UNIX System V with B2 Security
Craig Rubin, AT&T Bell Laboratories
Proceeding of 13th National Computer Security Conference -- October 1990

Disclosure Protection of Sensitive Information
Gene Troy, National Institute of Standards and Technology
Ingrid Olson, MITRE
Milan Kuchta, Department of National Defence System Security Centre
Proceeding of 13th National Computer Security Conference -- October 1990

Introduction to the Gemini Trusted Network Processor
Michael Thompson, Roger Schell, Albert Tao, Timothy Levin, Gemini Computers
Proceeding of 13th National Computer Security Conference -- October 1990

Testing a Secure Operating System
Michael Johnston, Vasiliki Sotiriou, TRW Systems Integration Group
Proceeding of 13th National Computer Security Conference -- October 1990

Harmonised Criteria for the Security Evaluation of IT Systems and Products
P. Casey, A. Brouwer, D. Herson, J. Pacault, F. Taal, U. Van Essen
Proceeding of 13th National Computer Security Conference -- October 1990

Civil and Military Application of Trusted Systems Criteria
William Barker, Charles Pfleeger, Trusted Information Systems, Inc.
Proceeding of 13th National Computer Security Conference -- October 1990

Implementation and Usage of Mandatory Access Controls in an Operational Environment
Leslie Gotch, Honeywell Federal Systems, Inc.
Shawn Rovansek, National Computer Security Center
Proceeding of 13th National Computer Security Conference -- October 1990

Building Trust into a Multilevel File System
Cynthia E. Irvine, Todd B. Ackeson, Michael F. Thompson, Gemini Computer, Inc.
Proceeding of 13th National Computer Security Conference -- October 1990

A Taxonomy of Integrity Models, Implementations and Mechanisms
Stephen Welke, J. Eric Roskos, John Boone, Terry Mayfield, Institute for Defense Analyses
Proceeding of 13th National Computer Security Conference -- October 1990

A Brief Tutorial on Trusted Database Management Systems (Executive Summary)
John Campbell, National Computer Security Center
Proceeding of 13th National Computer Security Conference -- October 1990

Issues of Concurrency Control and Labeling in Multilevel Database Systems (Executive Summary)
Teresa Lunt, Stanford Research Institute
Proceeding of 13th National Computer Security Conference -- October 1990

Constrained Trusted Computing Base Subsets (Executive Summary)
Linda Vetter, Oracle Corporation
Proceeding of 13th National Computer Security Conference -- October 1990



The Argus Security Model
Marc M. Adkins, Gary Dolsen Jody Heaney, John Page, Planning Research Corporation
Proceeding of 12th National Computer Security Conference -- October 1989

Toward a High B Level Security Architecture for the IBM ES/3090 Processor Resource/Systems Manager
Thomas T. Russell, IBM Corporation
Marvin Schaefer, Trusted Information Systems, Inc.
Proceeding of 12th National Computer Security Conference -- October 1989

Initial Approach for a TRW Secure Communications Processor
Bonnie P. Danner, TRW, Inc.
Proceeding of 12th National Computer Security Conference -- October 1989

The Boeing MLS LAN: Headed Towards and INFOSEC Security Solution
Gary R. Stoneburner, Dean A. Snow Boeing Aerospace and Electronics
Proceeding of 12th National Computer Security Conference -- October 1989

Extending Mandatory Access Controls to a Networked MLS Environment
R. S. Arbo, E. M. Johnston, R. L. Sharp AT&T Bell Laboratories
Proceeding of 12th National Computer Security Conference -- October 1989

A Dynamic Network Labeling Scheme for a MLSLAN
Peter Loscocco, National Computer Security Center
Proceeding of 12th National Computer Security Conference -- October 1989

On the Need for a Third Form of Access Control
Richard Graubart, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989

Guidelines for Specifying Security Guards
William Neugent, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989

A Least Fixed Point Approach to Inter-Procedural Information Flow Control
Masaaki Mizuno, Kansas State University
Proceeding of 12th National Computer Security Conference -- October 1989

A Multilevel Secure Object-Oriented Data Model
M.B. Thuraisingham, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989



Apparent Differences Between the U.S. TCSEC and the European ITSEC
Dr. Martha Branstad, Dr. Charles Pfleeger, Trusted Information Systems, Inc.
Dr. David Brewer, Gamma Secure Systems, Ltd.
Mr. Christian Jahl, Mr. Helmut Kurth, IAGB Software Technology
Proceeding of 14th National Computer Security Conference -- October 1991

Building a Multi-Level Applicatoin on an Untrusted DBMS in a UNIX System V/MLS Environment - A Project's Experience
David S. Crawford, Canadian Department of National Defence
Proceeding of 14th National Computer Security Conference -- October 1991

Building a Multi-Level Secure TCP/IP
Deborah A. Futcher, Brian K. Yasaki, The Wollongong Group
Ron L. Sharp, AT&T Bell Laboratories
Proceeding of 14th National Computer Security Conference -- October 1991

A Case Study for the Approach to Developing a Multilevel Secure Command and Control Information System
James Obal, Supreme Allied Commander Atlantic
William Grogan, Contel Federal Systems
Proceeding of 14th National Computer Security Conference -- October 1991

Developing Applicatoins on LOCK
Richard O'Brien, Clyde Rogers, SCTC
Proceeding of 14th National Computer Security Conference -- October 1991

Experience of Commercial Security Evaluation
Peter Fagan, Julian Straw, Secure Information Systems Limited
Proceeding of 14th National Computer Security Conference -- October 1991

Experiences in Multi-Level Security on Distributed Architectures
Karl A. Siil, AT&T Bell Laboratories
Proceeding of 14th National Computer Security Conference -- October 1991

A Framework for Developing Accreditable MLS AISs
R.K. Bauer, J. Sachs, M.L. Weidner, W.F. Wilson, Arca Systems, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991

Integrating B2 Security into a UNIX System
Kevin Brady, UNIX System Laboratories, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991

Reconciling CMW Requirements with Those of X11 Applications
Glenn Faden, Sun Microsystems, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991

Trusting X: Issues in Building Trusted X Window Systems or What's not Trusted About X?
Jeremy Epstein, TRW Systems Division
Jeffrey Picciotto, MITRE Corporation
Proceeding of 14th National Computer Security Conference -- October 1991



An Approach for Multilevel Security (MLS) Acquisition
Bill Neugent, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Assessing Modularity in Trusted Computing Bases
J.L. Arnold, R.J. Bottomly, National Security Agency
D.B. Baker, D.D. Downs, The Aerospace Corporation
F. Belvin, S. Chokhani, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Enforcing Entity and Referential Integrity in Multilevel Secure Databases
Vinti M. Doshi, Sushil Jajodia, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Evolving Criteria for Evaluation: The Challenge for the International Integrator of the 90s
Virgil Gibson, Joan Fowler, Grumman Data Systems
Proceeding of 15th National Computer Security Conference -- October 1992

General Issues to be Resolved in Achieving Multilevel Security (MLS)
Bill Neugent, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment
Ravi S. Sandhu, Gurprett S. Suri, Center for Secure Information Systems & Department of Information and Software Systems Engineering, George Mason University
Proceeding of 15th National Computer Security Conference -- October 1992

Implications of Monoinstantiation in a Normally Polyinstantiated Multilevel Secure Database
Frank E. Kramer, Steven M. Heffern, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

The IT Security Evaluation Manual (ITSEM)
Y. Klein, Service Central de la Sécurité des Systèmes d'Information, Paris, France
E. Roche, Department of Trade and Industry, London, United Kingdom
F. Taal, Netherlands National Communications Security Agency, The Hague, The Netherlands
M. Van Dulm, Ministry of the Interior, The Hague, The Netherlands
U. Van Essen, German Information Security Agency, Bonn, Germany
P. Wolf, Centre D'Électronique de l'Armement, Bruz, France
J. Yates, Communications-Electronics Security Group, Cheltenham, United Kingdom
Proceeding of 15th National Computer Security Conference -- October 1992

Knowledge-Based Inference Control in a Multilevel Secure Database Management System
Bhavani Thuraisingham, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

A Lattice Interpretation of the Chinese Wall Policy
Ravi S. Sandhu, Center for Secure Information Systems & Department of Information and Software Systems Engineering, George Mason University
Proceeding of 15th National Computer Security Conference -- October 1992

Mandatory Policy Issues of High Assurance Composite Systems
Jonathan Fellows, Grumman Data Systems
Proceeding of 15th National Computer Security Conference -- October 1992

A Multilevel Secure Database Management System Benchmark
Linda M. Schlipper, Jarrellann Filsinger, Vinti M. Doshi, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

The Multipolicy Paradigm
Hilary H. Hosmer, Data Security Inc.
Proceeding of 15th National Computer Security Conference -- October 1992

The Need for a Multilevel Secure (MLS) Trusted User Interface
Greg Factor, Steve Heffern, Doug Nelson, Jim Studt, Mary Yelton, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Network Security Via DNSIX, Integration of DNSIX and CW Technology
Howard A. Heller, Harris Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

A Note on Compartmented Mode: To B2 or not B2?
Theodore M.P. Lee, Trusted Information Systems, Inc.
Proceeding of 15th National Computer Security Conference -- October 1992

Operating System Support for Trusted Applications
Richard Graubart, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Operational Support of Downgrading in a Multi-Level Secure System
Doug Nelson, Greg Factor, Jim Studt, Mary Yelton, Steve Heffern, Frank Kramer, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

Potential Benefits from Implementing the Clark-Wilson Integrity Model Using an Object-Oriented Approach
Craig A. Schiller, Science Applications International Corporation
Proceeding of 15th National Computer Security Conference -- October 1992

A Tool for Covert Storage Channel Analysis of the UNIX Kernel
David A. Willcox, Steve R. Bunch, Motorola Microcomputer Group
Proceeding of 15th National Computer Security Conference -- October 1992