-
1
-
-
3943093761
-
Information security: An elusive goal
-
Harvard University, Cambridge, MA, June
-
Jelen, George F., Information Security: An Elusive Goal, Program on Information Resources Policy, Harvard University, Cambridge, MA, June 1985
-
(1985)
Program on Information Resources Policy
-
-
Jelen George, F.1
-
2
-
-
0003053039
-
Concepts and terminology for computer security
-
M. Abrams, S.Jajodia, and H.Podell, eds., IEEE Computer Society Press, Los Alamitos, Calif
-
Brinkley, D.L. and Schell, R.R., Concepts and Terminology for Computer Security, Information Security, M. Abrams, S.Jajodia, and H.Podell, eds., IEEE Computer Society Press, Los Alamitos, Calif., 1995
-
(1995)
Information Security
-
-
Brinkley, D.L.1
Schell, R.R.2
-
3
-
-
84949270504
-
Novell certificate extension attributes-novell security attributes
-
Novell Inc., August
-
Jueneman, R.R., Novell Certificate Extension Attributes-Novell Security Attributes, Tutorial and Detailed Design, Document Version 0.998, Novell Inc., August 1998
-
(1998)
Tutorial and Detailed Design, Document Version 0.998
-
-
Jueneman, R.R.1
-
4
-
-
84949223114
-
Department of defense trusted computer security evaluation criteria, DOD 5200.28-STD
-
December
-
Department of Defense Trusted Computer Security Evaluation Criteria, DOD 5200.28-STD, National Computer Security Center, December 1985
-
(1985)
National Computer Security Center
-
-
-
5
-
-
84949270505
-
Final evaluation report, novell, incorporated netware 4.1.1 server
-
June
-
Final Evaluation Report, Novell, Incorporated Netware 4.1.1 Server, National Computer Security Center, June 1998
-
(1998)
National Computer Security Center
-
-
-
6
-
-
0033895110
-
Platform security: What is lacking?
-
Elsevier Advanced Technology
-
Schell, R.R. and Thompson, M.F., Platform Security: What is Lacking? Information Security Technical Report, Vol 5, No. 1, 2000, Elsevier Advanced Technology
-
(2000)
Information Security Technical Report
, vol.5
, Issue.1
-
-
Schell, R.R.1
Thompson, M.F.2
-
8
-
-
84949270506
-
Trusted network interpretation of trusted computer system evaluation criteria, NCSC-TG-005
-
31 July
-
Trusted Network Interpretation of Trusted Computer System Evaluation Criteria, NCSC-TG-005, National Computer Security Center Version 1, 31 July 1987
-
(1987)
National Computer Security Center Version 1
-
-
-
9
-
-
84949270507
-
Common criteria for information technology security evaluation
-
ISO/IEC, May
-
Common Criteria for Information Technology Security Evaluation, CCIB-98-026, ISO/IEC, May 1998
-
(1998)
CCIB-98-026
-
-
-
12
-
-
0003714340
-
-
National Academy Press, Washington, D.C., Fred B. Schneider, Editor
-
Trust In Cyberspace, National Academy Press, Washington, D.C. 1998, Fred B. Schneider, Editor
-
(1998)
Trust in Cyberspace
-
-
-
13
-
-
3943108716
-
Computer security: The achilles' heel of the electronic air force
-
Jan.-Feb
-
R.R. Schell, Computer Security: the Achilles' Heel of the Electronic Air Force, Air University Review, Vol. 30:2, Jan.-Feb., 1979
-
(1979)
Air University Review
, vol.30
, Issue.2
-
-
Schell, R.R.1
-
14
-
-
0006291871
-
Security controls for computer systems: Report of defense science board task force on computer security, ad # a076617/0
-
Santa Monica, Calif., February, reissued October 1979
-
Ware, W. H., ed., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, AD # A076617/0, Rand Corporation, Santa Monica, Calif., February 1970, reissued October 1979
-
(1970)
Rand Corporation
-
-
Ware, W.H.1
-
16
-
-
0020778471
-
SCOMP: A solution to the multilevel security problem
-
July
-
Fraim, L.J., SCOMP: A Solution to the Multilevel Security Problem, IEEE Computer, July 1983
-
(1983)
IEEE Computer
-
-
Fraim, L.J.1
-
18
-
-
4544284713
-
Security controls in the ADEPT-50 time-sharing system
-
Weissman, C., Security Controls in the ADEPT-50 Time-Sharing System, Fall Joint Computer Conference, 1969
-
(1969)
Fall Joint Computer Conference
-
-
Weissman, C.1
-
19
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J.H. Saltzer and M.R. Schroeder. The Protection of Information in Computer Systems, Proc. IEEE Vol. 63, No. 9, September 1975
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.R.2
-
20
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning, D.E. A Lattice Model of Secure Information Flow. Communications of the ACM, Vol 19. No 5, May 1976
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
21
-
-
66749185396
-
Computer security model: Unified exposition and multics interpretation
-
Bedford MA, June
-
Bell, D.E. and LaPadula, L.J., Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306. MITRE Corporation, Bedford MA, June 1975
-
(1975)
ESD-TR-75-306. MITRE Corporation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
22
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, MA, April
-
Biba, K.J., Integrity Considerations for Secure Computer Systems, ESD-TR-76-372, MITRE Corporation, Bedford, MA, April 1977
-
(1977)
ESD-TR-76-372, MITRE Corporation
-
-
Biba, K.J.1
-
24
-
-
0020777709
-
Security kernel design and implementation: An introduction
-
July
-
Ames, S.R., et al, Security Kernel Design and Implementation: An Introduction, Computer, IEEE, July 1983
-
(1983)
Computer, IEEE
-
-
Ames, S.R.1
-
26
-
-
0015346655
-
A technique for software module specification with examples
-
May
-
Parnas, D.L., A Technique for Software Module Specification with Examples, Communications of the ACM, Vol. 13, No. 5, May, 1972
-
(1972)
Communications of the ACM
, vol.13
, Issue.5
-
-
Parnas, D.L.1
-
27
-
-
0018434466
-
Synchronization with eventcounts and sequencers
-
February
-
D.P. Reed, and R.K. Kanodia, Synchronization with Eventcounts and Sequencers, Communications of the ACM, Vol.22, No. 2, February 1979
-
(1979)
Communications of the ACM
, vol.22
, Issue.2
-
-
Reed, D.P.1
Kanodia, R.K.2
-
28
-
-
0016951438
-
Security kernel validation in practice
-
May
-
Millen, J.K. Security Kernel Validation in Practice. Communications of the ACM. Vol 19. No 5, May 1976
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Millen, J.K.1
-
30
-
-
53349127055
-
Limitations of end-to-end encryption in secure computer networks
-
May (ESD TR 78-158, DTIC AD A059221)
-
Padlipsky, M. A., Snow, D. P., and Karger, P. A., Limitations of End-to-End Encryption in Secure Computer Networks, The MITRE Corporation, MTR-3592, Vol. I, May 1978 (ESD TR 78-158, DTIC AD A059221)
-
(1978)
The MITRE Corporation, MTR-3592
, vol.1
-
-
Padlipsky, M.A.1
Snow, D.P.2
Karger, P.A.3
-
31
-
-
84949270516
-
Final evaluation report, gemini network processor, version 1.01
-
June
-
Final Evaluation Report, Gemini Network Processor, Version 1.01, National Computer Security Center, pp 123-124, June 1995
-
(1995)
National Computer Security Center
, pp. 123-124
-
-
-
34
-
-
0026254933
-
A retrospective of the VAX VMM security kernel
-
Nov
-
Karger, P. A., et al., A Retrospective of the VAX VMM Security Kernel, IEEE Transactions on Software Engineering, Vol. 17, No. 11, Nov. 1991
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
-
-
Karger, P.A.1
-
35
-
-
4544336846
-
TCB subsets for incremental evaluation
-
Washington D.C
-
Shockley, W.R. and Schell, R.R., TCB Subsets for Incremental Evaluation, Proc. of the 3rd Aerospace Computer Security Conference, American Institute of Aeronautics and Astronautics, Washington D.C., 1987
-
(1987)
Proc. of the 3rd Aerospace Computer Security Conference, American Institute of Aeronautics and Astronautics
-
-
Shockley, W.R.1
Schell, R.R.2
-
37
-
-
0025442003
-
The seaview security model
-
June
-
Lunt, T. F., et al., The SeaView Security Model, IEEE Transaction on Software Engineering, Vol. 16, No. 6, June 1990
-
(1990)
IEEE Transaction on Software Engineering
, vol.16
, Issue.6
-
-
Lunt, T.F.1
-
38
-
-
84949270519
-
Trusted database management system interpretation of the trusted computer system evaluation criteria
-
April
-
Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-021, National Computer Security Center, April 1991
-
(1991)
NCSC-TG-021, National Computer Security Center
-
-
-
39
-
-
84949270520
-
Bring in e-trading PIN pads
-
Sydney, Australia, 24 October
-
Bill Caelli, Bring in E-Trading PIN Pads, The Australian newspaper, Sydney, Australia, 24 October 2000
-
(2000)
The Australian Newspaper
-
-
Caelli, B.1
|