• Corpus ID: 59784357

Secure Computing: The Secure Ada Target Approach

@inproceedings{Boebert1985SecureCT,
  title={Secure Computing: The Secure Ada Target Approach},
  author={William Earl Boebert and Richard Y. Kain and William D. Young},
  year={1985}
}
(75. Inventors: William E. Boebert, Minneapolis; Thomas R. Markham, Anoka; Robert A. Olmsted, Minnetonka, all of Minn. Secure Computing Corporation, Roseville, Minn. 21 Appl. No.: 870,556 73) Assignee: 1985-1988, Secure Computing Technology Corp., Arden Hills, Minn. "Secure Ada Target: Issues, System Design, and Verifi cation," W. E. Boebert et al., Proceedings of the Sympo sium on Security and Privacy, Oakland, Calif., Apr. 22-24, 1985. "Using Embedded COMSEC: An Integrator's View point,' by… 
Cost profile of a highly assured, secure operating system
The Logical Coprocessing Kernel (LOCK) began as a research project to stretch the state of the art in secure computing by trying to meet or even exceed the “A1” requirements of the Trusted Computer
A GUIDE TO UNDERSTANDING DISCRETIONARY ACCESS CONTROL IN TRUSTED SYSTEMS
TLDR
The guidelines defined in this document are intended to be used by computer hardware and software designers who are building systems with the intent of meeting the requirements of the DoD Directive 5215.1.
A further note on the confinement problem
  • W. E. Boebert, R. Kain
  • Computer Science
    1996 30th Annual International Carnahan Conference on Security Technology
  • 1996
TLDR
The authors demonstrate why the access control mechanisms of common operating systems do not constitute a confinement mechanism, and describe an alternative confinement mechanism called “type enforcement” that was invented by the authors in 1984 and subsequently implemented in several secure computers.
Verifiable Computer Security and Hardware: Issues
This report explores the influences of hardware on verifiable secure system design and envisions a mutually beneficial collaboration between the hardware verification and security communities.
LOCK trek: navigating uncharted space
TLDR
Two important design areas are examined: design verification and porting Unix System V to a LOCK host and the verification tools seem able to verify design only and not implementation.
LOCK : An Historical Perspective
TLDR
This hardware-based approach has brought the LOCK project into many uncharted areas in the design, verification, and evaluation of an integrated information security system.
LOCK: an historical perspective
  • O. Sami Saydjari
  • Computer Science
    18th Annual Computer Security Applications Conference, 2002. Proceedings.
  • 2002
TLDR
This hardware-based approach has brought the LOCK project into many uncharted areas in the design, verification, and evaluation of an integrated information security system.
Coding for a Believable Specification to Implementation Mapping
TLDR
It is argued that, while verification at the actual code level may be infeasible for large secure systems, it is possible to push the verification to a low level of abstraction and then map the specification in an intuitive manner to the source code.
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
TLDR
This paper examines the application of two covert channel analysis techniques to a high level design for a real system, the Honeywell Secure Ada® Target (SAT) and the nature of the covert channels discovered.
NCSC-TG-030 VERSION-1 NATIONAL COMPUTER SECURITY CENTER A GUIDE TO UNDERSTANDING COVERT CHANNEL ANALYSIS OF TRUSTED SYSTEMS
TLDR
This guide is written to help the vendor and evaluator communities understand the requirements for covert channel analysis as described in the Department of Defense Trusted Computer System Evaluation Criteria (TCSEC).
...
...