Advertisement

A Guide to Understanding Trusted Facility Management

  • US Department of Defense

Keywords

Security Policy Security Level Covert Channel Secure Operator Security Class 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Baldwin, R. W., “Rule-Based Analysis of Computer Security,” Technical Report MIT/LCS/TR-401, March 1988.Google Scholar
  2. 2.
    Bell, D. E., and L. J. LaPadula, “Secure Computer System: Unified Exposition and Multics Interpretation,” MITRE Corp., Rep. No. MTR-2997, 1976 (available as NTISAD-A023588).Google Scholar
  3. 3.
    Biba, K. J., “Integrity Considerations for Secure Computer Systems,” Mitre Corp., MTR-3153, Bedford, Mass., June 1975.Google Scholar
  4. 4.
    Bishop, M., “How to Write a Setuid Program”; login, vol. 12, no. 1, January/February 1987.Google Scholar
  5. 5.
    Bishop, M., “Managing Superuser Privileges under Unix,” Research Institute for Advanced Computer Science, Technical Report, NASA Ames Research Center, Moffet Field, Calif., (June 1986).Google Scholar
  6. 6.
    Clark, D. D., and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., April 1987.Google Scholar
  7. 7.
    Department of Defense, A Guide To Understanding Audit In Trusted Systems, NCSC-TG-001, version-2, 1 January 1988.Google Scholar
  8. 8.
    Department of Defense, A Guide To Understanding Design Documentation In Trusted Systems, NCSC-TG-007, version-1, October 1988.Google Scholar
  9. 9.
    Department of Defense, A Guide to Understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003, version-1, September 1987.Google Scholar
  10. 10.
    Department of Defense, Password Management Guideline, CSC-STD-002-85, April 1985.Google Scholar
  11. 11.
    Department of Defense, Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.Google Scholar
  12. 12.
    Gligor, V. D., C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, M. S. Hecht, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Design and Implementation of Secure Xenix,” IEEE Trans. on Software Engineering, vol. SE-13, No. 2, February 1986.Google Scholar
  13. 13.
    Gligor, V. D., J. C. Huskamp, S. R. Welke, C. J. Linn, and W. T. Mayfield, “Traditional Capability-Based Systems: An Analysis of their Ability to Meet the Trusted Computer Security Evaluation Criteria,” Institute for Defense Analysis, IDA Paper P-1935, February 1987Google Scholar
  14. 14.
    Hecht, M. S., M. E. Carson, C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, V. D. Gligor, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Unix Without the Superuser,” Proc. of the Usenix Conference, Phoenix, Arizona, June 1987.Google Scholar
  15. 15.
    Intel Corp., iAPX 286 Programmers Reference Manual, Chapter 7, section 5, Intel Corp., 1983.Google Scholar
  16. 16.
    Knowles, F., and S. Bunch, “A Least Privilege Mechanism for Unix,” Proc. of the 10th National Computer Security Conference, Baltimore, Maryland, September 1987.Google Scholar
  17. 17.
    Lee, T. M. P., “Using Mandatory Integrity to Enforce ‘Commercial’ Security,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., 1988.Google Scholar
  18. 18.
    Saltzer, J. H., and M. D. Schroeder, “The Protection and Control of Information Sharing in Computer Systems,” Proc. of the IEEE, vol. 63, no. 9, September 1975.Google Scholar
  19. 19.
    Schroeder, M. D. and J. H. Saltzer, “A Hardware Architecture for Implementing Protection Rings,” Communications of the ACM, vol. 15, no. 3, March 1972.Google Scholar
  20. 20.
    Thompson, K., “Reflections on Trusting Trust,” Turing Award Lecture, Communications of the ACM, vol. 27, no. 8, August 1984.Google Scholar

Copyright information

© National Computer Security Center 1985

Authors and Affiliations

  • US Department of Defense

There are no affiliations available

Personalised recommendations