-
1
-
-
84949043130
-
Broward officials want students to try hacking mock election
-
16 August: Ft. Lauderdale, FL
-
Broward Officials Want Students to Try Hacking Mock Election, in Assoc. Press 16 August 2001: Ft. Lauderdale, FL. URL: http://www.wtsp.com/news/2001-08/16-mock-election.htm
-
(2001)
Assoc. Press
-
-
-
3
-
-
84948983514
-
-
CSC-EPL-85/003 (releasable only to US Government and their contractors), 1 September, National Computer Security Center: Ft. George G. Meade, MD
-
Final Evaluation Report of Multics, MR11.0, CSC-EPL-85/003 (releasable only to US Government and their contractors), 1 September 1985, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/fers/tcsec-fers.html
-
(1985)
Final Evaluation Report of Multics, MR11 0
-
-
-
6
-
-
0006100649
-
Smashing the stack for fun and profit
-
8 November
-
Aleph One, Smashing the Stack for Fun and Profit. Phrack, 8 November 1996. 7(49). URL: http://www.phrack.org/show.php?p=49&a=14
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
7
-
-
84867290201
-
Waiting for the great computer rip-off
-
Alexander, T., Waiting for the Great Computer Rip-off. Fortune, 1974. XC(1): p. 142-150
-
(1974)
Fortune
, vol.40
, Issue.1
, pp. 142-150
-
-
Alexander, T.1
-
9
-
-
0025443276
-
Compartmented mode workstation: Prototype highlights
-
June
-
Berger, J.L., J. Picciotto, et al., Compartmented Mode Workstation: Prototype Highlights. IEEE Transactions on Software Engineering, June 1990. 16(6): p. 608-618
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 608-618
-
-
Berger, J.L.1
Picciotto, J.2
-
10
-
-
33846272955
-
-
WP-20119, April, The MITRE Corporation: Bedford, MA
-
Biba, K.J., S.R. Ames, et al., A Preliminary Specification of a Multics Security Kernel, WP-20119, April 1975, The MITRE Corporation: Bedford, MA
-
(1975)
A Preliminary Specification of A Multics Security Kernel
-
-
Biba, K.J.1
Ames, S.R.2
-
11
-
-
84941520546
-
SE/VMS: Implementing mandatory security in VAX/VMS
-
15-18 September, Gaithersburg, MD National Bureau of Standards
-
Blotcky, S., K. Lynch, et al. SE/VMS: Implementing Mandatory Security in VAX/VMS. in Proceedings of the 9th National Computer Security Conference. 15-18 September 1986, Gaithersburg, MD National Bureau of Standards. p. 47-54
-
(1986)
Proceedings of the 9th National Computer Security Conference
, pp. 47-54
-
-
Blotcky, S.1
Lynch, K.2
-
12
-
-
0034502932
-
A national-scale authentication infrastructure
-
December
-
Butler, R., V. Welch, et al., A National-Scale Authentication Infrastructure. Computer, December 2000. 33(12): p. 60-66
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
Welch, V.2
-
13
-
-
84948975437
-
The hot hand in the ASP game
-
15 January
-
Carr, D.F., The Hot Hand in the ASP Game. Internet World, 15 January 2000. 6(2): p. 53. URL: http://www.internetworld.com/magazine.php?inc=011500/1.15c over-story.html
-
(2000)
Internet World
, vol.6
, Issue.2
, pp. 53
-
-
Carr, D.F.1
-
14
-
-
84949043131
-
Who says paranoia doesn't pay off?
-
20 September
-
Cooper, C., Who says paranoia doesn't pay off? CNET News.com, 20 September 2002. URL: http://news.com.com/2010-1071-958721.html
-
(2002)
CNET News.com
-
-
Cooper, C.1
-
15
-
-
84890034254
-
PL/I As a tool for system programming
-
May
-
Corbató, F.J., PL/I As a Tool for System Programming. Datamation, May 1969. 15(5): p. 68-76. URL: http://home.nycap.rr.com/pflass/plisprg.htm
-
(1969)
Datamation
, vol.15
, Issue.5
, pp. 68-76
-
-
Corbató, F.J.1
-
16
-
-
85060818077
-
Introduction and overview of the multics system
-
Washington, DC Vol. AFIPS Conference Proceedings Vol
-
Corbató, F.J. and V.A. Vyssotsky. Introduction and Overview of the Multics System. in Fall Joint Computer Conference. 1965, Washington, DC Vol. AFIPS Conference Proceedings Vol
-
(1965)
Fall Joint Computer Conference
-
-
Corbató, F.J.1
Vyssotsky, V.A.2
-
17
-
-
84949043132
-
-
Spartan Books. p. 185-196. URL: http://www.multicians.org/fjcc1.html
-
Spartan Books
, pp. 185-196
-
-
-
18
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
25-27 January, Hilton Head Island, SC
-
Cowan, C., P. Wagle, et al. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. in DARPA Information Survivability Conference and Expo (DISCEX). 25-27 January 2000, Hilton Head Island, SC Vol. 2. p. 119-129. URL: http://www.immunix.org/StackGuard/discex00.pdf
-
(2000)
DARPA Information Survivability Conference and Expo (DISCEX)
, vol.2
, pp. 119-129
-
-
Cowan, C.1
Wagle, P.2
-
19
-
-
85034991363
-
Some thoughts about the social implications of accessible computing
-
Washington, DC Vol. AFIPS Conference Proceedings, Spartan Books
-
David, E.E., Jr. and R.M. Fano. Some Thoughts About the Social Implications of Accessible Computing. in Fall Joint Computer Conference. 1965, Washington, DC Vol. AFIPS Conference Proceedings Vol. 27 Spartan Books. p. 243-247. URL: http://www.multicians.org/fjcc6.html
-
(1965)
Fall Joint Computer Conference
, vol.27
, pp. 243-247
-
-
David, E.E.1
Fano, R.M.2
-
20
-
-
84862450041
-
-
CERT® Advisory CA-2002-24, 2 August, CERT Coordination Center, Carnegie Mellon University: Pittsburgh, PA
-
Dougherty, C., Trojan Horse OpenSSH Distribution, CERT® Advisory CA-2002-24, 2 August 2002, CERT Coordination Center, Carnegie Mellon University: Pittsburgh, PA. URL: http://www.cert.org/advisories/CA-2002-24.html
-
(2002)
Trojan Horse OpenSSH Distribution
-
-
Dougherty, C.1
-
21
-
-
84948966549
-
Patterns of security violations: Multiple references to arguments
-
D.D. Clark, Editor, June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
-
Forsdick, H.C. and D.P. Reed, Patterns of Security Violations: Multiple References to Arguments, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 34-49
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 34-49
-
-
Forsdick, H.C.1
Reed, D.P.2
-
22
-
-
0032218229
-
A security architecture for computational grids
-
2-5 November, San Francisco, CA
-
Foster, I., C. Kesselman, et al. A Security Architecture for Computational Grids. in Proceedings of the 5th ACM Conference on Computer and Communications Security. 2-5 November 1998, San Francisco, CA p. 83-92
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
-
23
-
-
84948955225
-
-
30 July, IBM Corp., T. J. Watson Research Center: Hawthorne, NY
-
Jaeger, T., Personal Communication, 30 July 2002, IBM Corp., T. J. Watson Research Center: Hawthorne, NY
-
(2002)
Personal Communication
-
-
Jaeger, T.1
-
24
-
-
3943093761
-
-
June, Program on Information Resources Policy, Harvard University: Cambridge, MA. URL
-
Jelen, G.F., Information Security: An Elusive Goal, P-85-8, June 1985, Program on Information Resources Policy, Harvard University: Cambridge, MA. URL: http://www.pirp.harvard.edu/publications/pdf-blurb.asp?id=238
-
(1985)
Information Security: An Elusive Goal
, pp. 85-88
-
-
Jelen, G.F.1
-
25
-
-
84949043133
-
-
ESD-TR-74-193. June, HQ Electronic Systems Division: Hanscom AFB, MA
-
Karger, P.A. and R.R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, June 1974, HQ Electronic Systems Division: Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/karg74.pdf
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
, vol.2
-
-
Karger, P.A.1
Schell, R.R.2
-
26
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
November
-
Karger, P.A., M.E. Zurko, et al., A Retrospective on the VAX VMM Security Kernel. IEEE Transactions on Software Engineering, November 1991. 17(11): p. 1147-1165
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
-
27
-
-
84911522531
-
-
Computer Science Press: Potomoc, MD, 185
-
Logsdon, T., Computers & Social Controversy, 1980, Computer Science Press: Potomoc, MD. p. 170-175, 185
-
(1980)
Computers & Social Controversy
, pp. 170-175
-
-
Logsdon, T.1
-
29
-
-
84948970972
-
Repaired security bugs in multics
-
D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
-
Saltzer, J.H., Repaired Security Bugs in Multics, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 1-4
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 1-4
-
-
Saltzer, J.H.1
-
30
-
-
84948977630
-
Some recently repaired security holes of multics
-
D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
-
Saltzer, J.H. and D. Hunt, Some Recently Repaired Security Holes of Multics, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 28-33
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 28-33
-
-
Saltzer, J.H.1
Hunt, D.2
-
31
-
-
84948979994
-
Some multics security holes which were closed by 6180 hardware
-
D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
-
Saltzer, J.H., P. Jansen, et al., Some Multics Security Holes Which Were Closed by 6180 Hardware, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 22-27
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 22-27
-
-
Saltzer, J.H.1
Jansen, P.2
-
32
-
-
3943108716
-
Computer security: The achilles' heel of the electronic air force?
-
January-February
-
Schell, R.R. Computer security: the Achilles' heel of the electronic Air Force? in Air University Review. January-February 1979, Vol. 30 p. 16-33. URL: http://www.airpower.maxwell.af.mil/airchronicles/aureview/197 9/jan-feb/schell.html
-
(1979)
Air University Review
, vol.30
, pp. 16-33
-
-
Schell, R.R.1
-
33
-
-
0011319414
-
Designing the GEMSOS security kernel for security and performance
-
30 September-3 October, Gaithersburg, MD DoD Computer Security Center and National Bureau of Standards
-
Schell, R.R., T.F. Tao, et al. Designing the GEMSOS Security Kernel for Security and Performance. in Proceedings of the 8th National Computer Security Conference. 30 September-3 October 1985, Gaithersburg, MD DoD Computer Security Center and National Bureau of Standards. p. 108-119
-
(1985)
Proceedings of the 8th National Computer Security Conference
, pp. 108-119
-
-
Schell, R.R.1
Tao, T.F.2
-
34
-
-
84949043134
-
-
WP-20810, 9 July, The MITRE Corporation: Bedford, MA
-
Schiller, W.L., P.T. Withington, et al., Top Level Specification of a Multics Security Kernel, WP-20810, 9 July 1976, The MITRE Corporation: Bedford, MA
-
(1976)
Top Level Specification of A Multics Security Kernel
-
-
Schiller, W.L.1
Withington, P.T.2
-
36
-
-
84983183538
-
The multics kernel design project
-
November
-
Schroeder, M.D., D.D. Clark, et al., The Multics Kernel Design Project. Proceedings of the Seventh ACM Symposium on Operating Systems Principles, Operating Systems Review, November 1977. 11(5): p. 43-56
-
(1977)
Proceedings of the Seventh ACM Symposium on Operating Systems Principles, Operating Systems Review
, vol.11
, Issue.5
, pp. 43-56
-
-
Schroeder, M.D.1
Clark, D.D.2
-
37
-
-
84948966649
-
New software quietly diverts sales commissions
-
27 September
-
Schwartz, J. and B. Tedeschi, New Software Quietly Diverts Sales Commissions. The New York Times, 27 September 2002: p. C1-C4. URL: http://www.nytimes.com/2002/09/27/technology/27FREE.html
-
(2002)
The New York Times
, pp. C1-C4
-
-
Schwartz, J.1
Tedeschi, B.2
-
38
-
-
33748161983
-
-
NAI Labs Report #02-007, June, NAI Labs: Glenwood, MD
-
Smalley, S., Configuring the SELinux Policy, NAI Labs Report #02-007, June 2002, NAI Labs: Glenwood, MD. URL: http://www.nsa.gov/selinux/policy2-abs.html
-
(2002)
Configuring the SELinux Policy
-
-
Smalley, S.1
-
39
-
-
84949043135
-
-
ESD-TR-76-368, November, Honeywell Information Sys-tems, Inc., McLean, VA, HQ Electronic Systems Division: Hanscom AFB, MA
-
Stern, J., Multics Security Kernel Top Level Specification, ESD-TR-76-368, November 1976, Honeywell Information Sys-tems, Inc., McLean, VA, HQ Electronic Systems Division: Hanscom AFB, MA
-
(1976)
Multics Security Kernel Top Level Specification
-
-
Stern, J.1
-
40
-
-
33846334286
-
On trusting trust
-
November
-
Thompson, K., On Trusting Trust. Unix Review, November 1989. 7(11): p. 70-74
-
(1989)
Unix Review
, vol.7
, Issue.11
, pp. 70-74
-
-
Thompson, K.1
-
41
-
-
84976781807
-
Reflections on trusting trust
-
August
-
Thompson, K., Reflections on Trusting Trust. Communications of the ACM, August 1984. 27(8): p. 761-763
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
42
-
-
84948967042
-
A census of ring 0
-
D.D. Clark, Editor. June, MIT/LCS/TM-87, Laboratory for Computer Science Massachusetts Institute of Technology: Cambridge, MA
-
Voydock, V.L., A Census of Ring 0, in Ancillary Reports: Kernel Design Project, D.D. Clark, Editor, June 1977, MIT/LCS/TM-87, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. p. 5-27
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 5-27
-
-
Voydock, V.L.1
-
44
-
-
84948984900
-
Trapdoors and trojan horses
-
Thomas Y. Crowell Co.: New York
-
Whiteside, T., Trapdoors and Trojan Horses, in Computer Capers. 1978, Thomas Y. Crowell Co.: New York. p. 115-126
-
(1978)
Computer Capers
, pp. 115-126
-
-
Whiteside, T.1
-
45
-
-
77952249782
-
-
ESD-TR-74-176, December, Honeywell Information Systems, Inc., HQ Electronic Systems Division: Hanscom AFB, MA
-
Whitmore, J., A. Bensoussan, et al., Design for Multics Security Enhancements, ESD-TR-74-176, December 1973, Honeywell Information Systems, Inc., HQ Electronic Systems Division: Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/whit74.pdf
-
(1973)
Design for Multics Security Enhancements
-
-
Whitmore, J.1
Bensoussan, A.2
-
46
-
-
84949043136
-
-
T.H. Van Vleck, Editor. 20 October
-
Zemmin, F., B. Henk, et al., Multics Site History: GM, T.H. Van Vleck, Editor, 20 October 1998. URL: http://www.multicians.org/site-gm.html
-
(1998)
Multics Site History: GM
-
-
Zemmin, F.1
Henk, B.2
|