The Community for Technology Leaders
Fourth Aerospace Computer Security Applications (1988)
Orlando, FL, USA
Sept. 12, 1988 to Sept. 16, 1988
ISBN: 0-8186-0895-1
TABLE OF CONTENTS

Security issues of the Trusted Mach system (PDF)

M. Branstad , Trusted Inf. Syst. Inc., Glenwood, MD, USA
H. Tajalli , Trusted Inf. Syst. Inc., Glenwood, MD, USA
F. Mayer , Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 362-367

An interpretation of a refined Bell-La Padula model for the TMach kernel (PDF)

F.L. Mayer , Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 368-378

Embedding cryptography into a Trusted Mach system (PDF)

W.C. Barker , Trusted Inf. Syst. Inc., Glenwood, MD, USA
P. Cochrane , Trusted Inf. Syst. Inc., Glenwood, MD, USA
M. Branstad , Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 379-383

Security modeling in the Ulysses environment (PDF)

D. McCullough , Odyssey Res. Associates Inc., Ithaca, NY, USA
T. Korelsky , Odyssey Res. Associates Inc., Ithaca, NY, USA
C. Eichenlaub , Odyssey Res. Associates Inc., Ithaca, NY, USA
J. Hook , Odyssey Res. Associates Inc., Ithaca, NY, USA
C. Klapper , Odyssey Res. Associates Inc., Ithaca, NY, USA
M. Lam , Odyssey Res. Associates Inc., Ithaca, NY, USA
B. Dean , Odyssey Res. Associates Inc., Ithaca, NY, USA
G. Pottinger , Odyssey Res. Associates Inc., Ithaca, NY, USA
O. Rambow , Odyssey Res. Associates Inc., Ithaca, NY, USA
D. Rosenthal , Odyssey Res. Associates Inc., Ithaca, NY, USA
J.P. Seldin , Odyssey Res. Associates Inc., Ithaca, NY, USA
D.G. Weber , Odyssey Res. Associates Inc., Ithaca, NY, USA
pp. 386-392

Minix security policy model (PDF)

J.E. Roskos , Inst. for Defense Anal., Alexandria, VA, USA
pp. 393-399

A description of a formal verification and validation (FVV) process (PDF)

B. Smith , Magnavox Electron. Syst. Co., Ashburn, VA, USA
C. Reese , Magnavox Electron. Syst. Co., Ashburn, VA, USA
K. Lindsay , Magnavox Electron. Syst. Co., Ashburn, VA, USA
B. Crane , Magnavox Electron. Syst. Co., Ashburn, VA, USA
pp. 401-408

Encryption using random keys-a scheme for secure communications (PDF)

P.K. Goyal , Dept. of Electr. & Comput. Eng., Florida Atlantic Univ., Boca Raton, FL, USA
E.B. Fernandez , Dept. of Electr. & Comput. Eng., Florida Atlantic Univ., Boca Raton, FL, USA
pp. 410-412

A model for secure distributed computations in a heterogeneous environment (PDF)

Pau-Chen Cheng , Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
V.D. Gligor , Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
pp. 233-241

A multi-level secure message switch with minimal TCB: architectural outline and security analysis (PDF)

E.H. Lipper , AT&T Bell Lab., Holmdel, NJ, USA
B. Melamed , AT&T Bell Lab., Holmdel, NJ, USA
R.J.T. Morris , AT&T Bell Lab., Holmdel, NJ, USA
pp. 242-249

Configuring a trusted system using the TNI (PDF)

E.J. Powanda , Unisys Corp., Paoli, PA, USA
J.W. Genovese , Unisys Corp., Paoli, PA, USA
pp. 256-261

Design and implementation of a secure terminal gateway (PDF)

R. Cramer , Martin Marietta Inf. & Commun. Syst., Littleton, CO, USA
B. Ridridge , Martin Marietta Inf. & Commun. Syst., Littleton, CO, USA
E. Schallenmuller , Martin Marietta Inf. & Commun. Syst., Littleton, CO, USA
pp. 262-268

The cascading problem for interconnected networks (PDF)

J.K. Millen , MITRE Corp., Bedford, MA, USA
M.W. Schwartz , MITRE Corp., Bedford, MA, USA
pp. 269-274

Characterizing network covert storage channels (PDF)

K.W. Eggers , MITRE Corp., McLean, VA, USA
P.W. Mallett , MITRE Corp., McLean, VA, USA
pp. 275-279

Transaction control expressions for separation of duties (PDF)

R. Sandhu , Dept. of Comput. & Inf. Sci., Ohio State Univ., Columbus, OH, USA
pp. 282-286

Providing software integrity using type managers (PDF)

R.M. Wong , Odyssey Res. Associates, Menlo Park, CA, USA
Y.E. Ding , Odyssey Res. Associates, Menlo Park, CA, USA
pp. 287-294

Integrity controls for military and commercial applications (PDF)

R.R. Jueneman , Comput. Sci. Corp., Falls Church, VA, USA
pp. 298-322

A taxonomy of the causes of proof failures in applications using the HDM methodology (PDF)

K.S. Lindsay , Magnavox Electron. Syst. Co., Ashburn, VA, USA
pp. 419-423

System security in the Space Flight Operations Center (PDF)

D.A. Wagner , Jet Propulsion Lab., California Inst. of Technol., Pasadena, CA, USA
pp. 426-430

Ensuring software integrity (PDF)

J.D. Weiss , AT&T Bell Lab., Holmdel, NJ, USA
E.G. Amoroso , AT&T Bell Lab., Holmdel, NJ, USA
pp. 323-330

The importance of high assurance computers for command, control, communications, and intelligence systems (PDF)

W.R. Shockley , Gemini Comput. Inc., Carmel, CA, USA
R.R. Schell , Gemini Comput. Inc., Carmel, CA, USA
M.F. Thompson , Gemini Comput. Inc., Carmel, CA, USA
pp. 331-342

Exploring computer viruses (PDF)

R. Davis , Ford Aerosp., Reston, VA, USA
pp. 7/11

Privacy enhanced electronic mail (PDF)

T.J. Casey , Dept. of Comput. Sci., Univ. Coll. London, UK
S.R. Wilbur , Dept. of Comput. Sci., Univ. Coll. London, UK
pp. 16-21

Haystack: an intrusion detection system (PDF)

S.E. Smaha , Tracor Appl Sci. Inc., Austin, TX, USA
pp. 37-44

Making databases secure with TRUDATA technology (PDF)

R.B. Knode , Intercon Syst. Corp., Columbia, MD, USA
R.A. Hunt , Intercon Syst. Corp., Columbia, MD, USA
pp. 82-90

Implementation design for a kernelized trusted DBMS (PDF)

J.W. Davison , Mitre Corp., Bedford, MA, USA
pp. 91-98

Inference controls for frequency count tables: an update (PDF)

L.H. Cox , Nat. Acad. of Sci., Washington, DC, USA
pp. 112-117

Query processing in LDV: a secure database system (PDF)

P. Dwyer , Honeywell Inc., Minneapolis, MN, USA
E. Onuegbe , Honeywell Inc., Minneapolis, MN, USA
P. Stachour , Honeywell Inc., Minneapolis, MN, USA
B. Thuraisingham , Honeywell Inc., Minneapolis, MN, USA
pp. 118-124

Identifying and representing the security semantics of an application (PDF)

G.W. Smith , Sch. of Inf. Technol. & Eng., George Mason Univ., Fairfax, VA, USA
pp. 125-130

Secure system development in industry: a perspective from Digital Equipment (PDF)

M. Gasser , Digital Equip. Corp., Boxboro, MA, USA
S.B. Lipner , Digital Equip. Corp., Boxboro, MA, USA
pp. 132-136

An alternative implementation of the reference monitor concept (military messaging, secure) (PDF)

G. King , Magnavox Electron. Syst. Co., Ashburn, VA, USA
W. Smith , Magnavox Electron. Syst. Co., Ashburn, VA, USA
pp. 159-166

Dual labels revisited (computer security) (PDF)

R.D. Graubart , Mitre Corp., Bedford, MA, USA
pp. 167-172

A mandatory access control mechanism for the Unix file system (PDF)

T. Thomas , Motorola Inc., Urbana, IL, USA
pp. 173-177

Producing secure digital information systems (PDF)

D.I. Good , Comput. Logic Inc., Austin, TX, USA
pp. 180-122

Developing secure systems: issues and solutions (PDF)

J. Freeman , Ford Aerosp. Corp., Colorado Springs, CO, USA
R. Neely , Ford Aerosp. Corp., Colorado Springs, CO, USA
L. Megalo , Ford Aerosp. Corp., Colorado Springs, CO, USA
pp. 183-190

A microprocessor design for multilevel security (PDF)

D.B. Clifton , Harris Semicond., Melbourne, FL, USA
pp. 194-198

UNIX Guardians: active user intervention in data protection (PDF)

G.I. Davida , Dept. of Electr. Eng. & Comput. Sci., Wisconsin Univ., Milwaukee, WI, USA
B.J. Matt , Dept. of Electr. Eng. & Comput. Sci., Wisconsin Univ., Milwaukee, WI, USA
pp. 199-204

Retrofitting and developing applications for a trusted computing base (PDF)

D. Gambel , Grumman Data Syst., McLean, VA, USA
S. Walter , Grumman Data Syst., McLean, VA, USA
pp. 212-215

Telling the goodguys: disseminating information on security holes (PDF)

C. Stoll , Harvard-Smithsonian Obs., Cambridge, MA, USA
pp. 216-218
102 ms
(Ver 3.3 (11022016))