UNIX System V with B2 Security
Craig Rubin, AT&T Bell Laboratories
Proceeding of 13th National Computer Security Conference -- October 1990
Disclosure Protection of Sensitive Information
Gene Troy, National Institute of Standards and Technology
Ingrid Olson, MITRE
Milan Kuchta, Department of National Defence System Security Centre
Proceeding of 13th National Computer Security Conference -- October 1990
Introduction to the Gemini Trusted Network Processor
Michael Thompson, Roger Schell, Albert Tao, Timothy Levin, Gemini Computers
Proceeding of 13th National Computer Security Conference -- October 1990
Testing a Secure Operating System
Michael Johnston, Vasiliki Sotiriou, TRW Systems Integration Group
Proceeding of 13th National Computer Security Conference -- October 1990
Harmonised Criteria for the Security Evaluation of IT Systems and Products
P. Casey, A. Brouwer, D. Herson, J. Pacault, F. Taal, U. Van Essen
Proceeding of 13th National Computer Security Conference -- October 1990
Civil and Military Application of Trusted Systems Criteria
William Barker, Charles Pfleeger, Trusted Information Systems, Inc.
Proceeding of 13th National Computer Security Conference -- October 1990
Implementation and Usage of Mandatory Access Controls in an Operational Environment
Leslie Gotch, Honeywell Federal Systems, Inc.
Shawn Rovansek, National Computer Security Center
Proceeding of 13th National Computer Security Conference -- October 1990
Building Trust into a Multilevel File System
Cynthia E. Irvine, Todd B. Ackeson, Michael F. Thompson, Gemini Computer, Inc.
Proceeding of 13th National Computer Security Conference -- October 1990
A Taxonomy of Integrity Models, Implementations and Mechanisms
Stephen Welke, J. Eric Roskos, John Boone, Terry Mayfield, Institute for Defense Analyses
Proceeding of 13th National Computer Security Conference -- October 1990
A Brief Tutorial on Trusted Database Management Systems (Executive Summary)
John Campbell, National Computer Security Center
Proceeding of 13th National Computer Security Conference -- October 1990
Issues of Concurrency Control and Labeling in Multilevel Database Systems (Executive Summary)
Teresa Lunt, Stanford Research Institute
Proceeding of 13th National Computer Security Conference -- October 1990
Constrained Trusted Computing Base Subsets (Executive Summary)
Linda Vetter, Oracle Corporation
Proceeding of 13th National Computer Security Conference -- October 1990
The Argus Security Model
Marc M. Adkins, Gary Dolsen Jody Heaney, John Page, Planning Research Corporation
Proceeding of 12th National Computer Security Conference -- October 1989
Toward a High B Level Security Architecture for the IBM ES/3090 Processor Resource/Systems Manager
Thomas T. Russell, IBM Corporation
Marvin Schaefer, Trusted Information Systems, Inc.
Proceeding of 12th National Computer Security Conference -- October 1989
Initial Approach for a TRW Secure Communications Processor
Bonnie P. Danner, TRW, Inc.
Proceeding of 12th National Computer Security Conference -- October 1989
The Boeing MLS LAN: Headed Towards and INFOSEC Security Solution
Gary R. Stoneburner, Dean A. Snow Boeing Aerospace and Electronics
Proceeding of 12th National Computer Security Conference -- October 1989
Extending Mandatory Access Controls to a Networked MLS Environment
R. S. Arbo, E. M. Johnston, R. L. Sharp AT&T Bell Laboratories
Proceeding of 12th National Computer Security Conference -- October 1989
A Dynamic Network Labeling Scheme for a MLSLAN
Peter Loscocco, National Computer Security Center
Proceeding of 12th National Computer Security Conference -- October 1989
On the Need for a Third Form of Access Control
Richard Graubart, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989
Guidelines for Specifying Security Guards
William Neugent, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989
A Least Fixed Point Approach to Inter-Procedural Information Flow Control
Masaaki Mizuno, Kansas State University
Proceeding of 12th National Computer Security Conference -- October 1989
A Multilevel Secure Object-Oriented Data Model
M.B. Thuraisingham, MITRE Corporation
Proceeding of 12th National Computer Security Conference -- October 1989
Apparent Differences Between the U.S. TCSEC and the European ITSEC
Dr. Martha Branstad, Dr. Charles Pfleeger, Trusted Information Systems, Inc.
Dr. David Brewer, Gamma Secure Systems, Ltd.
Mr. Christian Jahl, Mr. Helmut Kurth, IAGB Software Technology
Proceeding of 14th National Computer Security Conference -- October 1991
Building a Multi-Level Applicatoin on an Untrusted DBMS in a UNIX System V/MLS Environment - A Project's Experience
David S. Crawford, Canadian Department of National Defence
Proceeding of 14th National Computer Security Conference -- October 1991
Building a Multi-Level Secure TCP/IP
Deborah A. Futcher, Brian K. Yasaki, The Wollongong Group
Ron L. Sharp, AT&T Bell Laboratories
Proceeding of 14th National Computer Security Conference -- October 1991
A Case Study for the Approach to Developing a Multilevel Secure Command and Control Information System
James Obal, Supreme Allied Commander Atlantic
William Grogan, Contel Federal Systems
Proceeding of 14th National Computer Security Conference -- October 1991
Developing Applicatoins on LOCK
Richard O'Brien, Clyde Rogers, SCTC
Proceeding of 14th National Computer Security Conference -- October 1991
Experience of Commercial Security Evaluation
Peter Fagan, Julian Straw, Secure Information Systems Limited
Proceeding of 14th National Computer Security Conference -- October 1991
Experiences in Multi-Level Security on Distributed Architectures
Karl A. Siil, AT&T Bell Laboratories
Proceeding of 14th National Computer Security Conference -- October 1991
A Framework for Developing Accreditable MLS AISs
R.K. Bauer, J. Sachs, M.L. Weidner, W.F. Wilson, Arca Systems, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991
Integrating B2 Security into a UNIX System
Kevin Brady, UNIX System Laboratories, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991
Reconciling CMW Requirements with Those of X11 Applications
Glenn Faden, Sun Microsystems, Inc.
Proceeding of 14th National Computer Security Conference -- October 1991
Trusting X: Issues in Building Trusted X Window Systems or What's not Trusted About X?
Jeremy Epstein, TRW Systems Division
Jeffrey Picciotto, MITRE Corporation
Proceeding of 14th National Computer Security Conference -- October 1991
An Approach for Multilevel Security (MLS) Acquisition
Bill Neugent, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Assessing Modularity in Trusted Computing Bases
J.L. Arnold, R.J. Bottomly, National Security Agency
D.B. Baker, D.D. Downs, The Aerospace Corporation
F. Belvin, S. Chokhani, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Enforcing Entity and Referential Integrity in Multilevel Secure Databases
Vinti M. Doshi, Sushil Jajodia, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Evolving Criteria for Evaluation: The Challenge for the International Integrator of the 90s
Virgil Gibson, Joan Fowler, Grumman Data Systems
Proceeding of 15th National Computer Security Conference -- October 1992
General Issues to be Resolved in Achieving Multilevel Security (MLS)
Bill Neugent, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment
Ravi S. Sandhu, Gurprett S. Suri, Center for Secure Information Systems & Department of Information and Software Systems Engineering, George Mason University
Proceeding of 15th National Computer Security Conference -- October 1992
Implications of Monoinstantiation in a Normally Polyinstantiated Multilevel Secure Database
Frank E. Kramer, Steven M. Heffern, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
The IT Security Evaluation Manual (ITSEM)
Y. Klein, Service Central de la Sécurité des Systèmes d'Information, Paris, France
E. Roche, Department of Trade and Industry, London, United Kingdom
F. Taal, Netherlands National Communications Security Agency, The Hague, The Netherlands
M. Van Dulm, Ministry of the Interior, The Hague, The Netherlands
U. Van Essen, German Information Security Agency, Bonn, Germany
P. Wolf, Centre D'Électronique de l'Armement, Bruz, France
J. Yates, Communications-Electronics Security Group, Cheltenham, United Kingdom
Proceeding of 15th National Computer Security Conference -- October 1992
Knowledge-Based Inference Control in a Multilevel Secure Database Management System
Bhavani Thuraisingham, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
A Lattice Interpretation of the Chinese Wall Policy
Ravi S. Sandhu, Center for Secure Information Systems & Department of Information and Software Systems Engineering, George Mason University
Proceeding of 15th National Computer Security Conference -- October 1992
Mandatory Policy Issues of High Assurance Composite Systems
Jonathan Fellows, Grumman Data Systems
Proceeding of 15th National Computer Security Conference -- October 1992
A Multilevel Secure Database Management System Benchmark
Linda M. Schlipper, Jarrellann Filsinger, Vinti M. Doshi, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
The Multipolicy Paradigm
Hilary H. Hosmer, Data Security Inc.
Proceeding of 15th National Computer Security Conference -- October 1992
The Need for a Multilevel Secure (MLS) Trusted User Interface
Greg Factor, Steve Heffern, Doug Nelson, Jim Studt, Mary Yelton, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Network Security Via DNSIX, Integration of DNSIX and CW Technology
Howard A. Heller, Harris Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
A Note on Compartmented Mode: To B2 or not B2?
Theodore M.P. Lee, Trusted Information Systems, Inc.
Proceeding of 15th National Computer Security Conference -- October 1992
Operating System Support for Trusted Applications
Richard Graubart, The MITRE Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Operational Support of Downgrading in a Multi-Level Secure System
Doug Nelson, Greg Factor, Jim Studt, Mary Yelton, Steve Heffern, Frank Kramer, Digital Equipment Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
Potential Benefits from Implementing the Clark-Wilson Integrity Model Using an Object-Oriented Approach
Craig A. Schiller, Science Applications International Corporation
Proceeding of 15th National Computer Security Conference -- October 1992
A Tool for Covert Storage Channel Analysis of the UNIX Kernel
David A. Willcox, Steve R. Bunch, Motorola Microcomputer Group
Proceeding of 15th National Computer Security Conference -- October 1992