-
1
-
-
0001314320
-
Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator
-
Aharon Aharon, Ayal Bar-David, Barry Dorfman, Emanuel Gofman, Moshe Leibowitz, and Victor Schwartzburd. Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator. IBM Systems Journal, 30(4):527-538, 1991.
-
(1991)
IBM Systems Journal
, vol.30
, Issue.4
, pp. 527-538
-
-
Aharon, A.1
Bar-David, A.2
Dorfman, B.3
Gofman, E.4
Leibowitz, M.5
Schwartzburd, V.6
-
2
-
-
0029230835
-
Test program generation for functional verification of PowerPC processors in IBM
-
San Francisco, CA, June. Association for Computing Machinery
-
Aharon Aharon, Dave Goodman, Moshe Levinger, Yossi Lichtenstein, Yossi Malka, Charlotte Metzger, Moshe Molcho, and Gil Shurek. Test program generation for functional verification of PowerPC processors in IBM. In Proceedings of the 32nd ACM/IEEE Design Automation Conference, pages 279-285, San Francisco, CA, June 1998. Association for Computing Machinery.
-
(1998)
Proceedings of the 32nd ACM/IEEE Design Automation Conference
, pp. 279-285
-
-
Aharon, A.1
Goodman, D.2
Levinger, M.3
Lichtenstein, Y.4
Malka, Y.5
Metzger, C.6
Molcho, M.7
Shurek, G.8
-
4
-
-
0003837824
-
-
Technical report, Compaq Computer Corporation, October
-
Alpha architecture handbook. Technical report, Compaq Computer Corporation, October 1998.
-
(1998)
Alpha Architecture Handbook
-
-
-
7
-
-
4544321216
-
Application of attack potential to smartcards
-
Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
-
Application of attack potential to smartcards. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/aapsc11.pdf.
-
(2002)
Technical Report Version 1.1
-
-
-
8
-
-
0020087234
-
Architecture management for ensuring software compatibility in the VAX family of computers
-
February
-
Dileep Bhandarkar. Architecture management for ensuring software compatibility in the VAX family of computers. Computer, 15(2):87-93, February 1982.
-
(1982)
Computer
, vol.15
, Issue.2
, pp. 87-93
-
-
Bhandarkar, D.1
-
9
-
-
4544370627
-
MULTOS version 3 on Hitachi H8/3112 integrated circuit card
-
UK IT Security Evaluation and Certification Scheme, Certification Body, PO Box 152, Cheltenham, UK, 13 September
-
M. D. Brown. MULTOS version 3 on Hitachi H8/3112 integrated circuit card. Technical Report UK ITSEC Scheme Certification Report No. P130, UK IT Security Evaluation and Certification Scheme, Certification Body, PO Box 152, Cheltenham, UK, 13 September 1999.
-
(1999)
Technical Report UK ITSEC Scheme Certification Report No. P130
, vol.P130
-
-
Brown, M.D.1
-
11
-
-
4544280563
-
Common criteria for information technology security evaluation: Supplement: Vulnerability analysis and penetration testing
-
Common Criteria Interpretation Management Board, July
-
Common criteria for information technology security evaluation: Supplement: Vulnerability analysis and penetration testing. Technical Report CCIBM-2002-07-001, Version 0.68, Common Criteria Interpretation Management Board, July 2002. URL: http://web.archive.org/web/20030507065423/http://www.commoncriteria.org/ review_docs/docs/2002-07-001.pdf.
-
(2002)
Technical Report CCIBM-2002-07-001, Version 0.68
-
-
-
12
-
-
4544291832
-
-
DOD 5200.28-STD, National Computer Security Center, Washington, DC, December
-
Department of defense trusted computer system evaluation criteria. DOD 5200.28-STD, National Computer Security Center, Washington, DC, December 1985. URL: http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.pdf.
-
(1985)
-
-
-
13
-
-
4544237580
-
Application support architecture for a high-performance, programmable secure coprocessor
-
Crystal City, VA, 18-21 October
-
Joan Dyer, Ron Perez, Sean Smith, and Mark Lindemann. Application support architecture for a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, Crystal City, VA, 18-21 October 1999. URL: http://csrc.ncsl.nist.gov/nissc/1999/proceeding/papers/p16.pdf.
-
(1999)
22nd National Information Systems Security Conference
-
-
Dyer, J.1
Perez, R.2
Smith, S.3
Lindemann, M.4
-
14
-
-
4544269213
-
ETR-lite for composition
-
Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
-
ETR-lite for composition. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/etrli11.pdf.
-
(2002)
Technical Report Version 1.1
-
-
-
15
-
-
4544236977
-
ETR-lite for composition: Annex a composite smartcard evaluation: Recommended best practice
-
Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March
-
ETR-lite for composition: Annex a composite smartcard evaluation: Recommended best practice. Technical Report Version 1.1, Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March 2002. URL: http://www.bsi.de/zertifiz/zert/interpir/etrlia12.pdf.
-
(2002)
Technical Report Version 1.1
-
-
-
16
-
-
21644455797
-
Functionality classes and evaluation methodology for physical random number generators
-
Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 September
-
Functionality classes and evaluation methodology for physical random number generators. Technical Report AIS 31, Version 1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 September 2001. URL: http://www.bsi.bund.de/zertifiz/zert/interpr/ais31e.pdf.
-
(2001)
Technical Report AIS 31, Version 1
-
-
-
17
-
-
4544280564
-
Guidance for smartcard evaluation
-
Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March
-
Guidance for smartcard evaluation. Technical Report Version 1.1, Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), Paris, France, March 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/scgui11.pdf.
-
(2002)
Technical Report Version 1.1
-
-
-
18
-
-
4544230378
-
Hardware subverter for the Honey well 6180
-
The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, December
-
Kevin B. Hennigan. Hardware subverter for the Honey well 6180. Technical Report ESD-TR-76-352, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, December 1976.
-
(1976)
Technical Report
, vol.ESD-TR-76-352
-
-
Hennigan, K.B.1
-
23
-
-
4544256110
-
-
22 May
-
Information Processing Center, Massachusetts Institute of Technology, Cambridge, MA. Summary of the H6180 Processor, 22 May 1973.
-
(1973)
Summary of the H6180 Processor
-
-
-
24
-
-
4544336845
-
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
-
International Organization for Standardization, Genève
-
Information technology - security techniques - evaluation criteria for IT security - part 3: Security assurance requirements. Technical Report ISO/IEC15408-3, International Organization for Standardization, Genève, 1999.
-
(1999)
Technical Report
, vol.ISO-IEC15408-3
-
-
-
26
-
-
3042716872
-
Multics security evaluation: Vulnerability analysis
-
HQ Electronic Systems Division, Hanscom AFB, MA, USA, June
-
Paul A. Karger and Roger R. Schell. Multics security evaluation: Vulnerability analysis. Technical Report ESD-TR-74-193, Vol. II, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June 1974. URL: http://csrc.nist.gov/publications/history/karg74.pdf.
-
(1974)
Technical Report
, vol.2 ESD-TR-74-193
-
-
Karger, P.A.1
Schell, R.R.2
-
27
-
-
84948969398
-
Thirty years later: Lessons from the Multics security evaluation
-
Las Vegas, NV, 9-13 December
-
Paul A. Karger and Roger R. Schell. Thirty years later: Lessons from the Multics security evaluation. In Proceedings of the 18th Annual Computer Security Applications Conference, pages 119-126, Las Vegas, NV, 9-13 December 2002. URL: http://www.acsac.org/2002/papers/classic-multics.pdf.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 119-126
-
-
Karger, P.A.1
Schell, R.R.2
-
29
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
November
-
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, and Clifford E. Kahn. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11): 1147-1165, November 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
30
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
Santa Barbara, CA, August. Lecture Notes in Computer Science, Springer Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis: Leaking secrets. In Proceedings of Crypto '99, pages 388-397, Santa Barbara, CA, August 1999. Lecture Notes in Computer Science, Vol. 1666, Springer Verlag.
-
(1999)
Proceedings of Crypto '99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
32
-
-
84859015303
-
Soft tempest: Hidden data transmission using electromagnetic emanations
-
Portland, OR, April 1998. Lecture Notes in Computer Science, Springer Verlag
-
Markus G. Kuhn and Ross J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding: Second International Workshop, IH'98, pages 124-142, Portland, OR, April 1998. Lecture Notes in Computer Science, Vol. 1525, Springer Verlag. URL: http://www.cl.cam.ac.uk/mgk25/ih98-tempest.pdf.
-
Information Hiding: Second International Workshop, IH'98
, vol.1525
, pp. 124-142
-
-
Kuhn, M.G.1
Anderson, R.J.2
-
35
-
-
4544370629
-
The VAX 8800 microarchitecture
-
February
-
Sudhindra N. Mishra. The VAX 8800 microarchitecture. Digital Technical Journal, (4):20-33, February 1987.
-
(1987)
Digital Technical Journal
, Issue.4
, pp. 20-33
-
-
Mishra, S.N.1
-
36
-
-
0014929268
-
Hardware aspects of secure computing
-
Atlantic City, NJ, 5-7 May. AFIPS Press
-
Lee M. Molho. Hardware aspects of secure computing. In 1970 Spring Joint Computer Conference, pages 135-141, Atlantic City, NJ, 5-7 May 1970. AFIPS Press.
-
(1970)
1970 Spring Joint Computer Conference
, pp. 135-141
-
-
Molho, L.M.1
-
37
-
-
4544232432
-
-
Philips Electronics North America Corporation. XA User Guide, 1998. URL: http://www-us.semiconductors.philips.com/acrobat/various/XA_USER_GUIDE_1.pdf.
-
(1998)
XA User Guide
-
-
-
39
-
-
0035246794
-
On the role of formal methods in security
-
28 February
-
Josyula R. Rao. On the role of formal methods in security. Information Processing Letters, 77(2-4):209-212, 28 February 2001.
-
(2001)
Information Processing Letters
, vol.77
, Issue.2-4
, pp. 209-212
-
-
Rao, J.R.1
-
40
-
-
84958951541
-
Program confinement in KVM/370
-
Seattle, WA, 16-19 October
-
Marvin Schaefer, Barry Gold, Richard Linde, and John Scheid. Program confinement in KVM/370. In Proceedings of the 1977 ACM Annual Conference, pages 404-410, Seattle, WA, 16-19 October 1977.
-
(1977)
Proceedings of the 1977 ACM Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
41
-
-
4544282487
-
Information security: Science, pseudoscience, and flying pigs
-
New Orleans, LA, 10-14 December. IEEE Computer Society
-
Roger R. Schell. Information security: Science, pseudoscience, and flying pigs. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 205-216, New Orleans, LA, 10-14 December 2001. IEEE Computer Society. URL: http://www.acsac.org/invited-essay/essays/2001-schell.pdf.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 205-216
-
-
Schell, R.R.1
-
42
-
-
0003584029
-
Security requirements for cryptographic modules
-
National Institute of Standards and Technology, Gaithersburg, MD, 11 January
-
Security requirements for cryptographic modules. Technical Report FIPS PUB 140-1, National Institute of Standards and Technology, Gaithersburg, MD, 11 January 1994. URL: http://csrc.nist.gov/publications/fips/fips140-1/fips1401.pdf.
-
(1994)
Technical Report
, vol.FIPS PUB 140-1
-
-
-
43
-
-
1242295745
-
Security requirements for cryptographic modules
-
Change Notice 1, National Institute of Standards and Technology, Gaithersburg, MD, 10 October
-
Security requirements for cryptographic modules. Technical Report FIPS PUB 140-2, Change Notice 1, National Institute of Standards and Technology, Gaithersburg, MD, 10 October 2001. URL: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.
-
(2001)
Technical Report
, vol.FIPS PUB 140-2
-
-
-
44
-
-
4544336846
-
TCB subsets for incremental evaluation
-
Oakland, CA, 7-11 December. American Institute of Aeronautics and Astronautics
-
William R. Shockley and Roger R. Schell. TCB subsets for incremental evaluation. In Proceedings of the Third Aerospace Conference on Computer Security, pages 131-139, Oakland, CA, 7-11 December 1987. American Institute of Aeronautics and Astronautics. URL: http://www.acsac.org/secshelf/papers/tcbsubsets.pdf.
-
(1987)
Proceedings of the Third Aerospace Conference on Computer Security
, pp. 131-139
-
-
Shockley, W.R.1
Schell, R.R.2
-
45
-
-
4544236364
-
Smartcard IC platform protection profile
-
developed by Atmel Smart Card ICs, Hitachi Europe Ltd., Infineon Technologies AG, and Philips Semiconductors, registered and certified by Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
-
Smartcard IC platform protection profile. Technical Report BSI-PP-0002-2001, developed by Atmel Smart Card ICs, Hitachi Europe Ltd., Infineon Technologies AG, and Philips Semiconductors, registered and certified by Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2001. URL: http://www.bsi.bund.de/cc/pplist/ssvgpp01.pdf.
-
(2001)
Technical Report
, vol.BSI-PP-0002-2001
-
-
-
46
-
-
4544247466
-
ST-lite
-
Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
-
ST-lite. Technical Report Version 1.1, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/stlite11.pdf.
-
(2002)
Technical Report Version 1.1
-
-
-
47
-
-
0031639694
-
Functional verification of a multiple-issue, out-of-order, super-scalar Alpha processor - The DEC Alpha 21264 microprocessor
-
San Francisco, CA, June. Association for Computing Machinery
-
Scott Taylor, Michael Quinn, Darren Brown, Nathan Dohm, Scot Hildebrandt, James Huggins, and Carl Ramey. Functional verification of a multiple-issue, out-of-order, super-scalar Alpha processor - the DEC Alpha 21264 microprocessor. In Proceedings of the 35th Annual Conference on Design Automation, pages 638-644, San Francisco, CA, June 1998. Association for Computing Machinery.
-
(1998)
Proceedings of the 35th Annual Conference on Design Automation
, pp. 638-644
-
-
Taylor, S.1
Quinn, M.2
Brown, D.3
Dohm, N.4
Hildebrandt, S.5
Huggins, J.6
Ramey, C.7
-
48
-
-
4544273303
-
The application of CC to integrated circuits
-
Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July
-
The application of CC to integrated circuits. Technical Report Version 1.2, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, July 2002. URL: http://www.bsi.de/zertifiz/zert/interpr/hwiccc12.pdf.
-
(2002)
Technical Report Version 1.2
-
-
-
49
-
-
7244234916
-
Trusted database management system interpretation of the TCSEC (TDI)
-
National Computer Security Center, Fort George G. Meade, MD, April
-
Trusted database management system interpretation of the TCSEC (TDI). Technical Report NCSC-TG-021, National Computer Security Center, Fort George G. Meade, MD, April 1991. URL: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-021.ps.
-
(1991)
Technical Report
, vol.NCSC-TG-021
-
-
-
50
-
-
4544284713
-
Security controls in the ADEPT-50 time sharing system
-
Montvale, NJ, USA. AFIPS Press
-
Clark Weissman. Security controls in the ADEPT-50 time sharing system. In AFIPS Conference Proceedings, Volume 35, 1969 Fall Joint Computer Conference, pages 119-133, Montvale, NJ, USA, 1969. AFIPS Press.
-
(1969)
AFIPS Conference Proceedings, Volume 35, 1969 Fall Joint Computer Conference
, vol.35
, pp. 119-133
-
-
Weissman, C.1
|