-
1
-
-
33846278827
-
-
ESD-TR-73-51, AD-758 206, ESD/AFSC, Hanscom AFB, MA, October
-
J. P. Anderson, "Computer Security Technology Planning Study," ESD-TR-73-51, Vol. I, AD-758 206, ESD/AFSC, Hanscom AFB, MA, October 1972, p. 4.
-
(1972)
Computer Security Technology Planning Study
, vol.1
, pp. 4
-
-
Anderson, J.P.1
-
2
-
-
33846273303
-
-
ESD-TR-74-193, ESD/AFSC, Hanscom AFB, MA, June
-
Paul A. Karger and Roger R. Schell, "Multics Security Evaluation: Vulnerability Analysis," ESD-TR-74-193, Vol. II, ESD/AFSC, Hanscom AFB, MA, June 1974.
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
, vol.2
-
-
Karger, P.A.1
Schell, R.R.2
-
3
-
-
84976781807
-
Reflections on Trusting Trust
-
August
-
Ken Thompson, "Reflections on Trusting Trust," Comm ACM, August 1984, 27(8), 761-763.
-
(1984)
Comm ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
4
-
-
33846334286
-
On Trusting Trust
-
November
-
Ken Thompson, "On Trusting Trust," Unix Review, November 1989, 7(11), 70-74.
-
(1989)
Unix Review
, vol.7
, Issue.11
, pp. 70-74
-
-
Thompson, K.1
-
5
-
-
33846290864
-
-
ESD-TR-73-51, ESD/AFSC, Hanscom AFB, MA, October
-
J. P. Anderson, "Computer Security Technology Planning Study," ESD-TR-73-51, Vol. II, ESD/AFSC, Hanscom AFB, MA, October 1972, p. 16.
-
(1972)
Computer Security Technology Planning Study
, vol.2
, pp. 16
-
-
Anderson, J.P.1
-
6
-
-
0003400251
-
-
MTR-2547, The MITRE Corporation, Bedford, MA, 1 March, ESD-TR-73-278-I
-
D. Elliott Bell and Leonard J. La Padula, "Secure Computer Systems: Mathematical Foundations," MTR-2547, Vol. I, The MITRE Corporation, Bedford, MA, 1 March 1973. (ESD-TR-73-278-I)
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Elliott Bell, D.1
La Padula, L.J.2
-
7
-
-
0016555241
-
The Protection of Information in Computer Systems
-
September
-
Jerome H. Saltzer, Michael D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE, 63(9) (September 1975), pp. 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
8
-
-
0003400251
-
-
MTR-2547, The MITRE Corporation, Bedford, MA, 31 May, ESD-TR-73-278-II
-
Leonard J. La Padula and D. Elliott Bell, "Secure Computer Systems: A Mathematical Model," MTR-2547, Vol. II, The MITRE Corporation, Bedford, MA, 31 May 1973. (ESD-TR-73-278-II)
-
(1973)
Secure Computer Systems: A Mathematical Model
, vol.2
-
-
Leonard, J.1
Padula, L.2
Elliott Bell, D.3
-
9
-
-
3943068905
-
Primitive Models for Computer Security
-
Electronic Systems Division, Hanscom AFB, MA, January
-
K. G. Walter et al., "Primitive Models for Computer Security," ESD-TR-74-117, Electronic Systems Division, Hanscom AFB, MA, January, 1974.
-
(1974)
ESD-TR-74-117
-
-
Walter, K.G.1
-
10
-
-
33846304076
-
-
MTR-2547, The MITRE Corporation, Bedford, MA, December, ESD-TR-73-278-III, p
-
D. Elliott Bell, "Secure Computer Systems: A Refinement of the Mathematical Model," MTR-2547, Vol. III, The MITRE Corporation, Bedford, MA, December 1973. (ESD-TR-73-278-III), p. 25.
-
(1973)
Secure Computer Systems: A Refinement of the Mathematical Model
, vol.3
, pp. 25
-
-
Elliott Bell, D.1
-
14
-
-
0003400251
-
-
MTR-2997, The MITRE Corporation, Bedford, MA, July, ESD-TR-75-306
-
D. Elliott Bell and Leonard J. La Padula, "Secure Computer Systems: Unified Exposition and Multics Interpretation," MTR-2997, The MITRE Corporation, Bedford, MA, July 1975. (ESD-TR-75-306)
-
(1975)
Secure Computer Systems: Unified Exposition and Multics Interpretation
-
-
Elliott Bell, D.1
La Padula, L.J.2
-
17
-
-
0003605887
-
-
Doubleday: New York, NY
-
Clifford Stoll. The Cuckoo's Egg. Doubleday: New York, NY, 1989.
-
(1989)
The Cuckoo's Egg
-
-
Stoll, C.1
-
18
-
-
84948969398
-
Thirty Years Later: Lessons from the Multics Security Evaluation
-
Las Vegas, NV, December
-
th ACSAC, Las Vegas, NV, December 2002, 119-126.
-
(2002)
th ACSAC
, pp. 119-126
-
-
Karger, P.1
Schell, R.R.2
-
20
-
-
0018320025
-
KSOS-The design of a secure operating system
-
AFIPS NCC, v
-
E. J. McCauley and P. J. Drongowski, "KSOS-The design of a secure operating system," Proceedings, AFIPS 1979 NCC, v48, 345-353.
-
(1979)
Proceedings
, vol.48
, pp. 345-353
-
-
McCauley, E.J.1
Drongowski, P.J.2
-
21
-
-
0347229432
-
A provably secure operating system: The system, its applications, and proofs
-
Technical Report CSL-116, SRI International, 1980
-
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson, "A provably secure operating system: The system, its applications, and proofs," Technical Report CSL-116, SRI International, 1980.
-
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
22
-
-
33846270181
-
-
Marvin Schaefer, R. R. Linde, et al., Program Confinement in KVM/370, Proceedings, ACM National Conference, Seattle, October, 1977.
-
Marvin Schaefer, R. R. Linde, et al., "Program Confinement in KVM/370," Proceedings, ACM National Conference, Seattle, October, 1977.
-
-
-
-
23
-
-
0016081584
-
Protection and the Control of Information in Multics
-
July
-
Jerome Saltzer, "Protection and the Control of Information in Multics," Comm. ACM 17(7), July 1974, 388-402.
-
(1974)
Comm. ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.1
-
24
-
-
0012296562
-
-
Department of Defense Trusted Computer System Evaluation Criteria, December
-
Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.
-
(1985)
DoD 5200.28-STD
-
-
-
25
-
-
33846326068
-
-
MTR-2932, The MITRE Corporation, Bedford, MA, April, ESD-TR-75-54
-
D. Elliott Bell and Edmund L. Burke, "A Software Validation Technique for Certification: The Methodology," MTR-2932, Vol. I, The MITRE Corporation, Bedford, MA, April 1975. (ESD-TR-75-54)
-
(1975)
A Software Validation Technique for Certification: The Methodology
, vol.1
-
-
Elliott Bell, D.1
Burke, E.L.2
-
26
-
-
0025137215
-
-
Paul Karger et al., A VMM Security Kernel for the VAX Architecture, Proceedings, 1990 IEEE Symposium on Security and Privacy, Oakland, CA, 7-9 May 1990, 2-19.
-
Paul Karger et al., "A VMM Security Kernel for the VAX Architecture," Proceedings, 1990 IEEE Symposium on Security and Privacy, Oakland, CA, 7-9 May 1990, 2-19.
-
-
-
-
27
-
-
0023266943
-
-
David Clark and David Wilson, A Comparison of Commercial and Military Computer Security Policies, Proceedings, 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 27-29 April 1987, 184-194.
-
David Clark and David Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proceedings, 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 27-29 April 1987, 184-194.
-
-
-
-
28
-
-
0023859517
-
-
T. M. P. Lee, Using Mandatory Integrity to Enforce 'Commercial' Security, Proceedings, 1988 IEEE Symposium on Security and Privacy, Oakland, CA, April 1988, 140-146.
-
T. M. P. Lee, "Using Mandatory Integrity to Enforce 'Commercial' Security," Proceedings, 1988 IEEE Symposium on Security and Privacy, Oakland, CA, April 1988, 140-146.
-
-
-
-
29
-
-
33846268617
-
-
William R. Shockley, Implementing the Clark/Wilson Integrity Policy Using Current Technology, Proceedings, 11th National Computer Security Conference, Baltimore, Maryland, October 1988, 29-37.
-
William R. Shockley, "Implementing the Clark/Wilson Integrity Policy Using Current Technology," Proceedings, 11th National Computer Security Conference, Baltimore, Maryland, October 1988, 29-37.
-
-
-
-
30
-
-
0024663219
-
-
David Brewer and Michael Nash, The Chinese Wall Security Policy, Proceedings, 1989 IEEE Symposium on Security and Privacy, Oakland, CA, May 1989, 206-214.
-
David Brewer and Michael Nash, "The Chinese Wall Security Policy," Proceedings, 1989 IEEE Symposium on Security and Privacy, Oakland, CA, May 1989, 206-214.
-
-
-
-
33
-
-
33846285579
-
-
th National Computer Security Conference, Washington, DC, 1-4 October 1990, 333-339.
-
th National Computer Security Conference, Washington, DC, 1-4 October 1990, 333-339.
-
-
-
-
34
-
-
0026851778
-
-
Clark Weissman, BLACKER: Security for the DDN, Examples of Al Security Engineering Trades, Proceedings, 1992 IEEE Computer Security Symposium on Research in Security and Privacy, 4-6 May 1992, Oakland, CA, 286-292.
-
Clark Weissman, "BLACKER: Security for the DDN, Examples of Al Security Engineering Trades," Proceedings, 1992 IEEE Computer Security Symposium on Research in Security and Privacy, 4-6 May 1992, Oakland, CA, 286-292.
-
-
-
-
35
-
-
0022863501
-
-
D. Elliott Bell, Secure Computer Systems: A Network Interpretation, Proceedings, Second Aerospace Computer Conference, McLean, VA, 2-4 December 1986, 32-39.
-
D. Elliott Bell, "Secure Computer Systems: A Network Interpretation", Proceedings, Second Aerospace Computer Conference, McLean, VA, 2-4 December 1986, 32-39.
-
-
-
-
36
-
-
33846308312
-
-
TNI, op. cit., Appendix A.
-
TNI, op. cit., Appendix A.
-
-
-
-
37
-
-
0004190631
-
-
1st ed, American Mathematical Society: Ann Arbor, Michigan
-
st ed.), American Mathematical Society: Ann Arbor, Michigan, 1948.
-
(1948)
Lattice Theory
-
-
Birkhoff, G.1
-
39
-
-
33846330000
-
-
th National Computer Security Conference, Washington, DC, 1-4 October 1990, 165-171.
-
th National Computer Security Conference, Washington, DC, 1-4 October 1990, 165-171.
-
-
-
-
40
-
-
33846311572
-
-
th National Computer Security Conference, Washington, DC, 1-4 October 1991, 456-471.
-
th National Computer Security Conference, Washington, DC, 1-4 October 1991, 456-471.
-
-
-
-
42
-
-
33846323472
-
Considering Lifecycle Subversion
-
September
-
Cynthia E. Irvine, "Considering Lifecycle Subversion," Invited presentation, MLS Workshop, Alexandria, VA, 24 September, 2003.
-
(2003)
Invited presentation, MLS Workshop, Alexandria, VA, 24
-
-
Irvine, C.E.1
-
43
-
-
33845546418
-
Subversion as a Threat in Information Warfare
-
June
-
Emory A. Anderson, Cynthia E. Irvine, and Roger R. Schell, "Subversion as a Threat in Information Warfare," Journal of Information Warfare, 3(2), June 2004, pp. 52-65.
-
(2004)
Journal of Information Warfare
, vol.3
, Issue.2
, pp. 52-65
-
-
Anderson, E.A.1
Irvine, C.E.2
Schell, R.R.3
-
44
-
-
33846310618
-
-
Dorothy Denning, et al., A Multilevel Relational Data Model, Proceedings, 1987 IEEE Computer Security Symposium on Research in Security and Privacy, 27-29 April 1987, Oakland, CA, 220-242.
-
Dorothy Denning, et al., "A Multilevel Relational Data Model," Proceedings, 1987 IEEE Computer Security Symposium on Research in Security and Privacy, 27-29 April 1987, Oakland, CA, 220-242.
-
-
-
|