Title | Author (year) | Summary |
A Provably Secure Operating System |
Neumann et al. (1975) |
Summarizes work to date on the development of a design for a general-purpose computing system intended for secure operations |
Compter Security Technology Planning Study |
Anderson (1972) |
Volume II report of the work of the Computer Security Technology Planning Study Panel. Presents details supporting the recommended development plan |
Computer Security Threat Monitoring and Surveillance |
Anderson (1980) |
This is a final report of a study, the purpose of which was to improve the computer security auditing and surveillance capability of the customer's system |
DoD Trusted Computer System Evaluation Criteria |
Latham, DoD (1985) |
The trusted computer system evaluation critieria defined in this document classify systems into four broad hierarchial divisions of enhanced security protection |
Jobstream Separator System Design |
Schacht (1975) |
Presents a technical and economic assessment of the Jobstream Separator (JSS) |
Multics Security Evaluation:Vulnerability Analysis |
Karger & Schell, USAF (1974) |
A security evaluation of Multics for potential use as a two-level (Secret/Top Secret) system in the Air Force Data Services Center (AFDSC). |
Operating System Structures to Support Security and Reliable Software |
Linden (1976) |
To implement security in the design of computer systems, this survey focuses on two system structuring concepts that support security; small protection domains and extended-type objects. |
Proposed Technical Evaluation Criteria for Trusted Computer System |
Nibaldi (1979) |
This report documents a proposed set of technical evaluation criteria. These criteria and any evaluation process that they might imply represent on approach to how trusted systems might be evaluated. |
Protection Analysis |
Bisbey and Hollingsworth (1976) |
The primary goal of the project was to make protection evaluation both more effective and more economical by decomposing it into more manageable and methodical subtask... |
Secure Computer Systems:Unified Exposition and Multics Interpretation |
Bell & LaPadula (1976) |
Presents a unified narrative exposition of the ESD/MITRE computer security model. |
Secure Minicomputer Operating System (KSOS) |
Ford Aerospace (1978) |
Provides a summary of the progress obtained in Phase I of the KSOS development |
The Neglected Aspect of Computer Security |
Myers (1980) |
Distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion |