The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.10)
pp: 17-19
Dan Thomsen , SIFT, LLC
Jeremy Epstein , SRI International
Peter G. Neumann , SRI International
Is the computer security field really old enough to have lost treasures? Will a granite punch card with ancient Cobol contain some code fragment that produces a better firewall? Hardly. The computing environment changes so much and so radically that implementation details lose relevance quickly. However, concepts and key insights can serve modern developers just as well today as they did builders of ancient systems from the 1980s.
computer security, economics, The Orange Book, elections
Dan Thomsen, Jeremy Epstein, Peter G. Neumann, "Lost Treasures", IEEE Security & Privacy, vol.10, no. 6, pp. 17-19, Nov.-Dec. 2012, doi:10.1109/MSP.2012.148
1. Trusted Computer System Evaluation Criteria, US Dept. Defense, Nat'l Computer Security Center, report 5200.28-STD, Dec. 1985
2. P.A. Karger and R.R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, vol. II, HQ Electronic Systems Division, June 1974; karg74.pdf.
3. K. Thompson, “Reflections on Trusting Trust,” Comm. ACM, vol. 27, no. 8, 1984, pp. 761–763.
4. D.E. Bell and L. LaPadula,Secure Computer Systems: Unified Exposition and Multics Interpretation, tech. report, MTR-2997, MITRE, July 1975.
5. J.H. Saltzer and M.D. Schroeder, “The Protection of Information in Computer Systems,” Proc. IEEE, vol. 63, no. 9, 1975, pp. 1278–1308.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool