|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T U
Length: 39905 (0x9be1)
Types: TextFile
Notes: Uncompressed file
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦495322660⟧ »./papers/Misc/Ref.books.security.technical.bib.Z«
└─⟦this⟧
Article 454 of comp.os.research:
Path: watmath!utgpu!jarvis.csri.toronto.edu!rutgers!tut.cis.ohio-state.edu!purdue!decwrl!shelby!agate!saturn!benson@dove.gatech.edu
From: benson@dove.gatech.edu (Glenn Benson)
Newsgroups: comp.os.research
Subject: Security bibliography
Message-ID: <7625@saturn.ucsc.edu>
Date: 23 May 89 20:45:56 GMT
Sender: usenet@saturn.ucsc.edu
Organization: Georgia Institute of Technology
Lines: 1375
Approved: comp-os-research@jupiter.ucsc.edu
@TECHREPORT{BL,
AUTHOR = {D. Bell and L. LaPadula},
TITLE = {Secure Computer System Unified Exposition and Multics Interpretation},
INSTITUTION = {{MITRE} Corp.},
YEAR = {1975},
NUMBER = {MTR-2997},
ADDRESS = {Bedford, MA},
MONTH = {July},
ANNOTE = {Bell La Padula Model: Multics},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:48pm}
}
@BOOK{BenAri,
AUTHOR = {M. Ben-Ari},
TITLE = {Principles of Concurrent Programming},
PUBLISHER = {Prentice-Hall International, Inc.},
YEAR = {1982},
ADDRESS = {Englewood Cliffs, NJ},
ANNOTE = {Contains monitors},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:50pm}
}
@TECHREPORT{Ben:SMAFF,
AUTHOR = {G. Benson},
TITLE = {Secure Message and File Facility},
INSTITUTION = {Martin Marietta Corp.},
YEAR = {1987},
NUMBER = {MMC-D-87-63773-012},
ADDRESS = {Denver, CO},
MONTH = {September},
ANNOTE = {Secure Message and File Facility (SMAFF)},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:51pm}
}
@TECHREPORT{Ben:HMM,
AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz},
TITLE = {The Hierarchical Matrix Model of Computer Security},
INSTITUTION = {Georgia Inst. Tech.},
YEAR = {1988},
NUMBER = {GIT-ICS-88/17},
ADDRESS = {Atlanta, GA},
MONTH = {May},
ANNOTE = {HMM: rough draft},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:54pm}
}
@BOOK{Date:DB,
AUTHOR = {C. Date},
TITLE = {An Introduction to Database Systems},
PUBLISHER = {Addison-Wesley Systems Programming Series},
YEAR = {1987},
VOLUME = {1},
EDITION = {4},
ADDRESS = {Reading, MA},
MONTH = {November},
ANNOTE = {Generic Data Base},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:57pm}
}
@INPROCEEDINGS{Den:Cert,
AUTHOR = {D. Denning and P. Denning},
TITLE = {Certification of Programs for Secure Information Flow},
BOOKTITLE = {Communications of the ACM},
YEAR = {1977},
PAGES = {504--512},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 4:59pm}
}
@INPROCEEDINGS{FLR,
AUTHOR = {R. Feiertag and K. Levitt and L. Robinson},
TITLE = {Proving Multi-level Security of system Design},
BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles},
YEAR = {1977},
PAGES = {57--65},
PUBLISHER = {IEEE},
ORGANIZATION = {ACM},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:02pm}
}
@INPROCEEDINGS{Gla:know,
AUTHOR = {J. Glasgow and G. MacEwen},
TITLE = {Reasoning about Knowledge in Multilevel Secure Distributed Systems},
BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
YEAR = {1988},
PAGES = {122--128},
ADDRESS = {Oakland, CA},
ANNOTE = {knowledge},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:05pm}
}
@INPROCEEDINGS{GM,
AUTHOR = {J. Goguen and J. Meseguer},
TITLE = {Security Policies and Security Models},
BOOKTITLE = {Proc. 1982 IEEE symp. Security and Privacy},
YEAR = {1982},
PAGES = {11--20},
PUBLISHER = {IEEE},
ADDRESS = {Oakland, CA},
KEYWORDS = {'},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:06pm}
}
@TECHREPORT{Good:gyp88,
AUTHOR = {D. Good and B. DiVito and M. Smith},
TITLE = {Using the Gypsy Methodology},
INSTITUTION = {Computational Logic Inc.},
YEAR = {1988},
ADDRESS = {Austin, TX},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:08pm}
}
@INPROCEEDINGS{Haigh:SAT,
AUTHOR = {J. Haigh and W. Young},
TITLE = {Extending the Noninterference Version of {M}{L}{S} for {S}{A}{T}},
BOOKTITLE = {IEEE Transactions on Software Engineering},
YEAR = {1987},
PAGES = {141--150},
MONTH = {February},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:10pm}
}
@INPROCEEDINGS{HRU,
AUTHOR = {M. Harrison and W. Ruzzo and J. Ullman},
TITLE = {Protection in Operating Systems},
BOOKTITLE = {Communications of the ACM},
YEAR = {1976},
PAGES = {461--471},
PUBLISHER = {ACM},
MONTH = {August},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:12pm}
}
@INPROCEEDINGS{Jones:TG,
AUTHOR = {A. Jones and R. Lipton and L. Snyder},
TITLE = {A Linear Time Algorithm for Deciding Security},
BOOKTITLE = {Proc. $17^{th}$ Annual Symp. on Found. Comp Sci.},
YEAR = {1976},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:14pm}
}
@INPROCEEDINGS{McC:Hook,
AUTHOR = {D. McCullough},
TITLE = {Specifications for Multi-Level Security and a Hook-up Property},
BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy},
YEAR = {1987},
PAGES = {161--166},
ADDRESS = {Oakland, CA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:16pm}
}
@INPROCEEDINGS{McC:NI,
AUTHOR = {D. McCullough},
TITLE = {Noninterference and the Composability of Security Properties},
BOOKTITLE = {1988 IEEE Symp. Security and Privacy},
YEAR = {1988},
PAGES = {177--186},
ADDRESS = {Oakland, CA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:18pm}
}
@INPROCEEDINGS{Pit:BL,
AUTHOR = {P. Pittelli},
TITLE = {The {Bell}-{LaPadula} Computer Security Model Represented as a Special Case of the {Harrison}-{Ruzzo}-{Ullman} Model},
BOOKTITLE = {Proc. $10^{th}$ National Computer Security Conference},
YEAR = {1987},
PAGES = {118--121},
PUBLISHER = {NBS},
ADDRESS = {Gaithersburg, MD},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:20pm}
}
@UNPUBLISHED{Rus:Up,
AUTHOR = {J. Rushby},
TITLE = {Security Policies for Distributed Systems},
NOTE = {SRI International (Unpublished Draft)},
MONTH = {September},
YEAR = {1988},
ANNOTE = {Unpublished draft of composable nonint for dist. sys.},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:21pm}
}
@MANUAL{Gemini:Ov,
TITLE = {System Overview Gemini Trusted Multiple Microcomputer Base (version 0)},
EDITION = {0},
ADDRESS = {Carmel, CA},
MONTH = {May},
YEAR = {1985},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:23pm}
}
@INPROCEEDINGS{Dem:Soc,
AUTHOR = {R. De Millo and R. Lipton and A. Perlis},
TITLE = {Social Processes and Proofs of Theorems and Programs},
BOOKTITLE = {Communications of the ACM},
YEAR = {1979},
PAGES = {271--280},
PUBLISHER = {ACM},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:03pm}
}
@BOOK{AHU,
AUTHOR = {A. Aho and J. Hopcroft and J. Ullman},
TITLE = {Design and Analysis of Computer Algorithms},
PUBLISHER = {Addison-Wesley},
YEAR = {1974},
ADDRESS = {Reading, MA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:06pm}
}
@PHDTHESIS{Wu:Phd,
AUTHOR = {M. Wu},
TITLE = {Hierarchical Protection Systems},
SCHOOL = {U. of Iowa},
YEAR = {1980},
ADDRESS = {Iowa City, IA},
MONTH = {December},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:13pm}
}
@BOOK{Den:book,
AUTHOR = {D. Denning},
TITLE = {Cryptography and Data Security},
PUBLISHER = {Addison-Wesley Publishing Co.},
YEAR = {1982},
ADDRESS = {Reading, MA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:16pm}
}
@INPROCEEDINGS{Lamp:Conf,
AUTHOR = {B. Lampson},
TITLE = {A Note on the Confinement Problem},
BOOKTITLE = {Communications of the ACM},
YEAR = {1973},
PAGES = {613--615},
PUBLISHER = {ACM},
MONTH = {October},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:19pm}
}
@INPROCEEDINGS{Den:latt,
AUTHOR = {D. Denning},
TITLE = {A Lattice Model of Secure Information Flow},
BOOKTITLE = {Communications of the ACM},
YEAR = {1976},
PAGES = {236--243},
PUBLISHER = {ACM},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:33pm}
}
@INPROCEEDINGS{McLean:SysZ,
AUTHOR = {J. McLean},
TITLE = {Reasoning about Security Models},
BOOKTITLE = {Proc. 1988 Symp. Security and Privacy},
YEAR = {1988},
PAGES = {123--131},
PUBLISHER = {IEEE},
ADDRESS = {Oakland, CA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:35pm}
}
@TECHREPORT{Anderson:Plan,
AUTHOR = {J. Anderson},
TITLE = {Computer Security Technology Planning Study},
INSTITUTION = {AFSC},
YEAR = {1972},
NUMBER = {ESD-TR-73-51},
ADDRESS = {Hanscom AFB, Bedford, MA},
MONTH = {October},
NOTE = {AD-758 206, ESD/AFSC},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:47pm}
}
@INPROCEEDINGS{Brown:Newcast,
AUTHOR = {D. Brownbridge and L. Marshall and B. Randell},
TITLE = {The Newcastle connection, or UNIXes of the World Unite!},
BOOKTITLE = {Software-Practice and Experience},
YEAR = {1982},
PAGES = {1147--1162},
PUBLISHER = {Wiley Inter-science},
MONTH = {December},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:50pm}
}
@INPROCEEDINGS{Ber:KSOS,
AUTHOR = {T. Berson and G. Barksdale},
TITLE = {KSOS-Development Methodology for a Secure Operating System},
BOOKTITLE = {Proc. NCC},
YEAR = {1979},
PAGES = {365--371},
PUBLISHER = {AFIPS Press},
ADDRESS = {Montvale, NJ},
ORGANIZATION = {AFIPS},
MONTH = {June},
NOTE = {Vol. 48},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:52pm}
}
@INPROCEEDINGS{Cheh:verif,
AUTHOR = {M. Cheheyl and M. Gasser and G. Huff and J. Millen},
TITLE = {Verifying Security},
BOOKTITLE = {Computing Surveys},
YEAR = {1981},
PAGES = {279--339},
MONTH = {September},
NOTE = {Vol. 13, No. 3},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:54pm}
}
@INPROCEEDINGS{Coh:Hydra,
AUTHOR = {E. Cohen and D. Jefferson},
TITLE = {Protection in the Hydra Operating System},
BOOKTITLE = {Proc. $5^{th}$ SOSP},
YEAR = {1975},
PAGES = {141--160},
MONTH = {November},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:56pm}
}
@TECHREPORT{Das:CLOUDS,
AUTHOR = {P. Dasgupta and R. LeBlanc and E. Spafford},
TITLE = {The Clouds Project: Design and Implementation of a Fault-Tolerant Distributed Operating System},
INSTITUTION = {Georgia Inst. Tech.},
YEAR = {1985},
NUMBER = {GIT-ICS-85/29},
ADDRESS = {Atlanta, GA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:58pm}
}
@INPROCEEDINGS{Land:MMS,
AUTHOR = {C. Landwehr and C. Heitmeyer and J. McLean},
TITLE = {A Security Model for Military Message Systems},
BOOKTITLE = {ACM Transactions on Computer Systems},
YEAR = {1984},
PAGES = {198--222},
PUBLISHER = {ACM},
MONTH = {August},
ANNOTE = {Landwehr Secure MMS},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {6-Dec-88, 0:20pm}
}
@TECHREPORT{Aub:Ra,
AUTHOR = {J. Bernabeu-Auban and P. Hutto and M. Khalidi},
TITLE = {The Architecture of the Ra Kernel},
INSTITUTION = {Georgia Institute of Technology},
YEAR = {1987},
NUMBER = {GIT-ICS-87/35},
ADDRESS = {Atlanta, GA},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {6-Dec-88, 5:43pm}
}
@INPROCEEDINGS{Mill:val,
AUTHOR = {J. Millen},
TITLE = {Security Kernel Validation in Practice},
BOOKTITLE = {Communications of the ACM},
YEAR = {1976},
PAGES = {243--250},
PUBLISHER = {ACM},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {6-Dec-88, 5:47pm}
}
@INPROCEEDINGS{Pop:UCLA,
AUTHOR = {P. Popek and D. Farber},
TITLE = {A Model for Verification of Data Security in Operating Systems},
BOOKTITLE = {Communications of the ACM},
YEAR = {1978},
PAGES = {737--749},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {6-Dec-88, 5:49pm}
}
@INPROCEEDINGS{Land:surv,
AUTHOR = {C. Landwehr},
TITLE = {Formal Models of Computer Security},
BOOKTITLE = {ACM Computing Surveys},
YEAR = {1981},
PAGES = {247--278},
PUBLISHER = {ACM},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {6-Dec-88, 5:51pm}
}
@BOOK{Gas:Book,
AUTHOR = {M. Gasser},
TITLE = {Building a Secure Computer System},
PUBLISHER = {Van Nostrand Reinhold Co.},
YEAR = {1988},
ADDRESS = {New York, NY},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {12-Dec-88, 7:29pm}
}
@PHDTHESIS{Bis:PhD,
AUTHOR = {M. Bishop},
TITLE = {Practical Take-Grant Systems: Do They Exist?},
SCHOOL = {Purdue {U}.},
YEAR = {1984},
ADDRESS = {W. Lafayette, IN},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {31-Dec-88, 11:21am}
}
@BOOK{Coh:comb,
AUTHOR = {D. Cohen},
TITLE = {Basic Techniques of Combinatorial Theory},
PUBLISHER = {John Wiley \& Sons},
YEAR = {1978},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {31-Dec-88, 4:32pm}
}
@INPROCEEDINGS{Fra:Scomp,
AUTHOR = {L. Fraim},
TITLE = {{S}{C}{O}{M}{P}: {A} Solution to the Multilevel Security Problem},
BOOKTITLE = {IEEE Computer},
YEAR = {1983},
PAGES = {26--34},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@cobra)},
TIMESTAMP = {1-Jan-89, 6:40pm}
}
@INPROCEEDINGS{ra:hawaii,
AUTHOR = {Jos\'e M. {Bernab\'eu Aub\'an} and Phillip W. Hutto and M. Yousef A. Khalidi and Mustaque Ahamad and William F. Appelbe and Partha Dasgupta and Richard J. LeBlanc and Umakishore Ramachandran},
TITLE = {The Architecture of {\em Ra}: A kernel for {\em Clouds}},
BOOKTITLE = {Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences},
YEAR = {1989},
MONTH = {January},
NOTE = {To appear},
ENTEREDBY = {Yousef Khalidi (yak@boa)},
TIMESTAMP = {12-Jan-88, 1:50pm}
}
@INPROCEEDINGS{Lamp:mod,
AUTHOR = {L. Lamport},
TITLE = {Specifying Concurrent Program Modules},
BOOKTITLE = {{A}{C}{M} Transactions on Programming Languages and Systems},
YEAR = {1983},
PAGES = {190--222},
PUBLISHER = {ACM},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@cobra)},
TIMESTAMP = {18-Jan-89, 1:21pm}
}
@TECHREPORT{Lamp:simp,
AUTHOR = {L. Lamport},
TITLE = {A Simple Approach to Specifying Concurrent Systems},
INSTITUTION = {Digital Equipment Corporation System Research Center},
YEAR = {1986},
NUMBER = {15},
ADDRESS = {Palo Alto, CA},
MONTH = {December},
ENTEREDBY = {Glenn S Benson (benson@cobra)},
TIMESTAMP = {18-Jan-89, 1:28pm}
}
@INPROCEEDINGS{Lamp:form,
AUTHOR = {L. Lamport},
TITLE = {A Formal Basis for the Specification of Concurrent Systems},
BOOKTITLE = {Distributed Operating Systems. Theory and Practice.},
YEAR = {1987},
EDITOR = {Y. Paker et al.},
PAGES = {4--46},
PUBLISHER = {Springer-Verlag},
ADDRESS = {Berlin},
ORGANIZATION = {NATO Advanced Study Institute},
MONTH = {July},
NOTE = {Vol. F28},
ENTEREDBY = {Glenn S Benson (benson@cobra)},
TIMESTAMP = {18-Jan-89, 1:32pm}
}
@INPROCEEDINGS{Ben:Hmodel,
AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz},
TITLE = {The Hierarchical Model of Distributed System Security},
BOOKTITLE = {1989 IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {194--203},
PUBLISHER = {IEEE},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 2:59pm}
}
@INPROCEEDINGS{Mac:Opnet,
AUTHOR = {G. MacEwen and V. Poon and J. Glasgow},
TITLE = {A Model for Multilevel Security Based on Operator Nets},
BOOKTITLE = {1987 IEEE Symposium on Security and Privacy},
YEAR = {1987},
PAGES = {150--160},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 4:51pm}
}
@TECHREPORT{Lev:HDM,
AUTHOR = {K. Levitt and L. Robinson and B. Silverberg},
TITLE = {The {H}{D}{M} Handbook},
INSTITUTION = {Comp. Sci. lab., SRI International},
YEAR = {1979},
ADDRESS = {Menlo Park, CA},
MONTH = {June},
NOTE = {vols. 1--3},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 6:54pm}
}
@INPROCEEDINGS{Kemm:FDM,
AUTHOR = {R. Kemmerer},
TITLE = {{F}{D}{M}--a specification and verification methodology},
BOOKTITLE = {Proc. $3^{rd}$ Seminar on the DoD Comp. Security Initiative Program},
YEAR = {1980},
PUBLISHER = {{N}{B}{S}},
ADDRESS = {Gaithersburg, MD},
MONTH = {November},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 7:02pm}
}
@TECHREPORT{Mill:AFF,
AUTHOR = {J. Millen},
TITLE = {Operating system security verification},
INSTITUTION = {{M}{I}{T}{R}{E} Corp.},
YEAR = {1979},
NUMBER = {Tech. Rep. M79-223},
ADDRESS = {Bedford, MA},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 7:06pm}
}
@INPROCEEDINGS{Rus:NI,
AUTHOR = {J. Rushby},
TITLE = {Proof of Separability: A Verifcation Technique for a Class
of Security Kernels},
BOOKTITLE = {Proc. $5^{th}$ Int. Symp. on Programming},
YEAR = {1982},
PUBLISHER = {Springer-Verlag},
PAGES = {352--362},
ADDRESS = {Berlin},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {19-Jan-89, 7:02pm}
}
@INPROCEEDINGS{Min:trans,
AUTHOR = {N. Minsky},
TITLE = {Selective and Locally Controlled Transport of Privileges},
BOOKTITLE = {ACM Transactions on Programming Languages and Systems},
YEAR = {1984},
PAGES = {573--602},
MONTH = {October},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {30-Jan-89, 4:36pm}
}
@INPROCEEDINGS{Lu:MLS,
AUTHOR = {W. Lu and M. Sundareshan},
TITLE = {A Model for Multilevel Security in Computer Networks},
BOOKTITLE = {Infocom},
YEAR = {1988},
PAGES = {1095--1104},
ADDRESS = {New Orleans, LA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {30-Jan-89, 5:06pm}
}
@BOOK{Pap:DB,
AUTHOR = {C. Papadimitriou},
TITLE = {The Theory of Database Concurrency Control},
PUBLISHER = {Computer Science Press},
YEAR = {1986},
ADDRESS = {Rockville, MD},
KEYWORDS = {see the quote around p. 102},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {1-Feb-89, 4:37pm}
}
@INPROCEEDINGS{Dav:verif,
AUTHOR = {G. Davida and R. DeMillo and R. Lipton},
TITLE = {A System Architecture to Support a Verifiably Secure Multilevel Security System},
BOOKTITLE = {Proc. 1980 Symp. Security and Privacy},
YEAR = {1980},
PAGES = {137--144},
PUBLISHER = {IEEE},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:35pm}
}
@INPROCEEDINGS{Dij:THE,
AUTHOR = {E. Dijkstra},
TITLE = {The Structure of the THE-Multiprogramming System},
BOOKTITLE = {Communications of the ACM},
YEAR = {1968},
PAGES = {341--346},
PUBLISHER = {ACM},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:19pm}
}
@INPROCEEDINGS{Evan:Auth,
AUTHOR = {A. Evans and W. Kantrowitz and E. Weiss},
TITLE = {A User Authentication Scheme not Requiring Security in the Computer},
BOOKTITLE = {Communications of the ACM},
YEAR = {1974},
PAGES = {437--442},
PUBLISHER = {ACM},
MONTH = {August},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:19pm}
}
@INPROCEEDINGS{Feie:PSOS,
AUTHOR = {R. Feiertag and R. Neumann},
TITLE = {The Foundation of a Provably Secure Operating System (PSOS)},
BOOKTITLE = {Proc. NCC},
YEAR = {1979},
PAGES = {329--334},
PUBLISHER = {AFIPS Press},
ADDRESS = {Montvale, NJ},
ORGANIZATION = {AFIPS},
MONTH = {June},
NOTE = {Vol. 48},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:52pm}
}
@INPROCEEDINGS{Geh:cap,
AUTHOR = {E. Gehringer},
TITLE = {Variable-Length Capabilities as a Solution to the Small Object Problem},
BOOKTITLE = {Proc. $7^{th}$ SOSP},
YEAR = {1980},
PAGES = {131--142},
ADDRESS = {Pacific Grove, CA},
MONTH = {November},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 6:56pm}
}
@TECHREPORT{Good:gyp86,
AUTHOR = {D. Good and R. Akers and L. Smith},
TITLE = {Report on Gypsy 2.05},
INSTITUTION = {Computational Logic Inc.},
YEAR = {1986},
NUMBER = {Tech. Rep. 48 (Revision of U. Texas Tech. Report)},
ADDRESS = {Austin, TX},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:08pm}
}
@INPROCEEDINGS{Bell:pktswt,
AUTHOR = {D. Bell},
TITLE = {Security Policy for the Next-Generation Packet Switch},
BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
YEAR = {1988},
PAGES = {212--216},
ADDRESS = {Oakland, CA},
MONTH = {April},
ANNOTE = {packet switch},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {21-Feb-88, 5:05pm}
}
@INPROCEEDINGS{Wis:SMITE,
AUTHOR = {S. Wiseman and P. Terry and A. Wood and C. Harrold},
TITLE = {The Trusted Path Between {S}{M}{I}{T}{E} and the User},
BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
YEAR = {1988},
PAGES = {147--155},
ADDRESS = {Oakland, CA},
MONTH = {April},
ANNOTE = {a lot of verified code},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {23-Feb-89, 5:05pm}
}
@INPROCEEDINGS{Kar:CInt,
AUTHOR = {P. Karger},
TITLE = {Implementing Commercial Data Integrity with Secure Capabilities},
BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
YEAR = {1988},
PAGES = {130--139},
ADDRESS = {Oakland, CA},
MONTH = {April},
ANNOTE = {Secure Implemention of Integrities},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {23-Feb-88, 5:05pm}
}
@INPROCEEDINGS{CW:int,
AUTHOR = {D. Clark and D. Wilson},
TITLE = {A Comparison of Commercial and Military Computer Security Policies},
BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy},
YEAR = {1987},
PAGES = {184--194},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {23-Feb-89, 5:05pm}
}
@INPROCEEDINGS{Sch:Multics,
AUTHOR = {M. Schroeder and J. Saltzer},
TITLE = {The {M}{U}{L}{T}{I}{C}{S} Kernel Design Project},
BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles},
YEAR = {1977},
PAGES = {57--65},
MONTH = {November},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {24-Feb-88, 5:02pm}
}
@TECHREPORT{Biba,
AUTHOR = {K. Biba},
TITLE = {Integrity Considerations for Secure Computer Systems},
INSTITUTION = {Mitre},
YEAR = {1977},
NUMBER = {TR-3153},
ADDRESS = {Bedford, MA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {24-Feb-89, 5:08pm}
}
@INPROCEEDINGS{Lip:int,
AUTHOR = {S. Lipner},
TITLE = {Non-Discretionary controls for Commercial Applications},
BOOKTITLE = {Proc. 1982 IEEE Symp. Security and Privacy},
YEAR = {1982},
PAGES = {2--10},
ADDRESS = {Oakland, CA},
MONTH = {April},
ANNOTE = {Commercial Implemention of Integrities},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {23-Feb-89, 5:05pm}
}
@BOOK{Pfl:book,
AUTHOR = {C. Pfleeger},
TITLE = {Security in Computing},
PUBLISHER = {Prentice-Hall International, Inc.},
YEAR = {1989},
ADDRESS = {Englewood Cliffs, NJ},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {24-Feb-89, 4:50pm}
}
@INPROCEEDINGS{Say:Lock,
AUTHOR = {O. S. Saydjari and J. Beckman and J. Leaman},
TITLE = {Locking Computers Securely},
BOOKTITLE = {Proc. $10^{th}$ DoD/NBS Computer Security Conference},
YEAR = {1987},
PAGES = {129--140},
ADDRESS = {Gaithersburg, MD},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@panda)},
TIMESTAMP = {28-Feb-89, 7:02pm}
}
@INPROCEEDINGS{Lee:int88,
AUTHOR = {T. Lee},
TITLE = {Using Mandatory Integrity to Enforce ``Commercial'' Security},
BOOKTITLE = {1988 IEEE Symposium on Security and Privacy},
YEAR = {1988},
PAGES = {140--146},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {2-Mar-89, 11:52am}
}
@TECHREPORT{Ben:Dmodel,
AUTHOR = {G. Benson and I. Akyildiz and B. Appelbe},
TITLE = {A Formal Protection Model of Security in Distributed Systems},
INSTITUTION = {Georgia Institute of Technology},
YEAR = {1989},
NUMBER = {GIT-ICS-89/08},
ADDRESS = {Atlanta, GA},
MONTH = {February},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {8-Mar-89, 11:08am}
}
@TECHREPORT{Orange,
TITLE = {Trusted Computer Systems Evaluation Criteria},
INSTITUTION = {DoD Computer Security Center},
YEAR = {1983},
NUMBER = {CSC-STD-001-83},
ADDRESS = {Fort Meade, MD},
MONTH = {August},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {21-Mar-89, 3:24pm}
}
@TECHREPORT{Red,
TITLE = {Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria},
INSTITUTION = {National Computer Security Center},
YEAR = {1987},
NUMBER = {NCSC-TG-005},
ADDRESS = {Ft. Meade, MD},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {22-Mar-89, 11:55am}
}
@TECHREPORT{Scomp:eval,
TITLE = {Final Evaluation Report of {S}{C}{O}{M}{P}},
INSTITUTION = {DoD Computer Security Center},
YEAR = {1985},
NUMBER = {CSC-EPL-85/001},
ADDRESS = {Ft. Meade, MD},
MONTH = {September},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {5-Apr-89, 11:53am}
}
@INPROCEEDINGS{Gri:Encap,
AUTHOR = {D. Gries and J. Prins},
TITLE = {A New Notion of Encapsulation},
BOOKTITLE = {Proc. {S}{I}{G}{P}{L}{A}{N} Notices },
YEAR = {1985},
PAGES = {131--139},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {6-Apr-89, 11:59am}
}
@INPROCEEDINGS{Lev:Proof,
AUTHOR = {G. Levin and D. Gries},
TITLE = {A Proof Technique for Communicating Sequential Processes},
BOOKTITLE = {Acta Informatica 15},
YEAR = {1981},
PAGES = {281--302},
PUBLISHER = {Springer-Verlag},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {6-Apr-89, 3:20pm}
}
@INPROCEEDINGS{Owi:ax,
AUTHOR = {S. Owicki and D. Gries},
TITLE = {An axiomatic proof technique for parallel programs},
BOOKTITLE = {Acta Informatica 6},
YEAR = {1976},
EDITOR = {Springer-Verlag},
PAGES = {319--340},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {6-Apr-89, 3:22pm}
}
@INPROCEEDINGS{Lamp:hoa,
AUTHOR = {L. Lamport},
TITLE = {The `Hoare Logic' of Concurrent Programs},
BOOKTITLE = {Acta Informatica 14},
YEAR = {1980},
EDITOR = {Springer-Verlag},
PAGES = {21--37},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {6-Apr-89, 3:22pm}
}
@INPROCEEDINGS{Wil:file,
AUTHOR = {J. Williams and G. Dinolt},
TITLE = {Formal Model of a Trusted File Server},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {157--166},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:13pm}
}
@INPROCEEDINGS{Wal:Net,
AUTHOR = {S. Walker},
TITLE = {Network Security: The Parts of the Sum},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {2--9},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:15pm}
}
@INPROCEEDINGS{Lee:stat,
AUTHOR = {T. Lee},
TITLE = {Statistical Models of Trust: {T}{C}{B}s vs. People},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {10--19},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:17pm}
}
@INPROCEEDINGS{Scha:Symb,
AUTHOR = {M. Schaefer},
TITLE = {Symbol Security Condition Considered Harmful},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {20--46},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:18pm}
}
@INPROCEEDINGS{Bran:Mach,
AUTHOR = {M. Branstad and H. Tajalli and F. Mayer and D. Dalva},
TITLE = {Access Mediation in a Message Passing Kernel},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {66-72},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:20pm}
}
@INPROCEEDINGS{Lev:setuid,
AUTHOR = {T. Levin and S. Padilla and C. Irvine},
TITLE = {A Formal Model for {U}{N}{I}{X} Setuid},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {73-83},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:21pm}
}
@INPROCEEDINGS{Gren:TUNIS,
AUTHOR = {G. Grenier and R. Holt and M. Funkenhauser},
TITLE = {Policy vs. Mechanism in the Secure {T}{U}{N}{I}{S} Operating System},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {84--93},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Par:IPC,
AUTHOR = {T. Parenty},
TITLE = {The Incorporation of Multi-Level {I}{P}{C} into {U}{N}{I}{X}},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {94--99},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:25pm}
}
@INPROCEEDINGS{Lunt:Agg,
AUTHOR = {T. Lunt},
TITLE = {Aggregation and Inference: Facts and Fallacies},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {102--109},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Fer:Obj,
AUTHOR = {E. Fernandez and E. Gudes and H. Song},
TITLE = {A Security Model for Object-Oriented Databases},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {110--115},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Wil:DBMS,
AUTHOR = {J. Wilson},
TITLE = {A Security Policy for an {A}1{D}{B}{M}{S} (a Trusted Subject)},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {116--125},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Su:Cell,
AUTHOR = {T. Su and J. Chung and G. Ozsoyoglu},
TITLE = {On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {126--135},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Mea:prot,
AUTHOR = {C. Meadows},
TITLE = {Using Narrowing in the Analysis of Key Management Protocols},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {138--147},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Cor:softeng,
AUTHOR = {M. Cornwell},
TITLE = {A Software Engineering Approach to Designing Trustworthy Software},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {148--156},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Say:lock89,
AUTHOR = {O. Saydjari and J. Beckman and J. Leaman},
TITLE = {{L}{O}{C}{K} Trak: Navigating Uncharted Space},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1989},
PAGES = {167--175},
ADDRESS = {Oakland, CA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 2:23pm}
}
@INPROCEEDINGS{Rif:RFS,
AUTHOR = {A. Rifkin et. al.},
TITLE = {{R}{F}{S} Architectural Overview},
BOOKTITLE = {Usenix Conference and Exhibition},
YEAR = {1986},
ADDRESS = {Atlanta, GA},
MONTH = {Summer},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:00pm}
}
@INPROCEEDINGS{Sand:NFS,
AUTHOR = {R. Sandberg et. al.},
TITLE = {Design and Implementation of the Sun Network File System},
BOOKTITLE = {Usenix Conference and Exhibition},
YEAR = {1985},
ADDRESS = {Portland, OR},
MONTH = {Summer},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:01pm}
}
@TECHREPORT{Loc:InaJo,
AUTHOR = {R. Locasso and J. Scheid and V. Schorre and P. Effert},
TITLE = {The Ina Jo specification language reference manual},
INSTITUTION = {System Development Corporation},
YEAR = {1980},
NUMBER = {TM-(L)-6021-001-00},
ADDRESS = {Santa Monica, CA},
MONTH = {June},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:09pm}
}
@INPROCEEDINGS{Mac:phys,
AUTHOR = {G. MacEwen and Z. Lu and B. Burwell},
TITLE = {Multi-level security based on physical distribution},
BOOKTITLE = {IEEE Symposium on Security and Privacy},
YEAR = {1984},
PAGES = {167--177},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:11pm}
}
@INPROCEEDINGS{McH:net,
AUTHOR = {J. McHugh and A. Moore},
TITLE = {A Security Policy and Formal Top Level Specification},
BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
YEAR = {1986},
PAGES = {34--39},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:13pm}
}
@BOOK{Myers:arch,
AUTHOR = {G. Myers},
TITLE = {Advances in Computer Architecture},
PUBLISHER = {Wiley and Sons},
YEAR = {1978},
ADDRESS = {New York},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:14pm}
}
@TECHREPORT{Neu:PSOS,
AUTHOR = {P. Neumann and R. Boyer and R. Feiertag and K. Levitt and L. Robinson},
TITLE = {A Provably Secure Operating System: The System, its Applications, and Proofs},
INSTITUTION = {{S}{R}{I} International},
YEAR = {1980},
NUMBER = {CSL-116},
ADDRESS = {Menlo Park, CA},
MONTH = {May},
NOTE = {$2^{nd}$ ed.},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:16pm}
}
@INPROCEEDINGS{Mye:hardcap,
AUTHOR = {G. Myers and B. Buckingham},
TITLE = {A Hardware Implementation of Capability-Based Addressing},
BOOKTITLE = {{A}{C}{M} Operating Systems Review},
YEAR = {1980},
PAGES = {13--25},
MONTH = {October},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:18pm}
}
@INPROCEEDINGS{Pop:UCLAunix,
AUTHOR = {G. Popek and M. Kampe and C. Kline and A. Stoughton and M. Urban and E. Walton},
TITLE = {{U}{C}{L}{A} Secure {U}{N}{I}{X}},
BOOKTITLE = {Proc. NCC},
YEAR = {1979},
PAGES = {355--364},
PUBLISHER = {{A}{F}{I}{P}{S} Press},
ADDRESS = {Montvale, NJ},
MONTH = {June},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:21pm}
}
@INPROCEEDINGS{Rus:desver,
AUTHOR = {J. Rushby},
TITLE = {Design and Verification of Secure Systems},
BOOKTITLE = {Proceedings $8^{th}$ Symposium on Operating System Principles},
YEAR = {1981},
PAGES = {12--21},
ADDRESS = {Pacific Grove, CA},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:23pm}
}
@INPROCEEDINGS{Rus:DSS,
AUTHOR = {J. Rushby and B. Randell},
TITLE = {A Distributed Secure System},
BOOKTITLE = {IEEE Computer},
YEAR = {1983},
PAGES = {55--67},
PUBLISHER = {IEEE},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:24pm}
}
@INPROCEEDINGS{Tan:Sparse,
AUTHOR = {A. Tanenbaum},
TITLE = {Using Sparse Capabilities in a Distributed Operating System},
BOOKTITLE = {Proceedings of the $6^{th}$ International Conference on Distributed Computing Systems},
YEAR = {1986},
PAGES = {558--563},
ADDRESS = {Cambridge, MA},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:26pm}
}
@TECHREPORT{Rou:Special,
AUTHOR = {O. Roubine and L. Robinson},
TITLE = {{S}{P}{E}{C}{I}{A}{L} Reference Manual},
INSTITUTION = {SRI International},
YEAR = {1977},
ADDRESS = {Menlo Park, CA},
MONTH = {January},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:28pm}
}
@INPROCEEDINGS{Sid:lan,
AUTHOR = {D. Sidhu and M. Gasser},
TITLE = {A Multilevel Secure Local Area Network},
BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
YEAR = {1982},
PAGES = {137--143},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:29pm}
}
@BOOK{Stal:comm,
AUTHOR = {W. Stallings},
TITLE = {Data and Computer Communications},
PUBLISHER = {Macmillan Pub. Co.},
YEAR = {1985},
ADDRESS = {NY, NY},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:31pm}
}
@INPROCEEDINGS{Wood:App,
AUTHOR = {J. Woodward},
TITLE = {Applications for Multilevel Secure Operating Systems},
BOOKTITLE = {Proceedings NCC},
YEAR = {1979},
PAGES = {319--328},
PUBLISHER = {{A}{F}{I}{P}{S} Press},
ADDRESS = {Montvale, NJ},
MONTH = {June},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:33pm}
}
@INPROCEEDINGS{Zim:ISO,
AUTHOR = {A. Zimmermann},
TITLE = {The {I}{S}{O} Model of Architecture for Open Systems Interconnection},
BOOKTITLE = {IEEE Transactions on Communications},
YEAR = {1980},
PAGES = {425--432},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:35pm}
}
@INPROCEEDINGS{Gold:VM370,
AUTHOR = {B. Gold and R. Linde and R. Peeler and M. Schaefer and J. Scheid and P. Ward},
TITLE = {A Security Retrofit of {V}{M}/370},
BOOKTITLE = {Proceedings {N}{C}{C}},
YEAR = {1979},
PAGES = {335--344},
PUBLISHER = {{A}{F}{I}{P}{S} Press},
ADDRESS = {Montvale, NJ},
MONTH = {June},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:40pm}
}
@INPROCEEDINGS{Gli:xenix,
AUTHOR = {V. Gligor and C. Burch and R. Chandersekaran and L. Chanpman and M. Hecht and W. Jiang and G. Luckenbaugh and N. Vasudevan},
TITLE = {On the Design and the Implementation of Secure Xenix Workstations},
BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
YEAR = {1986},
PAGES = {102--117},
ADDRESS = {Oakland, CA},
MONTH = {April},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:43pm}
}
@INPROCEEDINGS{Gla:spec,
AUTHOR = {J. Glasgow and G. MacEwen},
TITLE = {The Development and Proof of a Formal Specification for a Multilevel Secure System},
BOOKTITLE = {{A}{C}{M} Transactions on Computer Systems},
YEAR = {1987},
PAGES = {151--184},
MONTH = {May},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:46pm}
}
@MANUAL{Gould:Ov,
TITLE = {Gould Users's Guide and User's Reference Manual of the Gould {U}{T}{X}-325},
EDITION = {1},
MONTH = {April},
YEAR = {1987},
ENTEREDBY = {Glenn S Benson (benson@python)},
TIMESTAMP = {1-Dec-88, 5:23pm}
}
@INPROCEEDINGS{Kain:cap,
AUTHOR = {R. Kain and L. Landwehr},
TITLE = {On Access Checking in Capability-Based Systems},
BOOKTITLE = {IEEE Transactions on Software Engineering},
YEAR = {1987},
PAGES = {202--207},
MONTH = {February},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:50pm}
}
@INPROCEEDINGS{Lamp:time,
AUTHOR = {L. Lamport},
TITLE = {Time, Clocks, and the Ordering of Events in a Distributed System},
BOOKTITLE = {Communications of the {A}{C}{M}},
YEAR = {1978},
PAGES = {558--565},
MONTH = {July},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:52pm}
}
@TECHREPORT{Land:BAT,
AUTHOR = {C. Landwehr},
TITLE = {Best Available Technologies ({B}{A}{T}s) for Computer Security},
INSTITUTION = {Office of Naval Research},
YEAR = {1981},
NUMBER = {8554},
ADDRESS = {Washington D.C.},
MONTH = {December},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 5:57pm}
}
@INPROCEEDINGS{Reed:evcount,
AUTHOR = {D. Reed and R. Kanodia},
TITLE = {Synchronization with Eventcounts and Sequencers},
BOOKTITLE = {Proceedings $6^{th}$ {A}{C}{M} Symposium on Operating Systems Principles},
YEAR = {1977},
PAGES = {91},
MONTH = {November},
ENTEREDBY = {Glenn S Benson (benson@dove)},
TIMESTAMP = {14-May-89, 6:03pm}
}