-
2
-
-
0004200684
-
Computer Security Technology Planning Study
-
AD-758 206, ESD/AFSC Oct AFSC, Hanscom AFB Oct Bedford, MA Oct
-
AD-758 206, ESD/AFSCAnderson, J., Computer Security Technology Planning Study. Tech. Rep. ESD-TR-73-51, Oct 1972, AFSC, Hanscom AFB, Bedford, MA.
-
(1972)
Tech. Rep. ESD-TR-73-51
-
-
Anderson, J.1
-
3
-
-
84891783006
-
Starlingt: Interactive Link
-
IEEE, 0-8186-7606-X
-
Anderson, M., North, C., Griffin, J., Milner, R., Yesberg, J., Yiu, K., Starlingt: Interactive Link. 12th Annual Computer Security Applications Conference, 1996, IEEE 0-8186-7606-X, 55–63.
-
(1996)
12th Annual Computer Security Applications Conference
, pp. 55-63
-
-
Anderson, M.1
North, C.2
Griffin, J.3
Milner, R.4
Yesberg, J.5
Yiu, K.6
-
4
-
-
0029697680
-
A Security Policy Model for Clinical Information Systems
-
Research in Security and Privacy May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press May Oakland, CA May
-
Research in Security and PrivacyAnderson, Ross, A Security Policy Model for Clinical Information Systems. Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1996, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 30–43.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 30-43
-
-
Anderson, R.1
-
5
-
-
85023140728
-
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering
-
URL
-
URLAnderson, Ross, How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering. Proceedings of the Annual Computer Security Applications Conference 1999, Phoenix, AZ, USA, 1999 http://www.cl.cam.ac.uk/≈rja14/lottery/lottery.html.
-
(1999)
Proceedings of the Annual Computer Security Applications Conference 1999, Phoenix, AZ, USA
-
-
Anderson, R.1
-
6
-
-
79957677761
-
The DeCODE Proposal for an Icelandic Health Database
-
URL Nov The printed article is an excerpt from a document produced for the Icelandic Medical Association. The full text of the latter is available online Nov
-
URLAnderson, Ross J., The DeCODE Proposal for an Icelandic Health Database. L/oeknabladhidh (The Icelandic Medical Journal 84:11 (Nov 1998), 874–875 http://www.cl.cam.ac.uk/users/rja14/iceland/iceland.html The printed article is an excerpt from a document produced for the Icelandic Medical Association. The full text of the latter is available online.
-
(1998)
L/oeknabladhidh (The Icelandic Medical Journal
, vol.84
, Issue.11
, pp. 874-875
-
-
Anderson, R.J.1
-
9
-
-
0028532579
-
Why Cryptosystems Fail
-
Anderson, Ross John, Why Cryptosystems Fail. Communications of the ACM 37:11 (1994), 32–40.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
12
-
-
85023103661
-
Jiki—A New Framework for Security Policy, Trusted Publishing and Electronic Commerce
-
to appear.
-
Ross John Anderson and Jong-Hyeon Lee: “Jiki—A New Framework for Security Policy, Trusted Publishing and Electronic Commerce”. Computer Communications to appear.
-
Computer Communications
-
-
John Anderson, R.1
Lee, J.-H.2
-
13
-
-
0029211469
-
Practical Domain and Type Enforcement for UNIX
-
Oakland, CA May
-
Oakland, CABadger, L., Sterne, D.F., Sherman, D.L., Walker, K.M., Haghighat, S.A., Practical Domain and Type Enforcement for UNIX. Proceedings of the 5th USENIX UNIX Security Symposium, May 1995, 66–77.
-
(1995)
Proceedings of the 5th USENIX UNIX Security Symposium
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
14
-
-
0003400251
-
Secure Computer Systems: Mathematical Foundations
-
Mitre Corporation Apr Bedford, MA Apr
-
Bell, D. Elliot, LaPadula, Leonard J., Secure Computer Systems: Mathematical Foundations. Mitre Report ESD-TR-73-278, Vol. I–III, Apr 1974, Mitre Corporation, Bedford, MA.
-
(1974)
Mitre Report ESD-TR-73-278
, vol.1-3
-
-
Bell, D.E.1
LaPadula, L.J.2
-
15
-
-
85023106125
-
BFE Applicability to LAN Environments
-
NIST 11–14 Oct Baltimore, Maryland 11–14 Oct
-
Benkart, T., Bitzer, D., BFE Applicability to LAN Environments. Seventeenth National Computer Security Conference, 11–14 Oct 1994, NIST, Baltimore, Maryland, 227–236.
-
(1994)
Seventeenth National Computer Security Conference
, pp. 227-236
-
-
Benkart, T.1
Bitzer, D.2
-
16
-
-
85072523275
-
KSOS-Development Methodology for a Secure Operating System
-
AFIPS, AFIPS Press Jun Montvale, NJ Jun
-
Berson, T., Barksdale, G., KSOS-Development Methodology for a Secure Operating System. Proc. NCC, Jun 1979, AFIPS, AFIPS Press, Montvale, NJ, 365–371.
-
(1979)
Proc. NCC
, pp. 365-371
-
-
Berson, T.1
Barksdale, G.2
-
17
-
-
0003400255
-
Integrity Considerations for Secure Computing Systems
-
Mitre Corporation Bedford, MA
-
Biba, Ken, Integrity Considerations for Secure Computing Systems. Mitre Report MTR-3153, 1975, Mitre Corporation, Bedford, MA.
-
(1975)
Mitre Report MTR-3153
-
-
Biba, K.1
-
18
-
-
0003226048
-
The Key Note Trust-Management System Version 2
-
URL Sep Internet Engineering Task Force Sep
-
URLBlaze, Matt, Feigenbaum, Joan, Ioannidis, John, Keromytis, A., The Key Note Trust-Management System Version 2. IETF RFC 2704, Sep 1999, Internet Engineering Task Force http://www.cis.ohio/state.edu/htbin/rfc/rfc2704.html.
-
(1999)
IETF RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
19
-
-
0029700344
-
Decentralized Trust management
-
IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press May Oakland, CA
-
Blaze, Matt, Feigenbaum, Joan, Lacy, Jack, Decentralized Trust management. Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, May 1996, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, Oakland, CA.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
20
-
-
0003282331
-
A Practical Alternative to Hierarchical Integrity Policies
-
NIST
-
Boebert, W.E., Kain, R.Y., A Practical Alternative to Hierarchical Integrity Policies. Proceedings of the 8th National Computer Security Conference, 1985, NIST, 18–27.
-
(1985)
Proceedings of the 8th National Computer Security Conference
, pp. 18-27
-
-
Boebert, W.E.1
Kain, R.Y.2
-
21
-
-
0024663219
-
The Chinese Wall Security Policy
-
Oakland, CA
-
Oakland, CABrewer, David F.C., Nash, Michael J., The Chinese Wall Security Policy. 1989 IEEE Symposium on Security and Privacy, 1989, 206–214.
-
(1989)
1989 IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
22
-
-
0031375965
-
Simple Assured Bastion Hosts
-
IEEE Computer Society, 0-8186-8274-4
-
Cant, C., Wiseman, S., Simple Assured Bastion Hosts. 13th Annual Computer Security Application Conference, 1997, IEEE Computer Society 0-8186-8274-4, 24–33.
-
(1997)
13th Annual Computer Security Application Conference
, pp. 24-33
-
-
Cant, C.1
Wiseman, S.2
-
23
-
-
85022988460
-
Data Communications Networks Directory
-
Recommendations X.500-X.521, IXth Plenary Assembly Nov CCITT Nov Melbourne Nov
-
Recommendations X.500-X.521, IXth Plenary Assembly CCITT, Data Communications Networks Directory. Tech. Rep. 8, Nov 1988, CCITT, Melbourne.
-
(1988)
Tech. Rep. 8
-
-
CCITT1
-
24
-
-
0023266943
-
A Comparison of Commerical and Military Computer Security Policies
-
Oakland, CA
-
Oakland, CAClark, David D., Wilson, David R., A Comparison of Commerical and Military Computer Security Policies. 1987 IEEE Symposium on Security and Privacy, 1987, 184–194.
-
(1987)
1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
25
-
-
0024105910
-
A Field Study of the Software Design Process for Large Systems
-
Nov
-
Curtis, Bill, Krasner, Herb, Iscoe, Neil, A Field Study of the Software Design Process for Large Systems. Communications of the ACM 31:11 (Nov 1988), 1268–1287.
-
(1988)
Communications of the ACM
, vol.31
, Issue.11
, pp. 1268-1287
-
-
Curtis, B.1
Krasner, H.2
Iscoe, N.3
-
26
-
-
0033562565
-
Privacy in clinical information systems in secondary care
-
May
-
Denley, I., Weston-Smith, S., Privacy in clinical information systems in secondary care. British Medical Journal 318 (May 1999), 1328–1331.
-
(1999)
British Medical Journal
, vol.318
, pp. 1328-1331
-
-
Denley, I.1
Weston-Smith, S.2
-
27
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
(5) May Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975)
-
Dorothy E., Denning, A Lattice Model of Secure Information Flow. Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975) Communications of the ACM, 19, May 1976, 236–243.
-
(1976)
Communications of the ACM
, vol.19
, pp. 236-243
-
-
Dorothy E., D.1
-
28
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
Denning, Dorothy E., A Lattice Model of Secure Information Flow. Communications of the ACM 19:5 (May 1976), 236–243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
30
-
-
0017018484
-
New directions in cryptography
-
Diffie, Whitfield, Hellman, Martin E., New directions in cryptography. IEEE Transactions on Information Theory IT-22:6 (1976), 644–654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
31
-
-
0033295882
-
The nature of a useable PKI
-
May
-
Ellison, Carl, The nature of a useable PKI. Computer Networks 31:8 (May 1999), 823–830.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 823-830
-
-
Ellison, C.1
-
32
-
-
0003358457
-
SPKI Certificate Theory
-
URL Sep Internet Engineering Task Force Sep
-
URLEllison, Carl M., Frantz, Bill, Lampson, Butler, Rivest, Ron, Thomas, Brian M., Ylonen, Tatu, SPKI Certificate Theory. IETF RFC 2693, Sep 1999, Internet Engineering Task Force http://www.cis.ohio.state.edu/htbin/rfc/rfc2693.html.
-
(1999)
IETF RFC 2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
33
-
-
84974757646
-
A High Assurance Window System Prototype
-
Epstein, J., Orman, H., McHugh, J., Pascale, R., Branstad, M., Marmor-Squires, A., A High Assurance Window System Prototype. Journal of Computer Security 2:2–3 (1993), 159–190.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 159-190
-
-
Epstein, J.1
Orman, H.2
McHugh, J.3
Pascale, R.4
Branstad, M.5
Marmor-Squires, A.6
-
34
-
-
85009076310
-
User Interface for a High Assurance Windowing System
-
6–10 Dec, IEEE Orlando, Florida, USA, 0-8186-4330-7
-
Epstein, J., Pascale, R., User Interface for a High Assurance Windowing System. Ninth Annual Computer Security Applications Conference, 6–10 Dec 1993, IEEE, Orlando, Florida, USA 0-8186-4330-7, 256–264.
-
(1993)
Ninth Annual Computer Security Applications Conference
, pp. 256-264
-
-
Epstein, J.1
Pascale, R.2
-
35
-
-
34548013267
-
Reconciling CMW Requirements with Those of X11 Applications
-
Oct. Architecture of the windowing portion of Sun's CMW
-
Architecture of the windowing portion of Sun's CMWFaden, Glenn, Reconciling CMW Requirements with Those of X11 Applications. Proceedings of the 14th Annual National Computer Security Conference, Washington, DC, USA, Oct. 1991.
-
(1991)
Proceedings of the 14th Annual National Computer Security Conference, Washington, DC, USA
-
-
Faden, G.1
-
36
-
-
0012779604
-
Information Protection Systems
-
Cambridge University
-
Fenton, J.S., Information Protection Systems. PhD dissertation, 1973, Cambridge University.
-
(1973)
PhD dissertation
-
-
Fenton, J.S.1
-
38
-
-
84974747910
-
Aggregation and separation as noninterference properties
-
Foley, Simon N., Aggregation and separation as noninterference properties. Journal of Computer Security 1:2 (1992), 158–188.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.2
, pp. 158-188
-
-
Foley, S.N.1
-
39
-
-
0020778471
-
SCOMP: A Solution to the Multilevel Security Problem
-
Jul
-
Fraim, L.J., SCOMP: A Solution to the Multilevel Security Problem. Computer 16:7 (Jul 1983), 26–34.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 26-34
-
-
Fraim, L.J.1
-
40
-
-
0033690785
-
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
-
IEEE Computer Society Press
-
Fraser, T., LOMAC: Low Water-Mark Integrity Protection for COTS Environments. Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000, IEEE Computer Society Press, 230–245.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
41
-
-
77952413395
-
Security Policies and Security Models
-
IEEE Computer Society Press Apr Los Alamitos, CA., USA Apr
-
Goguen, J.A., Meseguer, J., Security Policies and Security Models. Proceedings of the 1982 Symposium on Security and Privacy (SSP '82), Apr 1990, IEEE Computer Society Press, Los Alamitos, CA., USA, 11–20.
-
(1990)
Proceedings of the 1982 Symposium on Security and Privacy (SSP '82)
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
42
-
-
84974740905
-
Compartmented Mode, Workstation Evaluation Criteria, Version 1
-
(also published by the Defense Intelligence Agency as document DDS-2600-6243-91) Jun Revised requirements for the CMW, including a description of what they expect for Trusted X Jun The MITRE Corporation Jun Bedford, MA, USA Jun
-
(also published by the Defense Intelligence Agency as document DDS-2600-6243-91)Graubart, R.D., Berger, J.L., Woodward, J.P.L., Compartmented Mode, Workstation Evaluation Criteria, Version 1. Revised requirements for the CMW, including a description of what they expect for Trusted X Tech. Rep. MTR 10953, Jun 1991, The MITRE Corporation, Bedford, MA, USA.
-
(1991)
Tech. Rep. MTR 10953
-
-
Graubart, R.D.1
Berger, J.L.2
Woodward, J.P.L.3
-
43
-
-
0016984825
-
Protection in Operating Systems
-
Aug
-
Harrison, Michael A., Ruzzo, Walter L., Ullman, Jeffrey D., Protection in Operating Systems. Communications of the ACM 19:8 (Aug 1976), 461–471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
44
-
-
85023031369
-
CMW Introduction
-
Oct
-
Huber, G., CMW Introduction. ACM SIGSAC 12:4 (Oct 1994), 6–10.
-
(1994)
ACM SIGSAC
, vol.12
, Issue.4
, pp. 6-10
-
-
Huber, G.1
-
45
-
-
0027719713
-
A Pump for Rapid, Reliable, Secure Communications
-
ACM 3–5 November, 1993, Fairfax, Virginia ACM Press New York, NY 10036, USA, 0-89791-629-8
-
Kang, M.H., Moskowitz, I.S., A Pump for Rapid, Reliable, Secure Communications. ACM, (eds.) Fairfax 93: 1st ACM Conference on Computer and Communications Security, 3–5 November, 1993, Fairfax, Virginia, 1993, ACM Press, New York, NY 10036, USA 0-89791-629-8, 118–129.
-
(1993)
Fairfax 93: 1st ACM Conference on Computer and Communications Security
, pp. 118-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
46
-
-
0031337629
-
An Architecture for Multilevel Secure Interoperability
-
8–12 Dec IEEE Computer Society San Diego, CA, USA, 0-8186-8274-4
-
Kang, M.H., Froscher, J.N., Moskowitz, I.S., An Architecture for Multilevel Secure Interoperability. 13th Annual Computer Security Applications Conference, 8–12 Dec 1997, IEEE Computer Society, San Diego, CA, USA 0-8186-8274-4, 194–204.
-
(1997)
13th Annual Computer Security Applications Conference
, pp. 194-204
-
-
Kang, M.H.1
Froscher, J.N.2
Moskowitz, I.S.3
-
47
-
-
33846291234
-
A Case Study of Two NRL Pump Prototypes
-
9–13 Dec IEEE San Diego CA, USA, 0-8186-7606-X
-
Kang, M.H., Moskowitz, I.S., Montrose, B., Parsonese, J., A Case Study of Two NRL Pump Prototypes. 12th Annual Computer Security Applications Conference, 9–13 Dec 1996, IEEE, San Diego CA, USA 0-8186-7606-X, 32–43.
-
(1996)
12th Annual Computer Security Applications Conference
, pp. 32-43
-
-
Kang, M.H.1
Moskowitz, I.S.2
Montrose, B.3
Parsonese, J.4
-
48
-
-
0011272226
-
A New Mandatory Security Policy Combining Secrecy and Integrity
-
IBM Mar
-
Karger, P.A., Austell, V.A., Toll, D.C., A New Mandatory Security Policy Combining Secrecy and Integrity. Tech. Rep. RC 21717 (97406), Mar 2000, IBM.
-
(2000)
Tech. Rep. RC 21717 (97406)
-
-
Karger, P.A.1
Austell, V.A.2
Toll, D.C.3
-
49
-
-
85023128660
-
Designing a reliable publishing framework
-
University of Cambridge Computer Laboratory Apr
-
Lee, Jong-Hyeon, Designing a reliable publishing framework. Tech. Rep. 489, Apr 2000, University of Cambridge Computer Laboratory.
-
(2000)
Tech. Rep. 489
-
-
Lee, J.-H.1
-
51
-
-
0009825122
-
Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon's ring)
-
Borotha-Schoeler Wien
-
Lorenz, Konrad, Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon's ring). 1949, Borotha-Schoeler, Wien.
-
(1949)
-
-
Lorenz, K.1
-
52
-
-
0025438880
-
A Hookup Theorem for Multilevel Security
-
Special Section on Security and Privacy Jun
-
Special Section on Security and PrivacyMcCullough, Daryl, A Hookup Theorem for Multilevel Security. IEEE Transactions on Software Engineering 16:6 (Jun 1990), 563–568.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 563-568
-
-
McCullough, D.1
-
54
-
-
0022012611
-
A comment on the ‘basic security theorem’ of Bell and LaPadula
-
Feb
-
McLean, John, A comment on the ‘basic security theorem’ of Bell and LaPadula. Information Processing Letters 20:2 (Feb 1985), 67–70.
-
(1985)
Information Processing Letters
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
56
-
-
0344001154
-
The Formal Specification of Safety Requirements for Storing Explosives
-
Mukherjee, Paul, Stavridou, Victoria, The Formal Specification of Safety Requirements for Storing Explosives. Formal aspects of Computing 5:4 (1993), 299–336.
-
(1993)
Formal aspects of Computing
, vol.5
, Issue.4
, pp. 299-336
-
-
Mukherjee, P.1
Stavridou, V.2
-
57
-
-
85023078096
-
Implementing Security Policy in a Large Defence Procurement
-
9–13 Dec IEEE San Diego, CA, USA, 0-8186-7606-X
-
Nash, M., Kennett, R., Implementing Security Policy in a Large Defence Procurement. 12th Annual Computer Security Applications Conference, 9–13 Dec 1996, IEEE, San Diego, CA, USA 0-8186-7606-X, 15–23.
-
(1996)
12th Annual Computer Security Applications Conference
, pp. 15-23
-
-
Nash, M.1
Kennett, R.2
-
58
-
-
85023095376
-
-
Tech. rep., NSA. URL
-
National Security Agency “The NSA Security Manual”. Tech. rep., NSA. URL.
-
The NSA Security Manual
-
-
-
59
-
-
85023123468
-
-
(Leaked copy.)
-
http://www.cl.cam.ac.uk/ftp/users/rja14/nsaman.tex.gz (Leaked copy.).
-
-
-
-
60
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
Needham, Roger Michael, Schroeder, Michael, Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21:12 (1978), 993–999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.2
-
62
-
-
85023065664
-
Common Criteria for Information Technology Security Version 2.1
-
URL Jan
-
URL NIST, Common Criteria for Information Technology Security Version 2.1. Tech. Rep. ISO IS 15408, Jan 2000 http://csrc.nist.gov/cc/.
-
(2000)
Tech. Rep. ISO IS 15408
-
-
NIST1
-
64
-
-
15944418695
-
Private Desktops and Shared Store
-
IEEE Phoenix, AZ, USA, 0-8186-8789-4
-
Pomeroy, B., Wiseman, S., Private Desktops and Shared Store. Computer Security Applications Conference, 1998, IEEE, Phoenix, AZ, USA 0-8186-8789-4, 190–200.
-
(1998)
Computer Security Applications Conference
, pp. 190-200
-
-
Pomeroy, B.1
Wiseman, S.2
-
66
-
-
0020779556
-
A Distributed Secure System
-
IEEE Jul
-
Rushby, J., Randell, B., A Distributed Secure System. IEEE Computer, Jul 1983, IEEE, 55–67.
-
(1983)
IEEE Computer
, pp. 55-67
-
-
Rushby, J.1
Randell, B.2
-
67
-
-
3943108716
-
Computer Security: The Achilles' Heel of the Electronic Air Force?
-
Jan–Feb
-
Schell, RR, Computer Security: The Achilles' Heel of the Electronic Air Force?. Air University Review 30:2 (Jan–Feb 1979), 16–33.
-
(1979)
Air University Review
, vol.30
, Issue.2
, pp. 16-33
-
-
Schell, R.R.1
-
68
-
-
3042750861
-
Preliminary notes on the design of secure military computer systems
-
URL 1 Jan Electronic Systems Division, Air Force Systems Command 1 Jan
-
URLSchell, RR, Downey, PJ, Popek, GJ, Preliminary notes on the design of secure military computer systems. Tech. Rep. MCI-73-1, 1 Jan 1973, Electronic Systems Division, Air Force Systems Command http://seclab.cs.ucdavis.edu/projects/history/papers/sche73.pdf.
-
(1973)
Tech. Rep. MCI-73-1
-
-
Schell, R.R.1
Downey, P.J.2
Popek, G.J.3
-
69
-
-
0001831930
-
The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
-
URL Also available as AT&T Laboratories Cambridge Technical Report 1999.2 Bruce Christianson Bruno Crispo Mike Roe Springer-Verlag
-
URLStajano, Frank, Anderson, Ross, The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. Also available as AT&T Laboratories Cambridge Technical Report 1999.2 Christianson, Bruce, Crispo, Bruno, Roe, Mike, (eds.) Security Protocols, 7th International Workshop Proceedings Lecture Notes in Computer Science, 1999, Springer-Verlag http://www.cl.cam.ac.uk/~fm7/ducking/.
-
(1999)
Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science
-
-
Stajano, F.1
Anderson, R.2
-
70
-
-
0010050863
-
The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
-
URL Oct Abridged and revised version of the Security Protocols article by the same name. Also available as AT&T Laboratories Cambridge, Technical Report 1999.2b Oct
-
rd AT&T Software Symposium, Middletown, New Jersey, USA, Oct 1999 http://www.cl.cam.ac.uk/~fm7/duckling/.
-
(1999)
rd AT&T Software Symposium, Middletown, New Jersey, USA
-
-
Stajano, F.1
Anderson, R.2
-
72
-
-
0346779433
-
Technical Rationale behind CSC-STD-003-85: computer security requirements
-
US Department of Defense
-
US Department of Defense, Technical Rationale behind CSC-STD-003-85: computer security requirements. Tech. Rep. CSC-STD-004-85, 1985, US Department of Defense.
-
(1985)
Tech. Rep. CSC-STD-004-85
-
-
US Department of Defense1
-
73
-
-
0003969633
-
Trusted Computer System Evaluation Criteria
-
US Department of Defense
-
US Department of Defense, Trusted Computer System Evaluation Criteria. Tech. Rep. 5200.28, 1985, US Department of Defense.
-
(1985)
Tech. Rep. 5200.28
-
-
US Department of Defense1
-
74
-
-
84916011693
-
Models for Secure Computer Systems
-
Revised 21 Nov 1973 31 Jul Case Western Reserve University 31 Jul
-
Revised 21 Nov 1973Walter, KG, Ogden, WF, Rounds, WC, Bradshaw, FT, Ames, SR, Shumway, DG, Models for Secure Computer Systems. Tech. Rep. 1137, 31 Jul 1973, Case Western Reserve University.
-
(1973)
Tech. Rep. 1137
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Shumway, D.G.6
-
75
-
-
3943068905
-
Primitive Models for Computer Security
-
URL 23 Jan Case Western Reserve University 23 Jan
-
URLWalter, K.G., Ogden, W.F., Rounds, W.C., Bradshaw, F.T., Ames, S.R., Shumway, D.G., Primitive Models for Computer Security. Tech. Rep. ESD-TR-74-117, 23 Jan 1974, Case Western Reserve University http://www.dtic.mil.
-
(1974)
Tech. Rep. ESD-TR-74-117
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Shumway, D.G.6
-
76
-
-
4544284713
-
Security Controls in the ADEPT-50 Time-Sharing System
-
Weissman, Clark, Security Controls in the ADEPT-50 Time-Sharing System. Proc. Fall Joint Computer Conference, AFIPS, vol. 35, 1969, 119–133.
-
(1969)
Proc. Fall Joint Computer Conference, AFIPS
, vol.35
, pp. 119-133
-
-
Weissman, C.1
-
77
-
-
0026851778
-
BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades
-
IEEE May, 0-8186-2825-1
-
Weissman, Clark, BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades. Proceedings of the 1992 IEEE Computer Society Symposium on Security and Privacy (SSP '92), May 1992, IEEE 0-8186-2825-1, 286–292.
-
(1992)
Proceedings of the 1992 IEEE Computer Society Symposium on Security and Privacy (SSP '92)
, pp. 286-292
-
-
Weissman, C.1
-
78
-
-
0003744395
-
-
North-Holland New York, 0-444-00357-6
-
Wilkes, M.V., Needham, R.M., (eds.) The Cambridge Cap Computer and its Operating System, 1979, North-Holland, New York 0-444-00357-6.
-
(1979)
The Cambridge Cap Computer and its Operating System
-
-
Wilkes, M.V.1
Needham, R.M.2
-
79
-
-
33751037227
-
Security Requirements for System High and Compartmented Mode Workstations
-
Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87) Nov The original requirements for the CMW, including a description of what they expect for Trusted X Nov The MITRE Corporation Nov Bedford, MA, USA Nov
-
Revision 1 (also published by the Defense Intelligence Agency as document DDS-2600-5502-87)Woodward, J.P.L., Security Requirements for System High and Compartmented Mode Workstations. The original requirements for the CMW, including a description of what they expect for Trusted X Tech. Rep. MTR 9992, Nov 1987, The MITRE Corporation, Bedford, MA, USA.
-
(1987)
Tech. Rep. MTR 9992
-
-
Woodward, J.P.L.1
|