-
1
-
-
0004200684
-
Computer security technology planning study
-
Deputy for Command and Management Systems HQ Electronic Division (AFSC), L. G. Hanscom Field, Bedford, Massachussetts O1730, October Available from the National Technical Information Service as report number AD-758-206
-
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Vol. II, Deputy for Command and Management Systems HQ Electronic Division (AFSC), L. G. Hanscom Field, Bedford, Massachussetts O1730, October 1972. Available from the National Technical Information Service as report number AD-758-206.
-
(1972)
Technical Report ESD-TR-73-51
, vol.2
-
-
Anderson, J.P.1
-
2
-
-
61849160443
-
-
Ticknor & Fields, New York
-
S. Augarten. Bit by Bit. Ticknor & Fields, New York, 1984.
-
(1984)
Bit by Bit
-
-
Augarten, S.1
-
4
-
-
0003400251
-
Secure computer systems: A refinement of the mathematical model
-
Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April Available from the National Technical Information Service as document number: AD 780 528
-
D.E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD-TR-73-278, Volume III, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1974. Available from the National Technical Information Service as document number: AD 780 528.
-
(1974)
Technical Report ESD-TR-73-278
, vol.3
-
-
Bell, D.E.1
-
5
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November Available from the National Technical Information Service as document number: AD 770 768
-
D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report ESD-TR-73-278, Volume I, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1973. Available from the National Technical Information Service as document number: AD 770 768.
-
(1973)
Technical Report ESD-TR-73-278
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
7
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
Bedford, Massachusetts, March Available from the National Technical Information Service as report number: AD A023 588
-
D.E. Bell and L.J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March 1976. Available from the National Technical Information Service as report number: AD A023 588.
-
(1976)
Technical Report MTR-2997, the MITRE Corporation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
8
-
-
0003400255
-
-
Technical Report MTR-3153, Revison 1, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April Available from the National Technical Information Service
-
K.J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Revison 1, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1977. Available from the National Technical Information Service.
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
10
-
-
0039899191
-
'On line' in 'Real time'
-
April
-
G. Burck. 'On Line' in 'Real Time'. Fortune, page 141., April 1964.
-
(1964)
Fortune
, pp. 141
-
-
Burck, G.1
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D.E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
14
-
-
0003969635
-
-
Technical Report DOD 5200.28-STD, Department of Defense, Washington, D.C., December
-
Department of Defense. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, Washington, D.C., December 1985.
-
(1985)
Department of Defense Trusted Computer System Evaluation Criteria
-
-
-
15
-
-
84942214178
-
Special issue: SAGE (semiautomatic ground environment)
-
October
-
R. Everett, editor. Special issue: SAGE (semiautomatic ground environment). Annals, 5, October 1983.
-
(1983)
Annals
, vol.5
-
-
Everett, R.1
-
17
-
-
0002263608
-
A new security policy for distributed resource management and access control
-
Lake Arrowhead, California, September
-
S.J. Greenwald. A new security policy for distributed resource management and access control. In Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, California, September 1996.
-
(1996)
Proceedings of the 1996 New Security Paradigms Workshop
-
-
Greenwald, S.J.1
-
18
-
-
0009442659
-
Monotonie protection systems
-
New York Academic Press. Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, Georgia, October, 1977
-
M.H. Harrison and W.L. Ruzzo. Monotonie protection systems. In Foundations of Secure Computation, pages 337-365, New York, 1978. Academic Press. Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, Georgia, October, 1977.
-
(1978)
Foundations of Secure Computation
, pp. 337-365
-
-
Harrison, M.H.1
Ruzzo, W.L.2
-
19
-
-
0016984825
-
Protection in operating systems
-
August
-
M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
20
-
-
85052581056
-
An electric tabulating system
-
B. Randell, editor New York, New York Springer-Verlag
-
H. Hollerith. An electric tabulating system. 1889. In B. Randell, editor, The Origins of Digital Computers, New York, New York, 1982. Springer-Verlag.
-
(1889)
The Origins of Digital Computers
-
-
Hollerith, H.1
-
22
-
-
84941491924
-
Computer development at IBM
-
J. Metropolis, N. Howlett and G. Rota, editors New York, New York Academic Press
-
C.C. Hurd. Computer development at IBM. In J. Metropolis, N. Howlett and G. Rota, editors, A History of Computing in the Twentieth Century, pages 389-418, New York, New York, 1980. Academic Press.
-
(1980)
A History of Computing in the Twentieth Century
, pp. 389-418
-
-
Hurd, C.C.1
-
23
-
-
0009340593
-
Redefining security
-
Located somewhere in the bowels of the executive branch under the Assistant to the President, National Security Affairs, February
-
Joint Security Commission. Redefining security. Technical report, U.S. Security Policy Board, Located somewhere in the bowels of the executive branch under the Assistant to the President, National Security Affairs, February 1994. Available at http://www.spb.gov/html/jscrpt.html.
-
(1994)
Technical Report, U.S. Security Policy Board
-
-
-
24
-
-
0003727003
-
-
Scribner, New York, New York
-
D. Kahn. The Code-Breakers. Scribner, New York, New York, 1996.
-
(1996)
The Code-Breakers
-
-
Kahn, D.1
-
26
-
-
0015672289
-
A note on the confinement problem
-
October
-
B.W. Lampson. A note on the confinement problem. Communications of the ACM, 19(10):613-615, October 1973.
-
(1973)
Communications of the ACM
, vol.19
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
27
-
-
84976780900
-
A security model for military message systems
-
August
-
C.E. Landwehr, C.L. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3): 198-222, August 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.3
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
28
-
-
0003400251
-
Secure computer systems: A mathematical model
-
Electronic systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November Available from the National Technical Information Service as report number: AD 771 543
-
L.J. LaPadula and D.E. Bell. Secure computer systems: A mathematical model. Technical Report ESD-TR-73-278, Volume II, Electronic systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1974. Available from the National Technical Information Service as report number: AD 771 543.
-
(1974)
Technical Report ESD-TR-73-278
, vol.2
-
-
LaPadula, L.J.1
Bell, D.E.2
-
29
-
-
0022012611
-
A comment on the "basic security theorem" of bell and LaPadula
-
February
-
J. McLean. A comment on the "basic security theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, February 1985.
-
(1985)
Information Processing Letters
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
30
-
-
0347229432
-
A provably secure operating system
-
Menlo Park, California, June
-
P.G. Neumann, L. Robinson, K. N. Levitt, R.S. Boyer, and A.R. Saxena. A provably secure operating system. Technical Report SRI Project 2581, Stanford Research Institute, Menlo Park, California, June 1975.
-
(1975)
Technical Report SRI Project 2581, Stanford Research Institute
-
-
Neumann, P.G.1
Robinson, L.2
Levitt, K.N.3
Boyer, R.S.4
Saxena, A.R.5
-
32
-
-
3042750861
-
Preliminary notes on the design of secure military computer systems
-
Air Force Systems Command, L.C. Hanscom Field, Bedford, Massachusetts, January
-
R.R. Schell, P.J. Downey, and G.J. Popek. Preliminary notes on the design of secure military computer systems. Technical Report MCl-73-1, Electronic Systems Division, Air Force Systems Command, L.C. Hanscom Field, Bedford, Massachusetts, January 1973.
-
(1973)
Technical Report MCl-73-1, Electronic Systems Division
-
-
Schell, R.R.1
Downey, P.J.2
Popek, G.J.3
-
35
-
-
85029224504
-
-
Department of the Army, Washington, D.C.
-
U.S. Department of the Army. Firing Tables for 155-mm. Gun, M1917, M1917A1, and M1918M1: Firing Shell, H.E., MK.III. Department of the Army, Washington, D.C., 1933.
-
(1933)
Firing Tables for 155-mm. Gun, M1917, M1917A1, and M1918M1: Firing Shell, H.E., MK.III
-
-
-
37
-
-
0006291871
-
-
Technical Report CONFIDENTIAL (declassified), The Rand Corporation for the Office of the Director of Defense Research and Engineering, Washington, D.C., February
-
W.H. Ware. SECURITY CONTROLS FOR COMPUTER SYSTEMS (U) report of defense science boaTd task force on computer security. Technical Report CONFIDENTIAL (declassified), The Rand Corporation for the Office of the Director of Defense Research and Engineering, Washington, D.C., February 1970.
-
(1970)
SECURITY CONTROLS for COMPUTER SYSTEMS (U) Report of Defense Science BoaTd Task Force on Computer Security
-
-
Ware, W.H.1
-
38
-
-
85029234787
-
-
Associate Editor IEEE, October
-
M.E. Zurko, Associate Editor, Cipher. Newsletter 29, IEEE, October 1998. Available from htttp://www.itd.nr1.navy.mil/ITD/5540/ieee/cipher/old-issues/issue9810.
-
(1998)
Cipher. Newsletter 29
-
-
Zurko, M.E.1
|