Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/310889.310925acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free access

Discussion topic: what is the old security paradigm?

Published: 01 January 1998 Publication History
First page of PDF

References

[1]
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Vol. II, Deputy for Command and Management Systems HQ Electronic Division (AFSC), L. G. Hanscom Field, Bedford, Massachussetts 01730, October 1972. Available from the National Technical Information Service as report number AD-758- 206.
[2]
S. Augarten. Bit by Bit. Ticknor & Fields, New York, 1984.
[3]
G.D. Austrian. Herman Hollerith: Forgotten Giant off Information Processing. Columbia University Press, New York, New York, 1982.
[4]
D.E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD- TR-73-278, Volume III, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1974. Available from the National Technical Information Service as document number: AD 780 528.
[5]
D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report ESD-TR-73-278, Volume I, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1973. Available from the National Technical Information Service as document number: AD 770 768.
[6]
D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, Bedford, Massachusetts, October 1974.
[7]
D.E. Bell and L.J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March 1976. Available from the National Technical Information Service as report number: AD A023 588.
[8]
K.J Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Revison 1, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, April 1977. Available from the National Technical Information Service.
[9]
B. Blakley. The emperor's old armor. In Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, California, September 1996.
[10]
G. Burck. 'On Line' in 'Real Time'. Fortune, page 141, April 1964.
[11]
V. Bush. Pieces of the Action. William Morrow, New York, 1970.
[12]
S. Corriss, 1998. Retired commercial banker. Lecturer at American Management Association and the Federal Reserve Bank of New York. Personal communication with author.
[13]
D.E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236- 243, May 1976.
[14]
Department of Defense. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, Washington, D.C., December 1985.
[15]
R. Everett, editor. Special issue: SAGE (semiautomatic ground environment). Annals, 5, October 1983.
[16]
J.K. Gore. Apparatus for Sorting Cards and Compiling Statistics. U.S. Patent Office, Washington, D.C., April 1894. U.S. Patent No. 518,240.
[17]
S.J. Greenwald. A new security policy for distributed resource management and access control. In Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, California, September 1996.
[18]
M.H. Harrison and W.L. Ruzzo. Monotonic protection systems. In Foundations of Secure Computation, pages 337-365, New York, 1978. Academic Press. Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, Georgia, October, 1977.
[19]
M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
[20]
H. Hollerith. An electric tabulating system. 1889. In B. Randell, editor, The Origins of Digital Computers, New York, New York, 1982. Springer- Verlag.
[21]
H. H. Hosmer. The multipolicy paradigm for trusted systems. In Proceedings of the 1992 New Security Paradigms Workshop, Little Compton, Rhode Island, September 1992.
[22]
C.C. Hurd. Computer development at IBM. In J. Metropolis, N. Howlett and G. Rota, editors, A History of Computing in the Twentieth Century, pages 389-418, New York, New York, 1980. Academic Press.
[23]
Joint Security Commission. Redefining security. Technical report, U.S. Security Policy Board, Located somewhere in the bowels of the executive branch under the Assistant to the President, National Security Affairs, February 1994. Available at http://www.spb.gov/html/jscrpt.html.
[24]
D. Kahn. The Code-Breakers. Scribner, New York, New York, 1996.
[25]
B.W. Lampson. Protection. In Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, pages 437-443, Princeton, New Jersey, March 1971.
[26]
B.W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, October 1973.
[27]
C.E. Landwehr, C.L. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3):198-222, August 1984.
[28]
L.J. LaPadula and D.E. Bell. Secure computer systems: A mathematical model. Technical Report ESD-TR-73-278, Volume II, Electronic systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, Massachusetts, November 1974. Available from the National Technical Information Service as report number: AD 771 543.
[29]
J McLean. A comment on the "basic security theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, February 1985.
[30]
P.G. Neumann, L. Robinson, K. N. Levitt, R.S. Boyer, and A.R. Saxena. A provably secure operating system. Technical Report SRI Project 2581, Stanford Research Institute, Menlo Park, California, June 1975.
[31]
K.C. Redmond and T.M. Smith. Project Whirlwind: The History of the Pioneer Computer. Digital Press, Bedford, Massachussets, 1980.
[32]
R.R. Schell, P.J. Downey, and G.J. Popek. Preliminary notes on the design of secure military computer systems. Technical Report MCI-73-1, Electronic Systems Division, Air Force Systems Command, L.C. Hanscom Field, Bedford, Massachussetts, January 1973.
[33]
N. Stern. From ENIAC to UNIVAC: An Appraisal of the Eckert-Mauchly Computers. Digital Press, Bedford, Massachussets, 1981.
[34]
L.E. Truesdell. The Development of Punch Card Tabulation in the Bureau of the Census, 1890- 1940. U.S. Government Printing Office, Washington, D.C., 1965.
[35]
U.S. Department of the Army. Firing Tables for 155-ram. Gun, M1917, MlOlTA1, and MI918Ml: Firing Shell, H.E., MK.III. Department of the Army, Washington, D.C., 1933.
[36]
U.S. Department of War, Bureau of Public Relations. Five news releases on the development, operation, and application of ENIAC, February 1946. Available in the archives of the University of Pennsylvania.
[37]
W.H. Ware. SECURITY CONTROLS FOR COM- PUTER SYSTEMS (U) report of defense science board task force on computer security. Technical Report CONFIDENTIAL (declassified), The Rand Corporation for the Office of the Director of Defense Research and Engineering, Washington, D.C., February 1970.
[38]
M.E. Zurko, Associate Editor. Cipher. Newsletter 29, IEEE, October 1998. Available from htttp://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/oldissues/issue9810.

Cited By

View all
  • (2024)DiSPEL: A Framework for SoC Security Policy Synthesis and Distributed Enforcement2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545407(271-281)Online publication date: 6-May-2024
  • (2024)SoC Security Verification Using Fuzz, Penetration, and AI TestingHardware Security10.1007/978-3-031-58687-3_4(183-229)Online publication date: 3-Apr-2024
  • (2019)Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on PracticeIEEE Design & Test10.1109/MDAT.2019.294408636:6(10-38)Online publication date: Dec-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '98: Proceedings of the 1998 workshop on New security paradigms
January 1998
142 pages
ISBN:1581131682
DOI:10.1145/310889
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

NSPW98
Sponsor:
NSPW98: New Security Paradigms Workshop '98
September 22 - 26, 1998
Virginia, Charlottesville, USA

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)164
  • Downloads (Last 6 weeks)16
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)DiSPEL: A Framework for SoC Security Policy Synthesis and Distributed Enforcement2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545407(271-281)Online publication date: 6-May-2024
  • (2024)SoC Security Verification Using Fuzz, Penetration, and AI TestingHardware Security10.1007/978-3-031-58687-3_4(183-229)Online publication date: 3-Apr-2024
  • (2019)Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on PracticeIEEE Design & Test10.1109/MDAT.2019.294408636:6(10-38)Online publication date: Dec-2019
  • (2019)Is Backside the New Backdoor in Modern SoCs?: Invited Paper2019 IEEE International Test Conference (ITC)10.1109/ITC44170.2019.9000127(1-10)Online publication date: Nov-2019
  • (2018)System-on-chip security architecture and CAD framework for hardware patchProceedings of the 23rd Asia and South Pacific Design Automation Conference10.5555/3201607.3201774(733-738)Online publication date: 22-Jan-2018
  • (2018)Shifting ParadigmsProceedings of the New Security Paradigms Workshop10.1145/3285002.3285013(28-40)Online publication date: 28-Aug-2018
  • (2018)System-on-Chip Platform Security Assurance: Architecture and ValidationProceedings of the IEEE10.1109/JPROC.2017.2714641106:1(21-37)Online publication date: Jan-2018
  • (2018)System-on-chip security architecture and CAD framework for hardware patch2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASPDAC.2018.8297409(733-738)Online publication date: Jan-2018
  • (2017)System-on-chip security assurance for IoT devices: Cooperations and conflicts2017 IEEE Custom Integrated Circuits Conference (CICC)10.1109/CICC.2017.7993611(1-4)Online publication date: Apr-2017
  • (2017)Security Validation in Modern SoC DesignsFundamentals of IP and SoC Security10.1007/978-3-319-50057-7_2(9-27)Online publication date: 25-Jan-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media