Initial Structured Specifications for an Uncompromisable Computer Security System

@inproceedings{Walter1975InitialSS,
  title={Initial Structured Specifications for an Uncompromisable Computer Security System},
  author={K. G. Walter and W. Ogden and J. Gilligan and D. D. Schaeffer and S. I. Schaen},
  year={1975}
}
Abstract : This report comprises a high level design for a Security Kernel of an operating system which is currently being investigated by the Air Force. This operating system will provide a sophisticated time-sharing mode of operation with a large shared-file environment to a user community comprised of individuals of various clearances. The specifications of the Security Kernel are developed through a series of successively more complex models which are used to specify the system in… 
9 Citations
Proving multilevel security of a system design
TLDR
Two nearly equivalent models of multilevel security are presented and the utility of the two models and their relationship to existing models is discussed and the proof of the security of one particular system design is illustrated.
Survey of recent operating systems research, designs and implementations
TLDR
This paper surveys the recent theoretical and experimental advancements in the operating systems area and makes extensive use of the results in the areas of graph theory, automata theory, operations research, computer architecture and software engineering.
The Lattice Security Model In A Public Computing Network
  • P. Karger
  • Computer Science, Business
    ACM Annual Conference
  • 1978
TLDR
The lattice security model is defined and shown to be useful in private sector applications of decentralized computer networks and the management of large security lattices is examined and solutions to the proliferation of categories problem are proposed.
The Birth and Death of the Orange Book
  • S. Lipner
  • Computer Science
    IEEE Annals of the History of Computing
  • 2015
This article traces the origins of US government-sponsored computer security research and the path that led from a focus on government-funded research and system development to a focus on the
Cybersecurity: from Engineering to Science |
for human purposes. In their quest for function and elegance, they draw on the knowledge of materials, forces, and relationships developed through scientiic study, but frequently their pursuit drives
Cybersecurity: from Engineering to Science |
for human purposes. In their quest for function and elegance, they draw on the knowledge of materials, forces, and relationships developed through scientific study, but frequently their pursuit
Cybersecurity : From Engineering to Science Extended
Engineers design and build artifacts bridges, sewers, cars, airplanes, circuits, software -for human purposes. In their quest for function and elegance, they draw on the knowledge of materials,
Computer Security Bibliography
TLDR
A categorized bibliography of published reports and papers on computer security is presented, highlighting the importance of knowing the sources of information on which to draw conclusions.
Stepwise Specification and Implementation of Abstract Data Types
The algebraic approach to specification and implementation of abstract data type in the sense of Goguen, Thatcher and Wagner is extended to study problems of stepwise specification and

References

SHOWING 1-10 OF 11 REFERENCES
The multics system: an examination of its structure
TLDR
The author builds a picture of the life of a process in coexistence with other processes, and suggests ways to model or construct subsystems that are far more complex than could be implemented using predecessor computer facilities.
Primitive Models for Computer Security
TLDR
This model is used to develop a model of security for computer systems which have directory structured file systems and is presented as a mathematical model which specifies the security constraints applicable toComputer systems which simultaneously handle data of different sensitivity levels.
Computer Security Technology Planning Study
TLDR
This document is intended to assist in the management of government procurement operations and will not be used for other purposes other than a definitely related government procurement operation.
Preliminary Notes on the Design of Secure Military Computer Systems.
Abstract : This document is a collection of working papers produced by the members of the Computer Security Branch, Directorate of Information Systems Technology, Deputy for Command and Management
A note on the confinement problem
TLDR
A set of examples attempts to stake out the boundaries of the problem by defining a program during its execution so that it cannot transmit information to any other program except its caller.
A Preliminary Specification of a Multics Security Kernel
  • The MITRE Corporation,
  • 1975
File Attributes and Their Relationship to Computer Security
  • ESD-TR-74-191, M.S. Thesis,
  • 1974
Modeling the Security Interface", C.W.R.U
  • Jennings Computing Center Report No. 1158,
  • 1974
Access Control Models, "ESD-TR-106
  • 1973
...
1
2
...