|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T U
Length: 39905 (0x9be1) Types: TextFile Notes: Uncompressed file
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦495322660⟧ »./papers/Misc/Ref.books.security.technical.bib.Z« └─⟦this⟧
Article 454 of comp.os.research: Path: watmath!utgpu!jarvis.csri.toronto.edu!rutgers!tut.cis.ohio-state.edu!purdue!decwrl!shelby!agate!saturn!benson@dove.gatech.edu From: benson@dove.gatech.edu (Glenn Benson) Newsgroups: comp.os.research Subject: Security bibliography Message-ID: <7625@saturn.ucsc.edu> Date: 23 May 89 20:45:56 GMT Sender: usenet@saturn.ucsc.edu Organization: Georgia Institute of Technology Lines: 1375 Approved: comp-os-research@jupiter.ucsc.edu @TECHREPORT{BL, AUTHOR = {D. Bell and L. LaPadula}, TITLE = {Secure Computer System Unified Exposition and Multics Interpretation}, INSTITUTION = {{MITRE} Corp.}, YEAR = {1975}, NUMBER = {MTR-2997}, ADDRESS = {Bedford, MA}, MONTH = {July}, ANNOTE = {Bell La Padula Model: Multics}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:48pm} } @BOOK{BenAri, AUTHOR = {M. Ben-Ari}, TITLE = {Principles of Concurrent Programming}, PUBLISHER = {Prentice-Hall International, Inc.}, YEAR = {1982}, ADDRESS = {Englewood Cliffs, NJ}, ANNOTE = {Contains monitors}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:50pm} } @TECHREPORT{Ben:SMAFF, AUTHOR = {G. Benson}, TITLE = {Secure Message and File Facility}, INSTITUTION = {Martin Marietta Corp.}, YEAR = {1987}, NUMBER = {MMC-D-87-63773-012}, ADDRESS = {Denver, CO}, MONTH = {September}, ANNOTE = {Secure Message and File Facility (SMAFF)}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:51pm} } @TECHREPORT{Ben:HMM, AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz}, TITLE = {The Hierarchical Matrix Model of Computer Security}, INSTITUTION = {Georgia Inst. Tech.}, YEAR = {1988}, NUMBER = {GIT-ICS-88/17}, ADDRESS = {Atlanta, GA}, MONTH = {May}, ANNOTE = {HMM: rough draft}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:54pm} } @BOOK{Date:DB, AUTHOR = {C. Date}, TITLE = {An Introduction to Database Systems}, PUBLISHER = {Addison-Wesley Systems Programming Series}, YEAR = {1987}, VOLUME = {1}, EDITION = {4}, ADDRESS = {Reading, MA}, MONTH = {November}, ANNOTE = {Generic Data Base}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:57pm} } @INPROCEEDINGS{Den:Cert, AUTHOR = {D. Denning and P. Denning}, TITLE = {Certification of Programs for Secure Information Flow}, BOOKTITLE = {Communications of the ACM}, YEAR = {1977}, PAGES = {504--512}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 4:59pm} } @INPROCEEDINGS{FLR, AUTHOR = {R. Feiertag and K. Levitt and L. Robinson}, TITLE = {Proving Multi-level Security of system Design}, BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles}, YEAR = {1977}, PAGES = {57--65}, PUBLISHER = {IEEE}, ORGANIZATION = {ACM}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:02pm} } @INPROCEEDINGS{Gla:know, AUTHOR = {J. Glasgow and G. MacEwen}, TITLE = {Reasoning about Knowledge in Multilevel Secure Distributed Systems}, BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy}, YEAR = {1988}, PAGES = {122--128}, ADDRESS = {Oakland, CA}, ANNOTE = {knowledge}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:05pm} } @INPROCEEDINGS{GM, AUTHOR = {J. Goguen and J. Meseguer}, TITLE = {Security Policies and Security Models}, BOOKTITLE = {Proc. 1982 IEEE symp. Security and Privacy}, YEAR = {1982}, PAGES = {11--20}, PUBLISHER = {IEEE}, ADDRESS = {Oakland, CA}, KEYWORDS = {'}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:06pm} } @TECHREPORT{Good:gyp88, AUTHOR = {D. Good and B. DiVito and M. Smith}, TITLE = {Using the Gypsy Methodology}, INSTITUTION = {Computational Logic Inc.}, YEAR = {1988}, ADDRESS = {Austin, TX}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:08pm} } @INPROCEEDINGS{Haigh:SAT, AUTHOR = {J. Haigh and W. Young}, TITLE = {Extending the Noninterference Version of {M}{L}{S} for {S}{A}{T}}, BOOKTITLE = {IEEE Transactions on Software Engineering}, YEAR = {1987}, PAGES = {141--150}, MONTH = {February}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:10pm} } @INPROCEEDINGS{HRU, AUTHOR = {M. Harrison and W. Ruzzo and J. Ullman}, TITLE = {Protection in Operating Systems}, BOOKTITLE = {Communications of the ACM}, YEAR = {1976}, PAGES = {461--471}, PUBLISHER = {ACM}, MONTH = {August}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:12pm} } @INPROCEEDINGS{Jones:TG, AUTHOR = {A. Jones and R. Lipton and L. Snyder}, TITLE = {A Linear Time Algorithm for Deciding Security}, BOOKTITLE = {Proc. $17^{th}$ Annual Symp. on Found. Comp Sci.}, YEAR = {1976}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:14pm} } @INPROCEEDINGS{McC:Hook, AUTHOR = {D. McCullough}, TITLE = {Specifications for Multi-Level Security and a Hook-up Property}, BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy}, YEAR = {1987}, PAGES = {161--166}, ADDRESS = {Oakland, CA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:16pm} } @INPROCEEDINGS{McC:NI, AUTHOR = {D. McCullough}, TITLE = {Noninterference and the Composability of Security Properties}, BOOKTITLE = {1988 IEEE Symp. Security and Privacy}, YEAR = {1988}, PAGES = {177--186}, ADDRESS = {Oakland, CA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:18pm} } @INPROCEEDINGS{Pit:BL, AUTHOR = {P. Pittelli}, TITLE = {The {Bell}-{LaPadula} Computer Security Model Represented as a Special Case of the {Harrison}-{Ruzzo}-{Ullman} Model}, BOOKTITLE = {Proc. $10^{th}$ National Computer Security Conference}, YEAR = {1987}, PAGES = {118--121}, PUBLISHER = {NBS}, ADDRESS = {Gaithersburg, MD}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:20pm} } @UNPUBLISHED{Rus:Up, AUTHOR = {J. Rushby}, TITLE = {Security Policies for Distributed Systems}, NOTE = {SRI International (Unpublished Draft)}, MONTH = {September}, YEAR = {1988}, ANNOTE = {Unpublished draft of composable nonint for dist. sys.}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:21pm} } @MANUAL{Gemini:Ov, TITLE = {System Overview Gemini Trusted Multiple Microcomputer Base (version 0)}, EDITION = {0}, ADDRESS = {Carmel, CA}, MONTH = {May}, YEAR = {1985}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:23pm} } @INPROCEEDINGS{Dem:Soc, AUTHOR = {R. De Millo and R. Lipton and A. Perlis}, TITLE = {Social Processes and Proofs of Theorems and Programs}, BOOKTITLE = {Communications of the ACM}, YEAR = {1979}, PAGES = {271--280}, PUBLISHER = {ACM}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:03pm} } @BOOK{AHU, AUTHOR = {A. Aho and J. Hopcroft and J. Ullman}, TITLE = {Design and Analysis of Computer Algorithms}, PUBLISHER = {Addison-Wesley}, YEAR = {1974}, ADDRESS = {Reading, MA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:06pm} } @PHDTHESIS{Wu:Phd, AUTHOR = {M. Wu}, TITLE = {Hierarchical Protection Systems}, SCHOOL = {U. of Iowa}, YEAR = {1980}, ADDRESS = {Iowa City, IA}, MONTH = {December}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:13pm} } @BOOK{Den:book, AUTHOR = {D. Denning}, TITLE = {Cryptography and Data Security}, PUBLISHER = {Addison-Wesley Publishing Co.}, YEAR = {1982}, ADDRESS = {Reading, MA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:16pm} } @INPROCEEDINGS{Lamp:Conf, AUTHOR = {B. Lampson}, TITLE = {A Note on the Confinement Problem}, BOOKTITLE = {Communications of the ACM}, YEAR = {1973}, PAGES = {613--615}, PUBLISHER = {ACM}, MONTH = {October}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:19pm} } @INPROCEEDINGS{Den:latt, AUTHOR = {D. Denning}, TITLE = {A Lattice Model of Secure Information Flow}, BOOKTITLE = {Communications of the ACM}, YEAR = {1976}, PAGES = {236--243}, PUBLISHER = {ACM}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:33pm} } @INPROCEEDINGS{McLean:SysZ, AUTHOR = {J. McLean}, TITLE = {Reasoning about Security Models}, BOOKTITLE = {Proc. 1988 Symp. Security and Privacy}, YEAR = {1988}, PAGES = {123--131}, PUBLISHER = {IEEE}, ADDRESS = {Oakland, CA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:35pm} } @TECHREPORT{Anderson:Plan, AUTHOR = {J. Anderson}, TITLE = {Computer Security Technology Planning Study}, INSTITUTION = {AFSC}, YEAR = {1972}, NUMBER = {ESD-TR-73-51}, ADDRESS = {Hanscom AFB, Bedford, MA}, MONTH = {October}, NOTE = {AD-758 206, ESD/AFSC}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:47pm} } @INPROCEEDINGS{Brown:Newcast, AUTHOR = {D. Brownbridge and L. Marshall and B. Randell}, TITLE = {The Newcastle connection, or UNIXes of the World Unite!}, BOOKTITLE = {Software-Practice and Experience}, YEAR = {1982}, PAGES = {1147--1162}, PUBLISHER = {Wiley Inter-science}, MONTH = {December}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:50pm} } @INPROCEEDINGS{Ber:KSOS, AUTHOR = {T. Berson and G. Barksdale}, TITLE = {KSOS-Development Methodology for a Secure Operating System}, BOOKTITLE = {Proc. NCC}, YEAR = {1979}, PAGES = {365--371}, PUBLISHER = {AFIPS Press}, ADDRESS = {Montvale, NJ}, ORGANIZATION = {AFIPS}, MONTH = {June}, NOTE = {Vol. 48}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:52pm} } @INPROCEEDINGS{Cheh:verif, AUTHOR = {M. Cheheyl and M. Gasser and G. Huff and J. Millen}, TITLE = {Verifying Security}, BOOKTITLE = {Computing Surveys}, YEAR = {1981}, PAGES = {279--339}, MONTH = {September}, NOTE = {Vol. 13, No. 3}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:54pm} } @INPROCEEDINGS{Coh:Hydra, AUTHOR = {E. Cohen and D. Jefferson}, TITLE = {Protection in the Hydra Operating System}, BOOKTITLE = {Proc. $5^{th}$ SOSP}, YEAR = {1975}, PAGES = {141--160}, MONTH = {November}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:56pm} } @TECHREPORT{Das:CLOUDS, AUTHOR = {P. Dasgupta and R. LeBlanc and E. Spafford}, TITLE = {The Clouds Project: Design and Implementation of a Fault-Tolerant Distributed Operating System}, INSTITUTION = {Georgia Inst. Tech.}, YEAR = {1985}, NUMBER = {GIT-ICS-85/29}, ADDRESS = {Atlanta, GA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:58pm} } @INPROCEEDINGS{Land:MMS, AUTHOR = {C. Landwehr and C. Heitmeyer and J. McLean}, TITLE = {A Security Model for Military Message Systems}, BOOKTITLE = {ACM Transactions on Computer Systems}, YEAR = {1984}, PAGES = {198--222}, PUBLISHER = {ACM}, MONTH = {August}, ANNOTE = {Landwehr Secure MMS}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {6-Dec-88, 0:20pm} } @TECHREPORT{Aub:Ra, AUTHOR = {J. Bernabeu-Auban and P. Hutto and M. Khalidi}, TITLE = {The Architecture of the Ra Kernel}, INSTITUTION = {Georgia Institute of Technology}, YEAR = {1987}, NUMBER = {GIT-ICS-87/35}, ADDRESS = {Atlanta, GA}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {6-Dec-88, 5:43pm} } @INPROCEEDINGS{Mill:val, AUTHOR = {J. Millen}, TITLE = {Security Kernel Validation in Practice}, BOOKTITLE = {Communications of the ACM}, YEAR = {1976}, PAGES = {243--250}, PUBLISHER = {ACM}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {6-Dec-88, 5:47pm} } @INPROCEEDINGS{Pop:UCLA, AUTHOR = {P. Popek and D. Farber}, TITLE = {A Model for Verification of Data Security in Operating Systems}, BOOKTITLE = {Communications of the ACM}, YEAR = {1978}, PAGES = {737--749}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {6-Dec-88, 5:49pm} } @INPROCEEDINGS{Land:surv, AUTHOR = {C. Landwehr}, TITLE = {Formal Models of Computer Security}, BOOKTITLE = {ACM Computing Surveys}, YEAR = {1981}, PAGES = {247--278}, PUBLISHER = {ACM}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {6-Dec-88, 5:51pm} } @BOOK{Gas:Book, AUTHOR = {M. Gasser}, TITLE = {Building a Secure Computer System}, PUBLISHER = {Van Nostrand Reinhold Co.}, YEAR = {1988}, ADDRESS = {New York, NY}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {12-Dec-88, 7:29pm} } @PHDTHESIS{Bis:PhD, AUTHOR = {M. Bishop}, TITLE = {Practical Take-Grant Systems: Do They Exist?}, SCHOOL = {Purdue {U}.}, YEAR = {1984}, ADDRESS = {W. Lafayette, IN}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {31-Dec-88, 11:21am} } @BOOK{Coh:comb, AUTHOR = {D. Cohen}, TITLE = {Basic Techniques of Combinatorial Theory}, PUBLISHER = {John Wiley \& Sons}, YEAR = {1978}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {31-Dec-88, 4:32pm} } @INPROCEEDINGS{Fra:Scomp, AUTHOR = {L. Fraim}, TITLE = {{S}{C}{O}{M}{P}: {A} Solution to the Multilevel Security Problem}, BOOKTITLE = {IEEE Computer}, YEAR = {1983}, PAGES = {26--34}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@cobra)}, TIMESTAMP = {1-Jan-89, 6:40pm} } @INPROCEEDINGS{ra:hawaii, AUTHOR = {Jos\'e M. {Bernab\'eu Aub\'an} and Phillip W. Hutto and M. Yousef A. Khalidi and Mustaque Ahamad and William F. Appelbe and Partha Dasgupta and Richard J. LeBlanc and Umakishore Ramachandran}, TITLE = {The Architecture of {\em Ra}: A kernel for {\em Clouds}}, BOOKTITLE = {Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences}, YEAR = {1989}, MONTH = {January}, NOTE = {To appear}, ENTEREDBY = {Yousef Khalidi (yak@boa)}, TIMESTAMP = {12-Jan-88, 1:50pm} } @INPROCEEDINGS{Lamp:mod, AUTHOR = {L. Lamport}, TITLE = {Specifying Concurrent Program Modules}, BOOKTITLE = {{A}{C}{M} Transactions on Programming Languages and Systems}, YEAR = {1983}, PAGES = {190--222}, PUBLISHER = {ACM}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@cobra)}, TIMESTAMP = {18-Jan-89, 1:21pm} } @TECHREPORT{Lamp:simp, AUTHOR = {L. Lamport}, TITLE = {A Simple Approach to Specifying Concurrent Systems}, INSTITUTION = {Digital Equipment Corporation System Research Center}, YEAR = {1986}, NUMBER = {15}, ADDRESS = {Palo Alto, CA}, MONTH = {December}, ENTEREDBY = {Glenn S Benson (benson@cobra)}, TIMESTAMP = {18-Jan-89, 1:28pm} } @INPROCEEDINGS{Lamp:form, AUTHOR = {L. Lamport}, TITLE = {A Formal Basis for the Specification of Concurrent Systems}, BOOKTITLE = {Distributed Operating Systems. Theory and Practice.}, YEAR = {1987}, EDITOR = {Y. Paker et al.}, PAGES = {4--46}, PUBLISHER = {Springer-Verlag}, ADDRESS = {Berlin}, ORGANIZATION = {NATO Advanced Study Institute}, MONTH = {July}, NOTE = {Vol. F28}, ENTEREDBY = {Glenn S Benson (benson@cobra)}, TIMESTAMP = {18-Jan-89, 1:32pm} } @INPROCEEDINGS{Ben:Hmodel, AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz}, TITLE = {The Hierarchical Model of Distributed System Security}, BOOKTITLE = {1989 IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {194--203}, PUBLISHER = {IEEE}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 2:59pm} } @INPROCEEDINGS{Mac:Opnet, AUTHOR = {G. MacEwen and V. Poon and J. Glasgow}, TITLE = {A Model for Multilevel Security Based on Operator Nets}, BOOKTITLE = {1987 IEEE Symposium on Security and Privacy}, YEAR = {1987}, PAGES = {150--160}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 4:51pm} } @TECHREPORT{Lev:HDM, AUTHOR = {K. Levitt and L. Robinson and B. Silverberg}, TITLE = {The {H}{D}{M} Handbook}, INSTITUTION = {Comp. Sci. lab., SRI International}, YEAR = {1979}, ADDRESS = {Menlo Park, CA}, MONTH = {June}, NOTE = {vols. 1--3}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 6:54pm} } @INPROCEEDINGS{Kemm:FDM, AUTHOR = {R. Kemmerer}, TITLE = {{F}{D}{M}--a specification and verification methodology}, BOOKTITLE = {Proc. $3^{rd}$ Seminar on the DoD Comp. Security Initiative Program}, YEAR = {1980}, PUBLISHER = {{N}{B}{S}}, ADDRESS = {Gaithersburg, MD}, MONTH = {November}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 7:02pm} } @TECHREPORT{Mill:AFF, AUTHOR = {J. Millen}, TITLE = {Operating system security verification}, INSTITUTION = {{M}{I}{T}{R}{E} Corp.}, YEAR = {1979}, NUMBER = {Tech. Rep. M79-223}, ADDRESS = {Bedford, MA}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 7:06pm} } @INPROCEEDINGS{Rus:NI, AUTHOR = {J. Rushby}, TITLE = {Proof of Separability: A Verifcation Technique for a Class of Security Kernels}, BOOKTITLE = {Proc. $5^{th}$ Int. Symp. on Programming}, YEAR = {1982}, PUBLISHER = {Springer-Verlag}, PAGES = {352--362}, ADDRESS = {Berlin}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {19-Jan-89, 7:02pm} } @INPROCEEDINGS{Min:trans, AUTHOR = {N. Minsky}, TITLE = {Selective and Locally Controlled Transport of Privileges}, BOOKTITLE = {ACM Transactions on Programming Languages and Systems}, YEAR = {1984}, PAGES = {573--602}, MONTH = {October}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {30-Jan-89, 4:36pm} } @INPROCEEDINGS{Lu:MLS, AUTHOR = {W. Lu and M. Sundareshan}, TITLE = {A Model for Multilevel Security in Computer Networks}, BOOKTITLE = {Infocom}, YEAR = {1988}, PAGES = {1095--1104}, ADDRESS = {New Orleans, LA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {30-Jan-89, 5:06pm} } @BOOK{Pap:DB, AUTHOR = {C. Papadimitriou}, TITLE = {The Theory of Database Concurrency Control}, PUBLISHER = {Computer Science Press}, YEAR = {1986}, ADDRESS = {Rockville, MD}, KEYWORDS = {see the quote around p. 102}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {1-Feb-89, 4:37pm} } @INPROCEEDINGS{Dav:verif, AUTHOR = {G. Davida and R. DeMillo and R. Lipton}, TITLE = {A System Architecture to Support a Verifiably Secure Multilevel Security System}, BOOKTITLE = {Proc. 1980 Symp. Security and Privacy}, YEAR = {1980}, PAGES = {137--144}, PUBLISHER = {IEEE}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:35pm} } @INPROCEEDINGS{Dij:THE, AUTHOR = {E. Dijkstra}, TITLE = {The Structure of the THE-Multiprogramming System}, BOOKTITLE = {Communications of the ACM}, YEAR = {1968}, PAGES = {341--346}, PUBLISHER = {ACM}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:19pm} } @INPROCEEDINGS{Evan:Auth, AUTHOR = {A. Evans and W. Kantrowitz and E. Weiss}, TITLE = {A User Authentication Scheme not Requiring Security in the Computer}, BOOKTITLE = {Communications of the ACM}, YEAR = {1974}, PAGES = {437--442}, PUBLISHER = {ACM}, MONTH = {August}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:19pm} } @INPROCEEDINGS{Feie:PSOS, AUTHOR = {R. Feiertag and R. Neumann}, TITLE = {The Foundation of a Provably Secure Operating System (PSOS)}, BOOKTITLE = {Proc. NCC}, YEAR = {1979}, PAGES = {329--334}, PUBLISHER = {AFIPS Press}, ADDRESS = {Montvale, NJ}, ORGANIZATION = {AFIPS}, MONTH = {June}, NOTE = {Vol. 48}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:52pm} } @INPROCEEDINGS{Geh:cap, AUTHOR = {E. Gehringer}, TITLE = {Variable-Length Capabilities as a Solution to the Small Object Problem}, BOOKTITLE = {Proc. $7^{th}$ SOSP}, YEAR = {1980}, PAGES = {131--142}, ADDRESS = {Pacific Grove, CA}, MONTH = {November}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 6:56pm} } @TECHREPORT{Good:gyp86, AUTHOR = {D. Good and R. Akers and L. Smith}, TITLE = {Report on Gypsy 2.05}, INSTITUTION = {Computational Logic Inc.}, YEAR = {1986}, NUMBER = {Tech. Rep. 48 (Revision of U. Texas Tech. Report)}, ADDRESS = {Austin, TX}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:08pm} } @INPROCEEDINGS{Bell:pktswt, AUTHOR = {D. Bell}, TITLE = {Security Policy for the Next-Generation Packet Switch}, BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy}, YEAR = {1988}, PAGES = {212--216}, ADDRESS = {Oakland, CA}, MONTH = {April}, ANNOTE = {packet switch}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {21-Feb-88, 5:05pm} } @INPROCEEDINGS{Wis:SMITE, AUTHOR = {S. Wiseman and P. Terry and A. Wood and C. Harrold}, TITLE = {The Trusted Path Between {S}{M}{I}{T}{E} and the User}, BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy}, YEAR = {1988}, PAGES = {147--155}, ADDRESS = {Oakland, CA}, MONTH = {April}, ANNOTE = {a lot of verified code}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {23-Feb-89, 5:05pm} } @INPROCEEDINGS{Kar:CInt, AUTHOR = {P. Karger}, TITLE = {Implementing Commercial Data Integrity with Secure Capabilities}, BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy}, YEAR = {1988}, PAGES = {130--139}, ADDRESS = {Oakland, CA}, MONTH = {April}, ANNOTE = {Secure Implemention of Integrities}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {23-Feb-88, 5:05pm} } @INPROCEEDINGS{CW:int, AUTHOR = {D. Clark and D. Wilson}, TITLE = {A Comparison of Commercial and Military Computer Security Policies}, BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy}, YEAR = {1987}, PAGES = {184--194}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {23-Feb-89, 5:05pm} } @INPROCEEDINGS{Sch:Multics, AUTHOR = {M. Schroeder and J. Saltzer}, TITLE = {The {M}{U}{L}{T}{I}{C}{S} Kernel Design Project}, BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles}, YEAR = {1977}, PAGES = {57--65}, MONTH = {November}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {24-Feb-88, 5:02pm} } @TECHREPORT{Biba, AUTHOR = {K. Biba}, TITLE = {Integrity Considerations for Secure Computer Systems}, INSTITUTION = {Mitre}, YEAR = {1977}, NUMBER = {TR-3153}, ADDRESS = {Bedford, MA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {24-Feb-89, 5:08pm} } @INPROCEEDINGS{Lip:int, AUTHOR = {S. Lipner}, TITLE = {Non-Discretionary controls for Commercial Applications}, BOOKTITLE = {Proc. 1982 IEEE Symp. Security and Privacy}, YEAR = {1982}, PAGES = {2--10}, ADDRESS = {Oakland, CA}, MONTH = {April}, ANNOTE = {Commercial Implemention of Integrities}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {23-Feb-89, 5:05pm} } @BOOK{Pfl:book, AUTHOR = {C. Pfleeger}, TITLE = {Security in Computing}, PUBLISHER = {Prentice-Hall International, Inc.}, YEAR = {1989}, ADDRESS = {Englewood Cliffs, NJ}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {24-Feb-89, 4:50pm} } @INPROCEEDINGS{Say:Lock, AUTHOR = {O. S. Saydjari and J. Beckman and J. Leaman}, TITLE = {Locking Computers Securely}, BOOKTITLE = {Proc. $10^{th}$ DoD/NBS Computer Security Conference}, YEAR = {1987}, PAGES = {129--140}, ADDRESS = {Gaithersburg, MD}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@panda)}, TIMESTAMP = {28-Feb-89, 7:02pm} } @INPROCEEDINGS{Lee:int88, AUTHOR = {T. Lee}, TITLE = {Using Mandatory Integrity to Enforce ``Commercial'' Security}, BOOKTITLE = {1988 IEEE Symposium on Security and Privacy}, YEAR = {1988}, PAGES = {140--146}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {2-Mar-89, 11:52am} } @TECHREPORT{Ben:Dmodel, AUTHOR = {G. Benson and I. Akyildiz and B. Appelbe}, TITLE = {A Formal Protection Model of Security in Distributed Systems}, INSTITUTION = {Georgia Institute of Technology}, YEAR = {1989}, NUMBER = {GIT-ICS-89/08}, ADDRESS = {Atlanta, GA}, MONTH = {February}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {8-Mar-89, 11:08am} } @TECHREPORT{Orange, TITLE = {Trusted Computer Systems Evaluation Criteria}, INSTITUTION = {DoD Computer Security Center}, YEAR = {1983}, NUMBER = {CSC-STD-001-83}, ADDRESS = {Fort Meade, MD}, MONTH = {August}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {21-Mar-89, 3:24pm} } @TECHREPORT{Red, TITLE = {Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria}, INSTITUTION = {National Computer Security Center}, YEAR = {1987}, NUMBER = {NCSC-TG-005}, ADDRESS = {Ft. Meade, MD}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {22-Mar-89, 11:55am} } @TECHREPORT{Scomp:eval, TITLE = {Final Evaluation Report of {S}{C}{O}{M}{P}}, INSTITUTION = {DoD Computer Security Center}, YEAR = {1985}, NUMBER = {CSC-EPL-85/001}, ADDRESS = {Ft. Meade, MD}, MONTH = {September}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {5-Apr-89, 11:53am} } @INPROCEEDINGS{Gri:Encap, AUTHOR = {D. Gries and J. Prins}, TITLE = {A New Notion of Encapsulation}, BOOKTITLE = {Proc. {S}{I}{G}{P}{L}{A}{N} Notices }, YEAR = {1985}, PAGES = {131--139}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {6-Apr-89, 11:59am} } @INPROCEEDINGS{Lev:Proof, AUTHOR = {G. Levin and D. Gries}, TITLE = {A Proof Technique for Communicating Sequential Processes}, BOOKTITLE = {Acta Informatica 15}, YEAR = {1981}, PAGES = {281--302}, PUBLISHER = {Springer-Verlag}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {6-Apr-89, 3:20pm} } @INPROCEEDINGS{Owi:ax, AUTHOR = {S. Owicki and D. Gries}, TITLE = {An axiomatic proof technique for parallel programs}, BOOKTITLE = {Acta Informatica 6}, YEAR = {1976}, EDITOR = {Springer-Verlag}, PAGES = {319--340}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {6-Apr-89, 3:22pm} } @INPROCEEDINGS{Lamp:hoa, AUTHOR = {L. Lamport}, TITLE = {The `Hoare Logic' of Concurrent Programs}, BOOKTITLE = {Acta Informatica 14}, YEAR = {1980}, EDITOR = {Springer-Verlag}, PAGES = {21--37}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {6-Apr-89, 3:22pm} } @INPROCEEDINGS{Wil:file, AUTHOR = {J. Williams and G. Dinolt}, TITLE = {Formal Model of a Trusted File Server}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {157--166}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:13pm} } @INPROCEEDINGS{Wal:Net, AUTHOR = {S. Walker}, TITLE = {Network Security: The Parts of the Sum}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {2--9}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:15pm} } @INPROCEEDINGS{Lee:stat, AUTHOR = {T. Lee}, TITLE = {Statistical Models of Trust: {T}{C}{B}s vs. People}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {10--19}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:17pm} } @INPROCEEDINGS{Scha:Symb, AUTHOR = {M. Schaefer}, TITLE = {Symbol Security Condition Considered Harmful}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {20--46}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:18pm} } @INPROCEEDINGS{Bran:Mach, AUTHOR = {M. Branstad and H. Tajalli and F. Mayer and D. Dalva}, TITLE = {Access Mediation in a Message Passing Kernel}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {66-72}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:20pm} } @INPROCEEDINGS{Lev:setuid, AUTHOR = {T. Levin and S. Padilla and C. Irvine}, TITLE = {A Formal Model for {U}{N}{I}{X} Setuid}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {73-83}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:21pm} } @INPROCEEDINGS{Gren:TUNIS, AUTHOR = {G. Grenier and R. Holt and M. Funkenhauser}, TITLE = {Policy vs. Mechanism in the Secure {T}{U}{N}{I}{S} Operating System}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {84--93}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Par:IPC, AUTHOR = {T. Parenty}, TITLE = {The Incorporation of Multi-Level {I}{P}{C} into {U}{N}{I}{X}}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {94--99}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:25pm} } @INPROCEEDINGS{Lunt:Agg, AUTHOR = {T. Lunt}, TITLE = {Aggregation and Inference: Facts and Fallacies}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {102--109}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Fer:Obj, AUTHOR = {E. Fernandez and E. Gudes and H. Song}, TITLE = {A Security Model for Object-Oriented Databases}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {110--115}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Wil:DBMS, AUTHOR = {J. Wilson}, TITLE = {A Security Policy for an {A}1{D}{B}{M}{S} (a Trusted Subject)}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {116--125}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Su:Cell, AUTHOR = {T. Su and J. Chung and G. Ozsoyoglu}, TITLE = {On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {126--135}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Mea:prot, AUTHOR = {C. Meadows}, TITLE = {Using Narrowing in the Analysis of Key Management Protocols}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {138--147}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Cor:softeng, AUTHOR = {M. Cornwell}, TITLE = {A Software Engineering Approach to Designing Trustworthy Software}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {148--156}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Say:lock89, AUTHOR = {O. Saydjari and J. Beckman and J. Leaman}, TITLE = {{L}{O}{C}{K} Trak: Navigating Uncharted Space}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1989}, PAGES = {167--175}, ADDRESS = {Oakland, CA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 2:23pm} } @INPROCEEDINGS{Rif:RFS, AUTHOR = {A. Rifkin et. al.}, TITLE = {{R}{F}{S} Architectural Overview}, BOOKTITLE = {Usenix Conference and Exhibition}, YEAR = {1986}, ADDRESS = {Atlanta, GA}, MONTH = {Summer}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:00pm} } @INPROCEEDINGS{Sand:NFS, AUTHOR = {R. Sandberg et. al.}, TITLE = {Design and Implementation of the Sun Network File System}, BOOKTITLE = {Usenix Conference and Exhibition}, YEAR = {1985}, ADDRESS = {Portland, OR}, MONTH = {Summer}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:01pm} } @TECHREPORT{Loc:InaJo, AUTHOR = {R. Locasso and J. Scheid and V. Schorre and P. Effert}, TITLE = {The Ina Jo specification language reference manual}, INSTITUTION = {System Development Corporation}, YEAR = {1980}, NUMBER = {TM-(L)-6021-001-00}, ADDRESS = {Santa Monica, CA}, MONTH = {June}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:09pm} } @INPROCEEDINGS{Mac:phys, AUTHOR = {G. MacEwen and Z. Lu and B. Burwell}, TITLE = {Multi-level security based on physical distribution}, BOOKTITLE = {IEEE Symposium on Security and Privacy}, YEAR = {1984}, PAGES = {167--177}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:11pm} } @INPROCEEDINGS{McH:net, AUTHOR = {J. McHugh and A. Moore}, TITLE = {A Security Policy and Formal Top Level Specification}, BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy}, YEAR = {1986}, PAGES = {34--39}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:13pm} } @BOOK{Myers:arch, AUTHOR = {G. Myers}, TITLE = {Advances in Computer Architecture}, PUBLISHER = {Wiley and Sons}, YEAR = {1978}, ADDRESS = {New York}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:14pm} } @TECHREPORT{Neu:PSOS, AUTHOR = {P. Neumann and R. Boyer and R. Feiertag and K. Levitt and L. Robinson}, TITLE = {A Provably Secure Operating System: The System, its Applications, and Proofs}, INSTITUTION = {{S}{R}{I} International}, YEAR = {1980}, NUMBER = {CSL-116}, ADDRESS = {Menlo Park, CA}, MONTH = {May}, NOTE = {$2^{nd}$ ed.}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:16pm} } @INPROCEEDINGS{Mye:hardcap, AUTHOR = {G. Myers and B. Buckingham}, TITLE = {A Hardware Implementation of Capability-Based Addressing}, BOOKTITLE = {{A}{C}{M} Operating Systems Review}, YEAR = {1980}, PAGES = {13--25}, MONTH = {October}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:18pm} } @INPROCEEDINGS{Pop:UCLAunix, AUTHOR = {G. Popek and M. Kampe and C. Kline and A. Stoughton and M. Urban and E. Walton}, TITLE = {{U}{C}{L}{A} Secure {U}{N}{I}{X}}, BOOKTITLE = {Proc. NCC}, YEAR = {1979}, PAGES = {355--364}, PUBLISHER = {{A}{F}{I}{P}{S} Press}, ADDRESS = {Montvale, NJ}, MONTH = {June}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:21pm} } @INPROCEEDINGS{Rus:desver, AUTHOR = {J. Rushby}, TITLE = {Design and Verification of Secure Systems}, BOOKTITLE = {Proceedings $8^{th}$ Symposium on Operating System Principles}, YEAR = {1981}, PAGES = {12--21}, ADDRESS = {Pacific Grove, CA}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:23pm} } @INPROCEEDINGS{Rus:DSS, AUTHOR = {J. Rushby and B. Randell}, TITLE = {A Distributed Secure System}, BOOKTITLE = {IEEE Computer}, YEAR = {1983}, PAGES = {55--67}, PUBLISHER = {IEEE}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:24pm} } @INPROCEEDINGS{Tan:Sparse, AUTHOR = {A. Tanenbaum}, TITLE = {Using Sparse Capabilities in a Distributed Operating System}, BOOKTITLE = {Proceedings of the $6^{th}$ International Conference on Distributed Computing Systems}, YEAR = {1986}, PAGES = {558--563}, ADDRESS = {Cambridge, MA}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:26pm} } @TECHREPORT{Rou:Special, AUTHOR = {O. Roubine and L. Robinson}, TITLE = {{S}{P}{E}{C}{I}{A}{L} Reference Manual}, INSTITUTION = {SRI International}, YEAR = {1977}, ADDRESS = {Menlo Park, CA}, MONTH = {January}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:28pm} } @INPROCEEDINGS{Sid:lan, AUTHOR = {D. Sidhu and M. Gasser}, TITLE = {A Multilevel Secure Local Area Network}, BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy}, YEAR = {1982}, PAGES = {137--143}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:29pm} } @BOOK{Stal:comm, AUTHOR = {W. Stallings}, TITLE = {Data and Computer Communications}, PUBLISHER = {Macmillan Pub. Co.}, YEAR = {1985}, ADDRESS = {NY, NY}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:31pm} } @INPROCEEDINGS{Wood:App, AUTHOR = {J. Woodward}, TITLE = {Applications for Multilevel Secure Operating Systems}, BOOKTITLE = {Proceedings NCC}, YEAR = {1979}, PAGES = {319--328}, PUBLISHER = {{A}{F}{I}{P}{S} Press}, ADDRESS = {Montvale, NJ}, MONTH = {June}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:33pm} } @INPROCEEDINGS{Zim:ISO, AUTHOR = {A. Zimmermann}, TITLE = {The {I}{S}{O} Model of Architecture for Open Systems Interconnection}, BOOKTITLE = {IEEE Transactions on Communications}, YEAR = {1980}, PAGES = {425--432}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:35pm} } @INPROCEEDINGS{Gold:VM370, AUTHOR = {B. Gold and R. Linde and R. Peeler and M. Schaefer and J. Scheid and P. Ward}, TITLE = {A Security Retrofit of {V}{M}/370}, BOOKTITLE = {Proceedings {N}{C}{C}}, YEAR = {1979}, PAGES = {335--344}, PUBLISHER = {{A}{F}{I}{P}{S} Press}, ADDRESS = {Montvale, NJ}, MONTH = {June}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:40pm} } @INPROCEEDINGS{Gli:xenix, AUTHOR = {V. Gligor and C. Burch and R. Chandersekaran and L. Chanpman and M. Hecht and W. Jiang and G. Luckenbaugh and N. Vasudevan}, TITLE = {On the Design and the Implementation of Secure Xenix Workstations}, BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy}, YEAR = {1986}, PAGES = {102--117}, ADDRESS = {Oakland, CA}, MONTH = {April}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:43pm} } @INPROCEEDINGS{Gla:spec, AUTHOR = {J. Glasgow and G. MacEwen}, TITLE = {The Development and Proof of a Formal Specification for a Multilevel Secure System}, BOOKTITLE = {{A}{C}{M} Transactions on Computer Systems}, YEAR = {1987}, PAGES = {151--184}, MONTH = {May}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:46pm} } @MANUAL{Gould:Ov, TITLE = {Gould Users's Guide and User's Reference Manual of the Gould {U}{T}{X}-325}, EDITION = {1}, MONTH = {April}, YEAR = {1987}, ENTEREDBY = {Glenn S Benson (benson@python)}, TIMESTAMP = {1-Dec-88, 5:23pm} } @INPROCEEDINGS{Kain:cap, AUTHOR = {R. Kain and L. Landwehr}, TITLE = {On Access Checking in Capability-Based Systems}, BOOKTITLE = {IEEE Transactions on Software Engineering}, YEAR = {1987}, PAGES = {202--207}, MONTH = {February}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:50pm} } @INPROCEEDINGS{Lamp:time, AUTHOR = {L. Lamport}, TITLE = {Time, Clocks, and the Ordering of Events in a Distributed System}, BOOKTITLE = {Communications of the {A}{C}{M}}, YEAR = {1978}, PAGES = {558--565}, MONTH = {July}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:52pm} } @TECHREPORT{Land:BAT, AUTHOR = {C. Landwehr}, TITLE = {Best Available Technologies ({B}{A}{T}s) for Computer Security}, INSTITUTION = {Office of Naval Research}, YEAR = {1981}, NUMBER = {8554}, ADDRESS = {Washington D.C.}, MONTH = {December}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 5:57pm} } @INPROCEEDINGS{Reed:evcount, AUTHOR = {D. Reed and R. Kanodia}, TITLE = {Synchronization with Eventcounts and Sequencers}, BOOKTITLE = {Proceedings $6^{th}$ {A}{C}{M} Symposium on Operating Systems Principles}, YEAR = {1977}, PAGES = {91}, MONTH = {November}, ENTEREDBY = {Glenn S Benson (benson@dove)}, TIMESTAMP = {14-May-89, 6:03pm} }