-
1
-
-
85024244467
-
AIM Technology published price list
-
Santa Clara, CA.
-
Aim Technology. 1988. AIM Technology published price list. AIM Technology, Santa Clara, CA.
-
(1988)
AIM Technology
-
-
-
2
-
-
0004200684
-
Computer security technology planning study
-
ESD-TR-73-51. James P. Anderson and Co., Fort Washington, PA
-
Anderson, J. P. 1972. Computer security technology planning study. Tech. Rep. ESD-TR-73-51. James P. Anderson and Co., Fort Washington, PA.
-
(1972)
Tech. Rep.
-
-
Anderson, J.P.1
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
ESD-TR-75-306; ESD/AFSC; DTIC AD-A023588
-
Bell, D. E. and La Padula, L. 1975. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. ESD-TR-75-306; ESD/AFSC; DTIC AD-A023588.
-
(1975)
Tech. Rep.
-
-
Bell, D.E.1
La Padula, L.2
-
8
-
-
0003437009
-
-
Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA
-
Cheswick, W. R. and Bellovin, S. M. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA.
-
(1994)
Firewalls and Internet Security: Repelling the Wily Hacker.
-
-
Cheswick, W.R.1
Bellovin, S.M.2
-
9
-
-
0011588485
-
Trusted products evaluation
-
(July)
-
Chokhani, S. 1992. Trusted products evaluation. Commun. ACM 35, 7 (July), 64-76.
-
(1992)
Commun. ACM
, vol.35
, Issue.7
, pp. 64-76
-
-
Chokhani, S.1
-
10
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
(Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
-
Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
11
-
-
0018466858
-
Social processes and proofs of theorems and programs
-
(May)
-
Demillo, R. A., Lipton, R. J., and Perlis, A. J. 1979. Social processes and proofs of theorems and programs. Commun. ACM 22, 5 (May).
-
(1979)
Commun. ACM
, vol.22
, Issue.5
-
-
Demillo, R.A.1
Lipton, R.J.2
Perlis, A.J.3
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
(May)
-
Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2 (May), 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.2
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0003969635
-
Department of Defense trusted computer system evaluation criteria
-
Department of Defense Standard DoD 5200. 28-STD.
-
DOD. 1985. Department of Defense trusted computer system evaluation criteria. Department of Defense Standard DoD 5200. 28-STD.
-
(1985)
-
-
-
16
-
-
2442558738
-
Computer security requirements: Guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments
-
CSC-STD-003-85
-
DOD COMPUTER SECURITY CENTER. 1985. Computer security requirements: Guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. CSC-STD-003-85.
-
(1985)
-
-
-
19
-
-
84976686148
-
Gypsy: A language for specification and implementation of verifiable programs
-
(Mar.). ACM Press, New York, NY
-
Good, D. I., Ambler, A. L., Browne, J. C., Burger, W., Cohen, R., Hoch, C., and Wells, R. 1977. Gypsy: A language for specification and implementation of verifiable programs. In Proceedings of the ACM Conference on Language Design for Reliable Software (Mar.). ACM Press, New York, NY.
-
(1977)
Proceedings of the ACM Conference on Language Design for Reliable Software
-
-
Good, D.I.1
Ambler, A.L.2
Browne, J.C.3
Burger, W.4
Cohen, R.5
Hoch, C.6
Wells, R.7
-
20
-
-
84916338765
-
Report on the language Gypsy
-
Tech Rep. ICSCA-CMP-10. University of Texas at Austin, Austin, TX
-
Good, D. I., Cohen, R. M., Hoch, C. G., Hunter, L. W., and Hare, D. F. 1978. Report on the language Gypsy. Tech Rep. ICSCA-CMP-10. University of Texas at Austin, Austin, TX.
-
(1978)
-
-
Good, D.I.1
Cohen, R.M.2
Hoch, C.G.3
Hunter, L.W.4
Hare, D.F.5
-
21
-
-
0023292465
-
Extending the noninterference version of MLS for SAT
-
Haigh, T. J. and Young, W. D. 1987. Extending the noninterference version of MLS for SAT. IEEE Trans. Softw. Eng. 13, 2.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
-
-
Haigh, T.J.1
Young, W.D.2
-
22
-
-
85024249015
-
Throughput benchmarks with AIM
-
LOCK program archives
-
Kain, R. Y. 1988. Throughput benchmarks with AIM. Memorandum. LOCK program archives.
-
(1988)
Memorandum
-
-
Kain, R.Y.1
-
23
-
-
0015672289
-
A note on the confinement problem
-
(Oct.)
-
Lampson, B. 1973. A note on the confinement problem. Commun. ACM 16, 10 (Oct.).
-
(1973)
Commun. ACM
, vol.16
, Issue.10
-
-
Lampson, B.1
-
24
-
-
85024241852
-
Engineering results from the A1 formal verification process
-
(Gaithersburg, MD, Oct.).
-
Levin, T. E., Padilla, S. J., and Schell, R. R. 1989. Engineering results from the A1 formal verification process. In Proceedings of the 12th NIST/NCSC National Conference on Computer Security (Gaithersburg, MD, Oct.). 65-74.
-
(1989)
Proceedings of the 12th NIST/NCSC National Conference on Computer Security
, pp. 65-74
-
-
Levin, T.E.1
Padilla, S.J.2
Schell, R.R.3
-
25
-
-
85024285793
-
Secure system development at Digital Equipment: Targeting the needs of a commercial and government customer base
-
(Sept.)
-
Lipner, S. 1985. Secure system development at Digital Equipment: Targeting the needs of a commercial and government customer base. In Proceedings of the 8th National Conference on Computer Security (Sept.). 47-54.
-
(1985)
Proceedings of the 8th National Conference on Computer Security
, pp. 47-54
-
-
Lipner, S.1
-
26
-
-
85024248228
-
Trusted network interpretation of the trusted computer system evaluation criteria
-
NCSC-TG-005, Version 1
-
NATIONAL COMPUTER SECURITY CENTER. 1997. Trusted network interpretation of the trusted computer system evaluation criteria. NCSC-TG-005, Version 1.
-
(1997)
-
-
-
27
-
-
0010853725
-
Introduction to certification and accreditation
-
NCSC-TG-029, Version 1
-
NATIONAL COMPUTER SECURITY CENTER. 1994. Introduction to certification and accreditation. NCSC-TG-029, Version 1.
-
(1994)
-
-
-
28
-
-
85024262698
-
-
Provably secure operating system. M79-225. Institute of Communication Research, Stanford University, Stanford, CA.
-
Neumann, P. G., Robinson, L., Levitt, K. N., Boyer, R. S., and Saxena, A. R. 1975. Provably secure operating system. M79-225. Institute of Communication Research, Stanford University, Stanford, CA.
-
(1975)
-
-
Neumann, P.G.1
Robinson, L.2
Levitt, K.N.3
Boyer, R.S.4
Saxena, A.R.5
-
30
-
-
0016626427
-
The source code control system
-
(Dec.)
-
Rochkind, M. J. 1975. The source code control system. IEEE Trans. Softw. Eng. SE-1, 4 (Dec.), 364-370.
-
(1975)
IEEE Trans. Softw. Eng. SE-1
, Issue.4
, pp. 364-370
-
-
Rochkind, M.J.1
-
31
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
33
-
-
0024663121
-
LOCK trek: Navigating uncharted space
-
(Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA
-
Saydjari, O. S., Beckman, J. K., and Leaman, J. R. 1989. LOCK trek: Navigating uncharted space. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA.
-
(1989)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Saydjari, O.S.1
Beckman, J.K.2
Leaman, J.R.3
-
34
-
-
85024251190
-
LOCK/ix: on implementing Unix on the LOCK TCB
-
(NIST-NCSC, Baltimore, MD, Oct. 17-20). National Institute of Standards and Technology, Gaithersburg, MD
-
Schaffer, M. A. and Walsh, G. 1988. LOCK/ix: on implementing Unix on the LOCK TCB. In Proceedings of the 11th National Conference on Computer Security (NIST-NCSC, Baltimore, MD, Oct. 17-20). National Institute of Standards and Technology, Gaithersburg, MD.
-
(1988)
Proceedings of the 11th National Conference on Computer Security
-
-
Schaffer, M.A.1
Walsh, G.2
-
36
-
-
85024278257
-
Sidewinder: Defense in depth using type enforcement
-
Smith, R. E. 1996. Sidewinder: Defense in depth using type enforcement. J. Syst. Manage.
-
(1996)
J. Syst. Manage.
-
-
Smith, R.E.1
-
40
-
-
85024253475
-
Is your network secure?
-
(Jan.)
-
Thomsen, D. and Schwartau, W. 1996. Is your network secure? BYTE (Jan.).
-
(1996)
BYTE
-
-
Thomsen, D.1
Schwartau, W.2
-
41
-
-
0006291871
-
Security controls for computer systems (U): Report of Defense Science Board Task Force on Computer Security
-
Rand Rep. R609-1. RAND, Santa Monica, CA
-
Ware, W. 1970. Security controls for computer systems (U): Report of Defense Science Board Task Force on Computer Security. Rand Rep. R609-1. RAND, Santa Monica, CA.
-
(1970)
-
-
Ware, W.1
|