Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Trends in Security Product Evaluations
Information Systems Security
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
Goals for computer security education
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
It can be done! It is within the state of the art to buildan Al secure system, and the technology is reduced topractice on the BLACKER Program, a security appliquefor providing host-to-host secure communications acrossthe Defense Data Network, DDN. This report presentsexamples of successful technical accomplishments andidentifies important factors which made progress possibleon the BLACKER Program. Based on a presentation atthe DCA workshop on Computer and CommunicationsSecurity, McLean Vs., July 1986, this paper was presented, but not published, at the IEEE Symposium onSecurity and Privacy, Oakland Ca., April 1988.