[Commodore] [Luxor] [New] [Search] [Home]

 

Ancient file library

Directory of /pub/misc/Early_Computer_Security_Papers/
..11-Dec-2006 07:57Parent directory
 
Overview.pdf07-Dec-2001 20:035826PDF document
Overview about The UC Davis Security Archives Project
Papers.pdf07-Dec-2001 20:0347584PDF document
Overview of the papers
README.txt07-Dec-2001 20:032504plain text
ande72a.pdf07-Dec-2001 20:041073867PDF document
Computer Security Technology Planning Study Volume I
by James P. Anderson
Published by Electronic Systems Division, Air Force Systems
Command, 1972.
ande72b.pdf07-Dec-2001 20:038082702PDF document
Computer Security Technology Planning Study Volume II
by James P. Anderson
Published by Electronic Systems Division, Air Force Systems
Command, 1972.
ande80.pdf19-Oct-1998 16:081580903PDF document
Computer Security Threat Monitoring and Surveillance
by James P. Anderson
Publised at 1980.
bell76.pdf19-Oct-1998 16:093083399PDF document
Secure Computer System: Unified Exposition and Multics
Interpretation
by David E. Bell and Leonard J. LaPadula
Published by Electronic Systems Division, Air Force Systems
Command, 1976.
bisb78.pdf19-Oct-1998 16:091338613PDF document
Protection Analysis: Final Report
by Richard Bisbey II and Dennis Hollingworth
Published by University of Southern California, 1978.
dod85.pdf19-Oct-1998 16:09433265PDF document
Trusted Computer System Evaluation Criteria
Published by Department of Defense, 1985.
ford78.pdf19-Oct-1998 16:09887530PDF document
Secure Minicomputer Operating System (KSOS) Executive Summary:
Phase I: Design of the Department of Defense Kernelized Secure
Operating System
Publised by Ford Aerospace and Communications Corporation, 1978.
karg74.pdf19-Oct-1998 16:105588076PDF document
Multics Security Evaluation, Volume II: Vulnerability Analysis
by Paul A. Karger and Roger R. Schell
Published by Electronic Systems Division, Air Force Systems
Command, 1974.
lind76.pdf19-Oct-1998 16:103506521PDF document
Operating System Structures to Support Security and Reliable
Software
by Theodore Linden
Published by National Bureau of Standards, Department of Commerce,
1976.
myer80.pdf19-Oct-1998 16:103731388PDF document
Subversion: The Neglected Aspect of Computer Security
by Philip A. Myers
Publised by Naval Postgraduate School, 1980.
neum75.pdf19-Oct-1998 16:1110592870PDF document
Provably Secure Operating System
by Peter G. Neumann, L. Robinson, Karl N. Levitt, R. S. Boyer, and
A. R. Saxena
Publised by Stanford Research Institute, 1975.
niba79.pdf19-Oct-1998 16:111589076PDF document
Proposed Technical Evaluation Criteria for Trusted Computer
Systems
by Grace H. Nibaldi
Publised by The MITRE Corporation, October 1979.
scha75.pdf19-Oct-1998 16:121751700PDF document
Jobstream Separator System Design
by J. M. Schacht
Publised by The MITRE Corporation, May 1975.
sche73.pdf19-Oct-1998 16:122890263PDF document
Preliminary Notes on the Design of Secure Military Computer Systems
by Roger R. Schell, Peter J. Downey, and Gerald J. Popek
Publised by The MITRE Corporation, January 1973.
schi75.pdf19-Oct-1998 16:125526973PDF document
The Design and Specification of a Security Kernel for the PDP-11/45
by W. L. Schiller
Publised by The MITRE Corporation, March 1975.
ware70.pdf07-Dec-2001 20:046933895PDF document
Security Controls for Computer Systems (U): Report of Defense
Science Board Task Force on Computer Security
by Willis H. Ware
Publised by The RAND Corporation, February 1970.
whit74.pdf19-Oct-1998 16:133468927PDF document
Design for Multics Security Enhancements
by Jerold Whitmore, Andre Bensoussan, Paul Green, Douglas Hunt,
Andrew Kobziar, and Jerry Stern
Published by Electronic Systems Division, Air Force Systems
Command, December 1973.

[Commodore] [Luxor] [New] [Search] [Home]