A security model for military message systems
ACM Transactions on Computer Systems (TOCS)
A comment on the `basic security theorem' of Bell and LaPadula
Information Processing Letters
A century of electrical engineering and computer science at MIT, 1882-1982
A century of electrical engineering and computer science at MIT, 1882-1982
Journal of Automated Reasoning
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
IBM's 360 and early 370 systems
IBM's 360 and early 370 systems
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Segmentation and the Design of Multiprogrammed Computer Systems
Journal of the ACM (JACM)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Proof techniques for hierarchically structured programs
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Protection in operating systems
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The Computer from Pascal to Von Neumann
The Computer from Pascal to Von Neumann
Project Whirlwind; The History of a Pioneer Computer
Project Whirlwind; The History of a Pioneer Computer
BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Verification technology and the A1 criteria
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Features and benefits of trusted computing
2009 Information Security Curriculum Development Conference
Hi-index | 0.00 |
A distinctive concern in the US military for computer security dates from the emergence of time-sharing systems in the 1960s. This paper traces the subsequent development of the idea of a “security kernel” and of the mathematical modeling of security, focusing in particular on the paradigmatic Bell-LaPadula model. The paper examines the connections between computer security and formal, deductive verification of the properties of computer systems. It goes on to discuss differences between the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense's Trusted Computer System Evaluation Criteria (the so-called Orange Book), which effectively took its final form in 1983. The paper ends by outlining the fragmentation of computer security since the Orange Book was written