. In 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 17-36, Toulouse, France, October 2000. Springer. Available at http://citeseer.nj.nec.com/schellhorn00verification.html.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.A.4
Austel, V.5
Toll, D.6
-
27
-
-
12344286486
-
Cost profile of a highly assured, secure operating system
-
February
-
Richard E. Smith. Cost profile of a highly assured, secure operating system. ACM Transactions on Information and System Security, 4(1):72-101, February 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 72-101
-
-
Smith, R.E.1
-
28
-
-
0036712816
-
The F-22 on the line
-
John A. Tirpak. The F-22 on the line. Air Force Magazine, 85(09), 2002. Available at http://www.afa.org/magazine/Sept2002/0902raptor.html.
-
(2002)
Air Force Magazine
, vol.85
, Issue.9
-
-
Tirpak, J.A.1
-
31
-
-
0004259528
-
-
May
-
United States Joint Chiefs of Staff. Joint vision 2020, May 2000. Available at http://www.dtic.mil/jointvision/jvpub2.htm.
-
(2000)
Joint Vision 2020
-
-
-
32
-
-
0003969638
-
-
December
-
U.S. Department of Defense. DoD trusted computer system evaluation criteria, December 1985. Available at http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html.
-
(1985)
DoD Trusted Computer System Evaluation Criteria
-
-
-
33
-
-
84957649344
-
A model of cooperative noninterference for integrated modular avionics
-
San Jose, CA, January
-
Ben L. Di Vito. A model of cooperative noninterference for integrated modular avionics. In Proceedings of Dependable Computing for Critical Applications (DCCA-7), San Jose, CA, January 1999. Available to http://shemesh.larc.nasa.gov/people/bld/.
-
(1999)
Proceedings of Dependable Computing for Critical Applications (DCCA-7)
-
-
Di Vito, B.L.1
-
34
-
-
0026851778
-
BLACKER : Security for the DDN, examples of Al security engineering trades
-
Clark Weissman. BLACKER : Security for the DDN, examples of Al security engineering trades. In Proceedings of the IEEE Symposium on Security and Privacy, pages 286-292, 1992.
-
(1992)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 286-292
-
-
Weissman, C.1
-
35
-
-
20444499641
-
MLS-PCA: A high assurance security architecture for future avionics
-
Las Vegas, Nevada, USA, December. IEEE Press
-
Clark Weissman. MLS-PCA: A high assurance security architecture for future avionics. In Proceedings of the 19th Annual Computer Security Applications Conference, pages 2-13, Las Vegas, Nevada, USA, December 2003. IEEE Press.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 2-13
-
-
Weissman, C.1
|