Idea Transcript
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below).
Archived Publication Series/Number:
NIST Special Publication 800-1
Title:
Bibliography of Selected Computer Security Publications, January 1980 - October 1989
Publication Date(s):
December 1990
Withdrawal Date:
July 9, 2018
Withdrawal Note:
SP 800-1 is a bibliography of old, non-NIST-series publications. It is being withdrawn but remains available for historical reference.
Superseding Publication(s) The attached publication has been superseded by the following publication(s): Series/Number: Title: Author(s): Publication Date(s): URL/DOI:
Additional Information (if applicable) Contact:
Computer Security Division (Information Technology Laboratory)
Latest revision of the attached publication: Related information:
https://csrc.nist.gov/publications
Withdrawal announcement (link):
N/A
Date updated: :ƵůLJϵ͕ϮϬϭϴ
NIST
Special Publication 800-1
DEPARTMENT OF
U.S.
COMMERCE
National Institute of Standards
and Technology NAT
L
INST
OF STAND
4
l^l^j""' l
Bibliography of Selected Computer Security Publications January 1980October 1989
l
A111D3 MbEl^lb
Rein Turn
Lawrence E. Bassham
III
NIST
PUBLICATIONS
COMPUTER SECURITY
100 .U57
_
800-1
1990 C.2
NIST
Special Publication 800-1
Bibliography of Selected Computer Security Publications January 1980October 1989 Rein TUm, Compiler Rein Tlim Associates Pacific Palisades,
CA 90727
Lawrence E. Bassham
III,
Editor
COMPUTER SECURITY National Computer Systems Laboratory
National Institute of Standards
and Technology Gaithersburg,
MD
20899
December 1990
U.S.
DEPARTMENT OF COMMERCE
Robert A. Mosbacher, Secretary
NATIONAL INSTITUTE OF STANDARDS
AND TECHNOLOGY
John W. Lyons, Director
Reports on Computer Systems Technology
The National Institute of Standards and Technology (NIST) has a unique responsibility for computer systems technology within the Federal Government. NIST's National Computer Systems Laboratory (NCSL) develops standards and guidelines, provides technical assistance, and conducts research for computand related telecommunications systems to achieve more effective utilization of Federal information NCSL's responsibilities include development of technical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. NCSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 800 series reports NCSL research and guidelines to Federal agencies as well as to organizations in industry, government, and academia. ers
technology resources.
National Institute of Standards and Technology Special Publication 800-1 Natl. Inst. Stand. Technol. Spec. Publ. 800-1, 200 pages (Dec. 1990)
CODEN: NSPUE2
U.S.
For
sale
GOVERNMENT PRINTING OFFICE WASHINGTON:
1990
by the Superintendent of Documents, U.S. Government
Printing Office, Washington,
DC
20402
ABSTRACT This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals,
magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre- 1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography.
Key Words:
access
controls;
auditing;
computer management; trusted computing base.
communications
security;
computer crime;
security; confidentiality; cryptography; disaster recovery; integrity; privacy;
risk
iii
Contents Introduction
1
1.
General
1-1
2.
Management
2-1
3.
Foundations
3-1
4.
Access Control
4-1
5.
Trusted Systems
5-1
6.
Database Security
6-1
7.
Communication and Network Security
7-1
8.
Cryptography
8-1
9.
Privacy
9-1
10. Pre- 1980 Publications
10-1
A. Security Environment
10-1
B. Security Models and Database Security
10-3
C. Communications Security
10-10
D. Privacy
10-13
A-1
Appendix A: Periodicals Appendix B:
List of
Key Words
B-1
V
INTRODUCTION need for better dissemination of computer security information throughout government and industry, the National Institute of Standards and Technology (NIST) has produced this selected bibliography of key computer security literature published from January 1980 through October 1989. This bibHography was compiled by Rein Turn of Rein Turn Associates under contract to NIST. In recognition
of the
The bibliography
is
critical
organized into the following 10 sections and 2 appendices:
1.
General
2.
Management
Foundations 4. Access Control 5. Trusted Systems 6. Database Security 7. Communication and Network Security 8. Cryptography 9. Privacy 10. Pre- 1980 Publications Appendix A: Periodicals Appendix B: List of Key Words 3.
Citations in sections 1 through 9 are organized by subject matter; section 10 is a listing of pre- 1980 publications. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. EngHsh language articles from foreign journals were included as available.
The
individual citations have the following structure (an example
is
shown
at
the
right):
AAL-83
Identifier
Author
Aalders, J.C.H.
"Towards Standards in Computer Security," Proc. inP/Sec. '83 Stockholm, 1983, (2: FAK-83),
Title
Journal
title
(or publishing house)
.
Date and page (or location and year) Key words (two or three)
pp. 5-13.
Key Words:
Each
name
of the principal author's last is identified or listing by more meaningful) and the last two digits of the year of publication. A following the year serves to distinguish otherwise identical citation identifiers.
citation is uniquely identified
(or the publishing
organization
lowercase
is
letter
by the
guidelines, policy.
first letters
organization's acronym, if no author
1
Section numbers are used to distinguish identical citations identifiers from different sections and multiple citations from the same publication [e.g. (2: NBS-81) and (7: NBS-81)],
Appendix A contains a list of the periodicals from which citations in this bibliography have been taken. The list contains publisher and editor information where appropriate in order to assist the user of this bibliography to obtain more information about documents cited. Appendix B contains a
key words used in each of the 10 sections. This on a topic that spans more than one an example, information viruses section. As on can been found in each of the first three sections (General, Management, and Foundations).
list
will assist the reader
list
of
who would
all
the
like information
2
General
1.
This section cites general, mostly nontechnical publications on computer threats and vulnerabilities (including the hacker
and computer
viruses), the
need for computer security, and
other aspects of computer security.
ALA-86
AAL-83
ASS-81 "An Atlas of Terrorism,"
Alagar, V.S.
Aalders, J.C.H.
'Towards Standards in
"A Human Approach
Computer
Technological Challenges in
Security," Proc. IFIP/Sec. '83 Stockholm, .
1983.
FAK-83), pp. 5-13.
(2:
to the
&
Data Security," Computers Security
.
December 1986. pp.
Assets Protection March/April 1981, pp. 26-36. ,
Key Words:
crime, hackers.
328-335.
Key Words:
ATK-85
guidelines,
Key Words:
policy.
awareness,
Atkins,
AAL-85
Harvard Business Review
ALL-85
Aalders, J.C.H., I.S.
W.
"Jesse James at the Terminal,"
policy.
Herschberg, and
Allen, R.J.
A. Van Zanten
Handbook Security
,
for Information
"Data Security: Problems and Remedies," Today's Office
New
York,
1985.
Key Words:
Backwith, N. "Unique Approach
crime, threats,
Security
Key Words: book,
general,
APR-81 .
Key Words:
guidelines, policy.
BAI-84
Key Words: book,
crime.
Criminal Justice, Washington,
ARD-85
DC, 1984.
Ardis, P.M., and
Key Words: book,
crime,
Crime
Agranoff, M.H.
,
(5:
Key Words: legislation.
Key Words:
crime, policy,
&
IEE-84). pp. 180-
187.
crime, hackers,
BAI-87 Baird, B.J., L.L. Baird, and
international.
R.P. Ranauro,
1983. pp. 7-17.
ARN-83 awareness,
Privacy
6.
,
"Achieving Security Awareness: Tips and Techniques." Computer Security Journal Spring
"Attacks on Computers: Congressional Hearings and Pending Legislation," Proc.
US and UK," Computer Fraud & Security Bulletin August 1985. pp. 1Insurance in the
AGR-83
Bailey. D.
1984 IEEE Symp. on Sec.
R.M. Johnson "Electronic and
laws, policy.
guidelines.
&
January 1982, pp. 35-
Madison, WI, 1981
Report on Crime, American Bar Association. Section on
Key Words:
,
40.
Crime Investigation Manual
Assets Protection Publishing,
ABA-84
to Security
Evaluation," Computers
general, techniques.
policy, guidelines, techniques.
crime, hackers.
BAC-83
April 1985, pp. 26-27.
North-
Key Words:
,
Holland/Elsevier Science
Publishing Co.,
,
July/August 1985
Amell, A.
'The Moral Cracker?," Computers & Security
"On-Site Hazards, Off-Site
December 1987,
,
pp. 471-478.
Safety," Computerworld,
December
12, 1983, pp.
ID/13-24.
Key Words:
threats, physical.
1-1
Key Words:
crime, hackers.
BEA-84
BAI-89 Bainbridge, D.I.
"Hacking - The Unauthorized Access of Computer Systems: The Legal Implications," Modem
Law Review March .
BEE-84
Beane. W.F., E.R. Hilton, and B. Goldstein
Who
"Computer Security:
Is
Charge?" Security World October 1984, pp. 42-46.
in
1984, pp.
,
77-1-.
Key Words:
1989,
Key Words:
pp. 236-245.
Beebe, C.A. "Plarming for Access Control," Security Management, January
guidelines, policy.
general, policy.
BEL-87
Key Words:
crime, hackers,
legislation.
BAK-85
BEC-80
Belford, P.. and
Becker,
J.
"Rifkin
-
History,"
Baker, R.H.
Journal
The Computer Security Handbook TAB Books,
472-720.
,
.
A Documentary Computer/Laws
Summer
1980, pp.
Key Words:
crime.
Key Words: BEC-83
Key Words: book,
general,
policy, guidelines, techniques.
BAL-82 "Crime," Technology Review, April 1982, pp. 21-30.
Key Words:
crime, pohcy,
awareness,
hackers, threats, vulnerabilities.
Becker, L.G.
Computer Security: An Overview of National
BEQ-83 Bequai, A.
How
Concerns and Challenges Report No. 83-135 SPR, Congressional Research Service, U.S. Library of Congress, Washington, DC, February 3, 1983. ,
Ball. L.D.
Quann
Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 155-157.
Inc.,
Blue Ridge Summit, PA, 1985
J.
'The Hack Attack Increasing Computer System Awareness of Vulnerability Threats," AL\A 87-3093, Proc. 3d
to Prevent
Wiley
&
Crime
New
Sons.
,
J.
York,
1983.
Key Words: book,
crime,
guidelines, techniques.
legislation.
Key Words:
BAL-88 Ball.
BEQ-83a
crime, policy,
Bequai, A.
legislation.
"What Can Be Done to Stem The Rising Electronic Crime?," The Office November 1983,
M.
'To Catch a Thief," Security
Management March 1988. .
pp. 72-78.
BEC-83a Becker, H.B. Information Integrity
McGraw-Hill,
Key Words:
crime, hackers,
New
,
pp. 47-49.
,
York,
Key Words:
1983.
Key Words: book,
BAS-88
guidelines,
BEQ-84
policy, techniques.
Bequai. A.
Baskerville, R.
Designing Information Systems Security Wiley & Sons, Somerset, NJ, 1988 ,
BEC-85 Becker, L.G.
"Lack of Ethics as a Cause of Crime." Computers and People
Computer Abuse and Misuse:
May-June 1984, pp. 7-14.
An Key Words: book,
guidelines,
policy, techniques, general.
Assessment of State and
Federal Legislative Incentives Princeton, NJ, 1985.
Bauder, D.
Key Words:
"Electronic Fimds Transfer
legislation.
crime, policy,
Sec. Progr. (5:
vulnerabilities,
threats, pwlicy. guidelines.
crime, ethics.
BER-82 Bemhard, R. "Breaching System Security," IEEE Spectrum June 1982, ,
BEC-85a
Key Words:
Becker, L.G.
"Computer and Network
Key Words:
Key Words:
pp. 24-31.
Security," Proc. 7th Seminar,
DOD-84), 1984, pp. 188-194.
,
Defense Analysis,
Institute for
BAU-84
DoD Comp.
crime, policy,
guidelines.
guidelines.
Security Policy:
A
Challenge
to Organizations," Proc.
MP/Sec. (2:
'85 . Dublin. 1985.
GRI-85), pp. 241-250.
Key Words:
policy,
guidelines.
1-2
threats, crime.
,
BLO-85
BIG-81
BLO-82
Bigelow, R.P. (Ed.)
Computers
&
the
Laws
BloomBecker.
.
Commerce
Clearing House, Chicago. 1981.
Key Words: book,
crime,
"International Crime: Where Terrorism and Transborder Data Flow Meet." Computers & Security January 1982, pp.
Bigelow, R.P.
Computer Security
Journal,
crime, laws.
BLO-83
Bigelow, R.P.
,
and J.-O. Bruer "Office Information Systems and Security," Proc. IFIP/Sec. 'J3, Stockholm, 1983, (2: FAK-83), pp. 107-110. R..
guidelines,
.
107. guidelines,
Key Words: book,
crime, laws.
BLO-85b J.J.
Introduction to Crime National .
BLO-83a Bloom, R. "Computers Don't Commit Crime, People Do," Data
Management
Key Words:
Computer-Crime Data, CaUfomia State University, Los Angeles, CA. 1985.
Bloombecker.
policy.
"The Security Officer's Role in Legal Protection of Software," Computer Security Journal Winter 1982, pp. 99-
BLO-85a
Reporter National Center for
Blom.
Key Words:
BIG-81b
awareness, ethics.
Bloombecker, J. Computer-Crime Laws
vs.
Winter 1982, pp. 131-136.
Key Words:
crime, hackers,
international.
McLaughlin, or Why the Criminal Sometimes Goes Free,"
Report, Oct./Nov. 1985, pp. 367-370.
Key Words:
Key Words:
BIG-81a
Bloombecker, J. "Computer Security for the People," Transnational Data
.
41-53.
guidelines, laws.
"The Queen
J.
Center for Crime Data, Los Angeles, CA, September 1985.
Key Words: book,
crime, laws.
July 1983, p.
,
BLO-86
14.
Bloombecker, J.J. Crime, Computer Security
policy.
Key Words:
crime.
BLA-84
,
Computer Ethics National Center for Crime Data, Los Angeles, CA, February 1986. ,
Blakney. S. "Crime," Computerworld.
December
26, 1983, p.
57-I-.
BLO-83b BloomBecker, J. "Crime - Corporate Coimcel's View," Crime Digest March ,
Key Words:
crime, threats.
BLA-88
1983, pp. 7-10.
Key Words:
crime, laws.
"A Manufacturer's Approach Computer
BloomBecker.
J.
"International Crime:
'88
Growing Threat,"
AustraUa, 1989. (2: CAE-89). pp. 187-195. .
A
Laws Bolsters Computer Security Efforts," Computerworld, October 27, 1986, p. 53-66.
Key Words:
crime, laws.
awareness,
guidelines, policy, techniques.
Key Words:
crime, threats,
BLO-80 BLO-84
Bloom, R. "Catching the Computer Crook," Infosystems July 1980. pp. 30-35. .
Bloombecker,
J.
"Introduction to Crime," Proc. IFIP/Sec. '84 Toronto, 1984, .
(2:
BLO-86b Bloombecker, J.J. "Lobbying for Protection," Computerworld, August 4,
international.
guidelines.
J.J.
Federal
Transnational Data Report,
June 1983. pp. 219-230.
Key Words:
BLO-86a
"New
BLO-83C
Systems," Proc. IFIP/Sec.
Key Words:
book, crime,
Bloombecker,
Blatchford, C. to the Security of
Key Words:
ethivcs, policy.
1986, pp. 55-62.
Key Words:
crime, awareness.
FIN-85), pp. 423-430.
BLO-86C
crime,
Key Words:
crime, general.
Bloombecker, J.J. "Defense of Crime Cases,"
American Jurisprudence
Trials ,
Vol. 33. 1986. pp. 1-197.
Key Words:
1-3
crime, laws.
BOL-86
BLO-88
Management
July 1988, pp.
.
BRO-83
Bologna,
Bloombecker, J.J. "Captain Midnight and the Space Hackers," Security 76-82.
J.
"Computer Related Crime: The Who, What, Where, When, Why and How, I," Data ProcessinE & Communications Security Winter 1986. pp. 19-23. .
Key Words:
crime, hackers.
Bloombecker,
Key Words:
crime, general.
J.J.
'Trends in Computer Abuse/Misuse," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 611-614.
BOL-86a
crime, laws.
Browne. M.W. "Locking Out The Hackers."
Novonber 1983.
"Computer Related Crime:
The Who, What, Where, When. Why and How, U,"
BLO-89a
Key Words: awareness. hackCTs. crime.
BUI-84 Buikema,
C.
et al.
"Security Regulation:
Bloombecker,
Commitment
J.J.
Key Words:
(Ed.)
crime, general.
1989.
BOR-85
State-
pp. 39-48.
Borking, J.J. Third Party Protection of Software and Firmware,
North-Holland PubUshing Co.
crime,
Amsterdam, 1985.
policy, general.
Key Words: book,
BOL-81
software
White-Collar Crime Causation," Proc. Comp. Sec. & Priv. Symp. 1981 (1: HON-81), pp. 57-67. ,
BOS-82 Bosworth, B., Codes, Ciphers and Computers: An Introduction to
Book
Co., Rochelle Park, NJ,
1982.
guidelines.
Cases
Piracy
in the Courts,"
&
Security
May
,
1984, pp. 123-134.
Information Security , Hayden crime, threats,
crime, laws.
BUM-84
Computers
privacy.
J.
Key Words:
Bump, M. Jr. "A Primer on Software
"The 8 -Factor Theory of
Key Words:
A
by-State Update." Security
Management, January 1984.
to Security ,
National Center for Computer Crime Data, Santa Cruz, CA,
Key Words: book,
pp.
30-40.
J.
Spring 1986. pp. 25-30.
Bologna,
Key Words:
Discover.
Bologna,
Data Processing & Communications Security .
crime, threats,
laws, guidelines.
Criminal Laws Journal . Apml 1983, pp. 68-89.
BRO-83a
Key Words:
BLO-89
Brown, R.A. "Crime and Computers,"
Key Words: awareness,
laws,
software piracy.
BUR-88 Burger, R.
Computer Viruses: A HighTech Disease Abacus. Grand .
Key Words: book,
BOL-81 a Bologna, J. Crime: Wave of the Future Assets Protection Publishing, Madison, WI, 1981.
awareness,
general.
Key Words: computer
,
Key Words: book,
crime.
B0L-81b Bologna,
J.
"MOMM's:
A
BOT-86
viruses,
threats, general.
Bottom, N.R., Jr., et al. "About the Security Degree: Are We Losing It (A Discussion)," Journal of Security Administration , June 1986, pp. 7-20.
BUS-81 "Computer-Crime
- The
Spreading Danga to Business," Business Week, April 20, 1981, pp. 86-91.
Taxonomy of
Computer-Related Employee
Key Words:
general, policy.
Theft," Assets Protection ,
May/June 1981, pp. 33-36. crime, threats.
Key Words: guidelines.
BRE-86 Breton, T., and D. Beneich
Key Words:
Rapids. MI. 1988.
Softwars, Holt, Rinehart,
Winston,
New
York, 1986.
Key Words: book,
1-4
awareness.
crime, threats,
CAM-88
BUS-84
CHO-84
Buss, M.DJ., and
Campbell, D.
L^.
"Computer
Salemo
"Common Sense and Computer Security," Harvard Business Review March,
Destruction," Security
Choney, L.B. "Software Escrow and the Security Practioner," Computer
Management
Security Journal
Sites:
Targets for
July 1988, pp.
.
56-60.
,
Summer
1984, pp. 65-74.
April 1984, pp. 112-121.
Key Words:
Key Words:
guidelines, policy, general.
BUS-88 "Is
threats, physical.
Your Computer Secure?,"
Business Week, August
1,
CAN-86
policy, guidelines.
CJJ-88
Canning, R. "Information Security and Privacy," EDP Analyzer February 1986, pp. 1-16. ,
1988, pp. 64-70.
Key Words: Key Words:
Key Words:
awareness,
awareness,
"Crime
Statutes:
Are They
Bridging the Gap Between Laws and Technology?," Criminal Justice Journal , Fall/Winter 1988, pp. 203-233.
awareness,
Key Words:
general.
crime, laws.
computer crime, policy.
CU-80
CAR-80
BYN-85
"Crime, Part
Carroll, JJ^.
Bynum, T.W.
(Ed.)
Computer
"Ethics for the
"Computers & Ethics," Metaphilosophy October
Age," Proc. Comp. Sec. & Priv. Symp. 1980 (1: HON-
1985.
80), pp. 17-25.
,
Key Words: book,
ethics.
1,"
Computer/Laws Journal Spring ,
1980.
,
Key Words:
Key Words:
crime, ethics.
crime, laws.
CU-80a "Crime, Part 2,"
CAR-81
CAE-89 Caelli,
W.J. (Ed.)
Computer/Laws Journal
JM.
Carroll,
Computer Security
in the
Age
Summer
"Decriminalization of
of Information, Proceedings. IFIP/Sec '88 .
Computer Crime,"
Gold Coast, Queensland,
1981
Australia,
May
Comp.
&
Sec.
(1:
Proc.
Priv.
HON-81), pp. 61-68.
Key Words: Crime,
policy.
Amsterdam/New York, 1989. proceedings,
Gates.
Processing
Calhoun, G. "Deterring Crimes,"
Telephony April ,
4,
A
Review of Data Communications
Security
,
&
Spring 1986, pp. 19-
Key Words:
crime, laws,
crime, laws.
CLY-89
crime, laws.
Techniques,"
Computer
CHA-85 Chamoux,
techniques.
Fall
"Crime Investigation
1983, pp.
Key Words:
Key Words:
,
Clyde, R.
21.
45+.
"Misappropriation of Computer The Need to Enforce
Services:
1983, pp. 401-420.
State Statutes,"
CAL-83
CU-83
Computer/Laws Journal
H.W.
"Crime Laws:
general.
crime, laws.
Civil LiabiUty,"
CAT-86 Key Words:
Key Words:
Symp.
1988, North-
HoUand/Elsevier,
,
1980.
COM-SAC:
Security, Auditing
and Control No. ,
1,
1989, pp.
1-7.
J. P.
"Data Security and
CAM-87Campbell, M.
Confidentiality in Europe,
"Security and Privacy: Issues
of Professional Ethics," Proc. 10th Nad. (5:
Comp.
Computers & Security September 1985. pp. 207-210.
333.
crime, techniques.
COA-83 Coates, J.F.
Sec. Conf.
NCS-87a), 1987, pp. 326-
Key Words:
,
Key Words:
crime, threats,
laws, international.
"The Future of Data Security: Thoughts and Proposals,"
Computer Security Journal
Key Words:
,
Spring 1983, pp. 77-84
awareness,
ethics.
Key Words: general.
1-5
awareness, policy,
CON-84a
COL-82
CON-86a
Colvin. B.D.
S. 1920.
'Training Crime
Computer Crime Act
EDPACS
Investigators,"
March 1982, pp.
Key Words:
,
6-11.
crime, policy,
guidelines.
Computer Fraud and Abuse Act of 1986 Public Laws 99-
Small Business ,
.
Hearings before the Senate Committee on Small Business,
474, U.S. Congress,
March
1986.
1984, U.S.
7.
Congress. Govenunent Printing Office. Washington. DC. 1984.
Washington, DC, October 16,
Key Words: Congress, legislation.
COM-83 Crime Needs
International
Countermeasures: Proceedings of London Conference , June 1983, Elsevier International Bulletins, Oxford, England, 1983.
Key Words: Congress,
CON-87 Computer Secigity Act of
legislation.
1987 Hearings Before Subcommittee on ,
CON-84b The
Counterfeit Access Device and Computer Security Act of 1984 P.L. 98-473).
proceedings,
Key Words: Congress, legislation.
DC,
U.S. Congress. 1984.
techniques, international, policy.
Materials of the Committee on
Science and Technology, House of Representatives, U.S. Congresss, Government Printing Office, Washington,
.
Key Words:
Transportation, Aviation and
1987.
CON-80 CON-85
The Government Classification of Private
Ideas
,
House Report No. 96-
Key Words: Congress,
Federal Government Computer Security
,
legislation.
Hearings before
CON-87a
Subcommittee on
1540. U.S. Congress, Washington, DC, December
Transportation, Aviation and
Computer Security Act of
22, 1980.
Materials of the Committee
Key Words: Congress,
on Science and Technology, House of Representatives,
1987 Hearings before Subcommittee on Legislation and National Security of the Committee on Govenunent
policy,
May
government.
1985, U.S. Congresss,
Government
CON-83
Printing Office,
Washington, DC, 1985.
Computer Security in the Federal Government and the Private Sector
,
Hearings
,
Operations,
House of
Representatives, U.S.
Congresss, Government
Key Words: Congress,
Printing Office, Washington,
government, policy,
DC, 1987.
threats.
before Subcommittee on
Oversight of Government Management, Senate Committe on Government Operations, U.S. Congesss,
Government
Printing Office,
Washington, DC, 1983.
Key Words:
Congress, threats, laws, government.
CON-84 Computer and Communications Security and Privacy
,
CON-85a
Key Words:
Computer Security Research and Training Act of 1985 Hearings before Subcommittee on Legislation and National Security of the Committee on Government Operations, House of Representatives, U.S. Congress, Govenmient
Congress,
legislation.
,
CON-87b Computer Security Act of 1987 Part
,
Report No. 100-153,
1,
of the Committee on
Science, Space and
Printing Office, Washington,
Technology, House of Representatives, U.S.
DC, 1985.
Congresss, Government Printing Office, Washington,
Key Words:
Congress, poUcy.
DC, June
11, 1987.
Hearings,
Subcommittee on Transportation, Aviation and Materials,
Committee on
Science and Technology, House of Representatives,
Government
Printing Office,
Washington, DC, 1984.
CON-86
,
the Judiciary, U.S. Congress,
Gocemment
legislation.
Printing Office,
Washington, DC, September 3,
Key Words:
Key Words: Congress,
Computer Fraud and Abuse Act of 1986: Report on S.2201 Senate Committee on
1986.
Congress,
Key Words: Congress, legislation.
1-6
legislation.
COT-84
CON-87C
CSC-88 and B.D. Weiss
Computer Security Act of 1987 Report No. 100-153, Part 2, of the Committee on
Cottrell, P.,
Govemmait
of Computer Error,"
.
House of
Operations,
Representatives,
U.S. Congresss, Government
'Third-Party Liability
.
Insurance: Protection in Case
Computerworld, April 1984, pp. ID1-ID7.
October 1988.
2,
Key Words:
Printing Office, Washington,
DC, June
Key Words:
11, 1987.
Key Words:
Courtney, R.H.,
CSI-83 "Making the Case
Jr.
'The Democratization of White Collar Crime,"
CON-89
guidelines,
government.
policy, laws.
COU-81
Congress,
legislatioiL
Glossary of Computer Security Terms NCSC-TG-004. National Computer Security Center. Ft. Meade, MD, 21
for
Computer Security." Special Section by Computer Security
Implementation of the
Computer Security Journal
Computer Security Act,
Spring 1981, pp. 39-44.
Datamation September 1983.
Subcommittee on
Key Words:
Key Words:
Transportation, Aviation and
awareness.
Institute,
,
.
Hearings before crime, laws,
awareness,
general, poHcy, guidelines.
Materials of the Committee
on Science and Technology, House of Representatives on September 22, 1988, U.S. Congresss, Government
COU-84 Courmey, R.H., Jr. "Computer Security Goals of the
DoD-Another Opinion,"
Printing Office, Washington,
Computer Security
DC, 1989.
Summer
Key Words:
Congress, policy,
Journal,
.
1984, pp. 60-62.
Key Words:
1984.
Key Words:
policy,
government
laws.
COO-84
Courtney,
CSI-85 "Computer Security: Issues and Answers," Special Section by
R.J., Jr.
"Computer Security: The
Menace Office .
is
awareness,
general, poUcy, guidelines.
COU-84a
Cooper, C. "The Real Cost of Software Piracy," Information Age (UK), April 1984, pp. 98-
CSI-84 "Computer Security: Issues and Answers," Special Section by Computer Security Institute. Datamation September 1,
Human
Error,"
March 1984,
The
pp. 119.
Computer Security
Institute.
Datamation September .
15,
1985.
102.
Key Words: Key Words:
threats, policy.
Key Words:
software piracy.
COU-87
COO-89 Cook, WJ. "Access to the Access Codes '88-'89:
A
Prosecutor's
National
Comp. Sec.Conf.
Courmey, R.H., Jr. "Computer Data Security: A Leadership Vacuum," Computer Security Journal ,
Prospective," Proc. 12th (5:
Responsibilities." Special
Section by Computer Security
16.
Institute, 1.
Key Words: hacking, policy,
CSI-86 "Computer Security: Issues and
Vol. IV, No. 2, 1987, pp. 7-
NCS-89), 1989, pp. 619-623.
Key Words:
awareness,
general, policy, guidelines.
Datamation October .
1986.
awareness,
Key Words:
policy.
laws.
awareness,
general, policy, guidelines.
COU-89a
COR-87
Courtney, R.H.
ResponsibiUty for Data
Crime Heinemann
Management March 1989,
Professional Publishing,
83-86.
,
CSI-89 "Computer Security: Issues and Trends." Special Section by
Jr.
"Proper Assignment of
Cornwall, H. Computer Fraud, Industrial Espionage, & Information
Computer Security
Security," Security ,
pp.
Institute.
Datamation September .
15,
1989.
London, 1987.
Key Words: Key Words: book,
crime.
policy,
Key Words:
awareness,
general, poHcy, guidelines.
guidelines.
1-7
CWO-83
DEM-83
"Crime in Japan," Computerworld, November
7,
End
1983, pp. ID/7-20.
Key Words:
DEN-89
DeMaio. H.B. "Computer Security and
User," Proc. IFEP/Sec.
J3, Stockholm, 1983, FAK-83), pp.
crime,
Denning, PJ. the
(2:
1-4.
"The Internet Worm," American Scientist. March/April 1989, pp. 126128.
international.
Key Words:
CWO-84
awareness,
policy.
Key Words: threats, hackers, computer viruses.
"Protecting the Corporate
Information Resource: Special
DEM-88
DER-88
Report," Computerworld,
DeMaio, H.B.
October 29, 1984, pp. SR/1-
"Iriformation Ethics
32.
Doesn't
Come
Vol. V, No.
policy,
guidelines.
It
Naturally,"
Computer Security
Key Words:
Derosier,
~
1,
Journal.
1988. pp. 7-
J.
"Computer Security Proc.
MP/Sec.
at Digital,"
'88 . Australia.
1989. (2: CAE-89). pp. 163165.
19.
Key Words:
CWO-85
Key Words:
awareness, ethics.
awareness,
general.
"System Security: Protecting
DEM-89
Corporate Information Assets,"
Computerworld
November
DEW-84
DeMaio, H.B.
,
25, 1985, p. 55ff.
"Viruses
A
-
Management
Computers & Security. August 1989. pp. 381-388.
Threats to Computer
Key Words: computer
American June 1984, pp. 14-
Issue,"
Key Words:
policy,
Viruses,
Worms, and Other
Memories," Scientific
guidelines.
DAV-85
viruses,
policy.
Davis, G.F.G.
.
23.
ffl
Software Protection: Practical and Legal Steps to Protect and Market Computer Programs Van Nostrand Reinhold, New York, 1985. ,
DEM-89a
Key Words: book,
software
Key Words: computer
DeMaio, HJ8. "Information Ethics, 12th Natl.
Comp.
A
Sec. Conf.
NCS-89), 1989, pp. 630-
633.
piracy, general, laws.
Key Words: DEA-83
Security Bibliographies
Wheaton,
,
MD,
GPD
Dewdriey. A.K. "Of Worms, Viruses and Core Wars," Scientific American. March 1989, pp. 110-113.
Key Words: computer
"Data Security, Special Issue," Data Management, July 1983.
Denning, D.E.,
Neumann, and
February 1983.
D.B. Parker "Social Aspects of Computer
Key Words:
Key Words:
Security," Proc. 10th Natl.
guidelines, techniques.
awareness,
Comp.
general.
Sec. Conf. (5:
DEL-88 Haskins & Sells, October 1988.
,
Deloitte,
New
York,
Key Words:
general,
NCS-
87a), 1987, pp. 320-325.
Computer Viruses
viruses.
DMA-83
DEN-87 P.G.
DEW-89
awareness, ethics,
policy.
DeAnnuntis, G. A Bibliography of Computer
viruses,
general.
Practical Approach," Proc.
(5:
Press,
Dewdney. A.K. "A Core War Bestiary of
awareness,
general.
DOJ-80 Crime: Legislative Resource Manual Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, 1980. ,
DEN-88 Key Words: book, computer
Denning,
viruses, guidelines,
"Computer Viruses," American Scientist, May/June 1988, pp.
techniques.
Key Words:
P.J.
236-238.
Key Words: computer guidelines.
1-8
viruses,
crime,
government, guidelines, laws.
ERM-89
ELM-88
DOJ-80a Crime: Expert Witness Manual Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, ,
Ebner-DeWitt, P. "Invasion of the Data Snatchers," Time September ,
28, 1988, pp. 62-67.
Erman, M.D., M.B. Williams, and C. Gutierrez Computer Ethics and Society Oxford University Press, New ,
York, 1989.
1980.
Key Words: Key Words:
hackers, threats.
Key Words:
crime,
guidelines, government, laws.
EWI-88
Eloff, J.H.P.
DOJ-82 Crime: Electronic Funds Transfer Systems and Crime U.S. Department of Justice, Bureau of Justice Statistics, Washington, DC, 1982.
"Computer Security Policy: Important Issues," Computers ,
&
Security
December 1988,
,
pp. 559-562.
Key Words:
Ewing, D. "Meeting Data Security Needs," Proc. IFIP/Sec. '88 AustraUa, 1989, pp. 291-302.
(2:
Key Words:
awareness,
f)olicy.
crime,
government, laws, guidelines.
EMM-84
FAK-88
Emmet, A.
DOJ-82a Crime: Computer Security Techniques U.S. Department of Justice, Bureau of Justice Statistics, Washington, DC, ,
Fak, V.
'Thwarting the Data Thief," Personal Computing January 1984, pp. 98-105. ,
"Are
We
Vulnerable
Attack," Computers
to
&
Security, April 1988, pp. 151-
hackers, threats.
Key Words: computer EPN-85 crime, laws,
EIS-89
Epner, S.A.
,
Eisenberg, T., et
al.
"The Cornell Commission: On Morris and the Worm," Communications of the ACM June 1989, pp. 706-
viruses,
threats.
"Computer Security: Plenty of Questions But No Easy Answers," The Office March 1985, pp. 74-76.
techniques.
Virus
155.
Key Words:
1982.
Key Words:
,
CAE-89),
awareness,
policy.
Key Words:
ethics, policy.
ELO-88
FAU-81 Faurer, L.D.
"Keeping the Secrets Secret,"
Govenunent Data Systems
,
Nov./Dec. 1981. pp. 14-17.
Key Words: awareness, Key Words: awareness,
policy.
policy,
government, guidelines.
.
EPP-80
709.
FAU-83
Epperly, E.V.
Key Words:
hackers, laws,
computer viruses.
"Trends in DoD Directives: Survey of Federal Computer Proceedings, U.S.
"Information Protection in Federal and Private Sectors,"
Security Policies,"
EKE-85
Faurer, L.D.
Army 3d
Computer Security Journal
,
Fall/Winter 1983, pp. 89-95.
"Security of Electronic
Automation Security Conference Williamsburg,
Transactions," Proc. IFIP/Sec.
VA, December
Key Words:
Ekebrink,
I.
J5, Dublin, 1985,
(2:
,
GRI-
1980,
International Business
85). pp. 233-239.
Services, Inc., pp. 31-44.
Key Words:
Key Words:
general, threats,
FAU-84 policy,
Faurer, L.D.
"Computer Security Goals of Department of Defense," Computer Security Journal
government.
guidelines.
policy,
government.
the
ELB-89
ERI-83
El-Haghdadi, M., and M.P. Singh "The Pivotal Role of
Computer Security," Security Management, July 1989, pp.
,
Summer
Eriksson, A. "Vulnerability in a
Computerized Society," Proc. IFIP/Sec. '83 Stockhohn, 1983, (2: FAK-83), pp. 27-30. ,
63.
Key Words: awareness,
Key Words:
awareness,
1984, pp. 54-59.
threats.
general.
1-9
Key Words: government.
policy,
GEM-80
FOR-89
FEN-88 Fennelly, L.J.
Forcht, K.A.
Handbook of Loss Prevention and Crime Prevention
"Ethical
Gemigniani, M. "Crime: Laws in the '80," Indiana Laws Review. April 1980, pp. 681-723.
Use of Computers,"
Butterworlh Publishers, Stoneham, MA, 1988.
Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 624-626.
Key Words:
Key Words:
Key Words: general,
crime, laws.
awareness, ethics.
GEM-81
guidelines, techniques.
FRE-84 Freed, R.N.
Gemignani, M.C. Laws and the Computer CBI
Fifield, K.J.
"Security Interests in the
Publishing, Boston, 1981.
"Smartcards Outsmart
Computer Age:
Computer Crime," Computers
Advice
FIF-89
&
Security
May
,
1989, pp.
247-255.
,
Practical
Key Words:
Secured Lender," Banking Laws
Journal
to the
July/Aug. 1984, pp.
,
GEM-89 Gemignani, M. "Viruses and Criminal Laws," Communications of the ACM, June 1988, pp. 669-671.
404-429.
Key Words:
crime,
Key Words:
techniques.
crime, laws.
awareness,
guidelines.
Fn'-84
"Crime
Freese,
in Australia,"
EDPACS
,
Key Words: computer
FRE-84a
Fitzgerald, K.J.
August 1984, pp.
"What About Your Legal When Your Data
GLR-83
1-7.
Parachute
Key Words:
Security Crashes?," Proc. inP/Sec. '84 Toronto, 1984,
crime, general,
international.
FIN-85), pp. 23-28.
Key Words:
Frr-86
"Larceny Enters the Electronic Age: The Problem of Detecting and Preventing Crimes," Gonzaga Laws Review 1982/83, pp. 517-538.
,
(2:
viruses,
threats, laws.
J.
awareness, laws.
,
Fitzgerald, K.J.
Automated Computer Control
"Security in the Office,"
Quarterly
,
Summer
1986, pp.
21-24.
Key Words:
Key Words:
FUL-84 "Computer Abuse: The Emerging Crime and Need for Legislation," Fordham Urban
Laws Journal 73-101.
policy,
,
GOL-81
Goldstein, B. Pocket Guide to Computer Crime Investigation Assets Protection Publishing, Madison,
A
1983/84, pp.
,
WI, 1981.
guidelines.
Key Words:
crime, laws.
Key Words:
FIT-89 Fites, P., P.
Johnson and
M. Kratz The Computer Virus
Co.,
York, 1989
Remain Highly Vulnerable
Goldstein, B.
Fraudulent, Wasteful, Abusive
and threats,
GOL-83
to
Illegal Practices ,
"Crime and Its Prevention," Computers & Security January
MSAD-
82-50, U.S. General
Key Words: book, computer viruses.
crime, laws.
GAO-82 Federal Information Systems
Crisis ,
Van Nostrand Reinhold
New
crime, laws.
,
-
1983, pp. 63-66.
Accounting Office, Washington, DC, 21 April
Key Words:
1982.
guidelines, policy.
crime, laws,
FOR-82 Fordyce, S.
"Computer Security:
A
Key Words:
crime, threats,
government, general.
Gonzales, P. "Addressing Crime
Current Assessment,"
Computers
&
Security ,
GON-83
GAR-89
Legislation,"
January 1982, pp. 9-16.
Gardner, P.E.
Journal
195-206.
Key Words: awareness,
"The Internet Worm: What Was Said and When," Computers & Security June
general.
,
1989, pp. 291-296.
Key Words: computer
1-10
viruses.
,
Computer/Laws
Summer
Key Words:
1983, pp.
crime, laws.
GUY-81
GOS-85
HAR-83
Gosler, J.R.
Guynes,
"Software Protection: Myth or Reality," Proc. Crypto '85
"Software Security: Legal Aspects and Traditional Considerations," Journal of
Santa Barbara, 1985,
.
(9:
WIL-86), pp. 140-157.
Key Words:
Hartson, D.R.
S.
Systems Management, April
'Teaching Protection in Computing: A ResearchOriented Graduate Course," Computers & Security
1981, pp. 34-38.
November
Key Words:
Key Words:
,
1983, pp. 248-255.
software piracy.
awarenss, laws.
GOU-85
awareness,
general.
Goussy, A.R. "Legal Issues in Proprietary Secxirity," Journal of Security Administ. . December 1985,
GUY-83 Guynes. V. "EFTS Impact on Computer Security," Computers & Security , January 1983, pp. 73-77.
pp. 23-29.
Key Words:
GRA-84
awareness,
"Education and Training of
Computer Security Staff: Methodology and Course Stockholm, 1983, pp. 287-292.
policy.
Graham, R.L. 'The Legal Protection of Computer Software," Communications of the ,
Harari, A.
Topics," Proc. IFIP/Sec. '83
policy, laws.
Key Words:
ACM May
HAR-83a
HAF-88
Key Words:
Hafner, K.M., et "Is
1984. pp. 422-
awareness,
Your Computer Secure,"
Business Week, August
1,
HAR-85 Harry,
M.
The Computer Undeground
Key Words:
software piracy.
Key Words:
HAM-84
Greenlee, M.B. "Financial (Banking)
Computer Seminar, Progr. (5:
View of
Security," Proc. 5th
DoD Comp.
Sec
.
DOD-82), 1982,
Key Words: book,
Hammond, R.G. "Theft of Information,"
Laws Quarterly Review
The ,
April
1984. pp. 252-264.
HEL-88 Helfant, R., and
McLoughlin Computer Viruses: Technical Overview and Policy
G.J.
Key Words: Key Words: awareness,
crime, laws,
threats.
Considerations
policy.
HAN-89 GRE-84 Greguras, P.M.
'Technical and Other Practical Software Protection
Measures," TeleSystems Journal, March/April 1984, pp. 28-32. policy,
,
CRS
Report
to
No. 88-556 SPR, Congressional Research Service, Washington, DC, the Congress,
Hankinson, A.L. "Computer Assurance: Security, Safety and Economics," Proc. COMPASS '89: Comp. Assurance (2: IEE-89), 1989, pp. 1-7.
Key Words:
general,
December
15, 1988.
Key Words: computer
viruses,
policy.
HEL-89 Helsing,
guidelines.
C, M. Swanson, and
M.A. Todd
techniques.
HAR-82 GRE-84a
Harris, B.
Greguras, P.M.
"Software Protection: Beyond
"Data Security: Plan for the Worst," Infosystems , June
Copyright," Computerworld,
1982, pp. 52-58.
Dec. 12, 1983, pp. ID25ID32.
Key Words:
Executive Guide to the Protection of Information Resources , SP 500-169, National Institute of Standards
and Technology, Gaithersburg, October 1989.
MD,
awareness,
general, policy.
Key Words:
hackers,
threats.
pp. 167-176.
Key Words:
,
Loompanics Unlimited, Port Townsend, WA, 1985.
awareness,
general.
GRE-82
.
FAK-83),
general.
al.
1988, pp. 64-72.
426.
(2:
Key Words: government.
software piracy.
1-11
guidelines, policy,
HHS-83
HEL-89a
C, M. Swanson, and M.A. Todd Management Guide to the
Computer Related Fraud and Abuse in Government
Protection of Information
Helsing,
Agencies Office of the .
Resources SP 500-170,
Inspector General, U.S. Dept. of Health and Human
National Institute of
Services, Washington,
Standards and Technology,
1983.
.
MD,
Gaithersburg,
October
1989.
Key Words:
crime,
Helsing,
C, M. Swanson, Todd
government,
threats.
Computer User's Guide
Holman. W.D. "Remedies Available
"Information Security as a
Victims of Crimes," Proc.
Resources SP 500-171, National Institute of Standards and Technology, Gaithersburg, MD, October
89), 1989, pp. 553-557.
,
Sec. Conf. (5:
NCS-
awareness,
guidelines.
Highland, H.J.
guidelines,
"What
techniques.
Key Words:
crime, jwlicy.
Computer Security and Privacy Symposium Proceedings Honeywell Information Systems, Phoenix, AZ, April 1980.
EDPACS
.
July 1989,
pp. 11-17.
Key Words:
proceedings,
general.
and
R. Paans
Key Words: computer
"The Programmer's Threat Cases and Causes," Proc.
threats.
viruses,
HON-81 Computer Security and Privacy
Symposium Proceedings,
'84 , Toronto, 1984,
FIN-85), pp. 409-422.
Key Words:
.
Computer Virus
If a
Strikes,"
HER-84
(2:
& Priv. Symp. HON-80), pp. 77-86.
Sec.
(1:
.
HIG-89a
MP/Sec.
1980
HON-80
Key Words:
1989.
I.S.,
Comp.
HJL-84
Honeywell Information
"Legislative Issues in Crime,"
Harvard Journal on Legislation Winter 1984, pp.
threats, crime.
Systems, Phoenix, AZ, April 1981
,
Key Words:
239-254.
HER-87
proceedings,
general.
Key Words:
Herschberg, I.S. "Hackers' Comfort,"
Computers
&
Security
,
crime, legislation.
HOR-85
HOF-82
April
Horgan, J. "Thwarting the Information
1987, pp. 133-138.
Hoffman,
"Impacts of Information
Thieves,"
Key Words:
crime, hackers.
System Vulnerabilities on Society," Proceedings, 1982 National Computer
1985, pp. 30-41.
I.S.
Conference AFIPS Press, Reston, VA, 1982, pp. 461-
HER-88 Herschberg,
"Make
to
Scientists," Proc. 12th Natl.
to
Comp.
Herschberg,
awareness, threats,
Higgins, J.C.
the Protection of Information
Key Words:
.
September 1986, pp. 211-217.
HOL-80
Topic for Undergraduate Education for ComputCT
MA.
"Societal Vulnerability to
Computer System Failures," Computers & Security
vulnerabiUties
HIG-89
HEL-89b
Hoffman, K.J., and L.M. Moran
Key Words:
Key Words: guidelines,
policy.
and
DC,
HOF-86
the Tigers
You," Computers
L.J.
,
Hunt
&
for
Security
,
467.
Key Words: crime, hackers.
Key Words:
.
July
crime, threats,
laws.
HOW-82 Howe, C.L.
April 1988, pp. 197-203.
Key Words:
IEEE Spectrum
awareness,
"Coping with Computer Criminals," Datamation
threats.
,
January 1982, pp. 118-126.
Key Words: guidelines.
1-12
crime, laws,
IRM-84
HUB-86 Huband,
F.L.,
and
Data
R.D. Shelton
Computer
Protection of
JON-88
"Information Security and
Systems and Software Laws & Business, Inc., Clifton, NJ, ,
Jones, L.G.
Integrity. Special Issue,"
Media Hype?," The EDP
Management (UK), March
Auditor Journal Vol.
,
3,
Key Words: computer Key Words:
Key Words:
book, general,
awareness,
KAN-89 Israel,
Kane, P. H.
V.I.R.U.S.: Vital Information
Hunt, D.B., and
"Computer Viruses: Myth or
F.G. Tompkins
Reality?, Proc. 10th Natl.
"Protecting Sensitive Systems and Data in an Open Agency," AIAA 97-3092, Proc. 3d Aerospace Comp.
Comp.
Sec. Conf. (5: IEE-87b),
threats, awareness, guidelines.
Sec. Conf. (5:
NCS-
viruses,
Interest in
the Private Sector," Proc.
IBM-83
Seminar,
Report on the Data Security Leaders' Conference San ,
April 1982,
IBM
NY,
1983.
DoD Comp.
Progr. (5:
2nd
proceedings,
pp. El-ElO.
&
Security
,
May
1984, pp. 117-122.
Key Words:
awareness, threats,
guidelines, techniques.
Key Words:
awareness,
KAY-86 Kay, R. "Computer Security
JAS-83
general, guidelines,
Jaslow,
techniques.
"How
M.D.
Information Sources," Computer Security Journal Vol. 4, No. 1, 1986, pp. 29,
to Fight
Fraud,"
IBM-86
Computers
Sec.
DOD-80a), 1980,
policy.
Key Words:
I.
"Industrial Espionage,"
"Computer Security
Plains,
virus, threats,
awareness, guidelines.
Kaperonis,
Jacks, E.L.
policy,
White
1989.
KAP-84
guidelines.
CA,
,
Key Words:
Key Words: computer
JAC-80
Corp.,
Resources Under Siege Bantam Books, New York,
87a), 1987, pp. 226-230.
1987, pp. 158ff.
Key Words:
viruses,
general.
ISR-87
HUN-87
1988.
awareness, threats.
policy, guidelines, techniques.
Computer
EDPACS
,
July 1983,
40.
pp. 6-9.
Key Words:
Security, Auditability,
Systems Control Publications Bibliography G320-9279-1, ,
IBM
,
or
1984.
1986.
Jose,
"Computer Viruses: Threat
Information Resource
Key Words:
crime, poUcy,
guidelines.
KAY-86a
Corp., White Plains,
NY. May
JOH-85
1986.
Kay, R. (Ed.) "Data Security Scoreboard,"
Johnson, D.G.
Key Words: awareness,
Computer Ethics PrenticeHall, Englewood Chffs, NJ,
Computer Security Journal Vol. 4, No. 1, 1986, pp. 41-
1985
54.
,
general.
awareness,
general.
,
ING-80
Key Words:
Ingraham, D.G. "On Charging Crime,"
Computer/Laws Journal
awareness, ethics.
Key Words:
awareness,
general. ,
KEL-88
Spring 1980, pp. 429-456.
D.W. "A Guide to Cost-Effective PC
Kelley,
Key Words:
crime, laws,
Security," Security
guidelines.
Management October 1988, ,
pp. 55-58.
Key Words: PC.
1-13
guidelines, policy,
KRA-88a
KEN-85 Kenny, J.J.P. Data Privacy and Security
Pergamon
Kratz, ,
Infotech, Oxford,
KUR-82 M.
"Industrial
Kurzban. S.A.
Theft of Information," Proc. IFIP/Sec. '88
1985.
.
Australia, 1989,
CAE-89), pp. 279-289.
(2:
Key Words: book,
"A
Espionage and
general,
policy, guidelines, techniques.
Selective. Slightly
Armotated Bibliogr^hy on Works on Data Security and Privacy." Computers & Security January 1982, pp. 57.
Key Words:
crime, threats,
64.
laws.
Key Words:
KIR-81 Kirchner,
KRI-80
J.
"Vulnerability:
Confront
WiU
the U.S.
Flaws?," Computerworld
December
Krieger,
M.M.
KUR-86
"Current and Proposed
Systems'
Its
,
28, 1981, pp. 36-
32.
awareness,
general.
Computer Crime Legislation," Computer/Law Journal
Kurzban, S.A.
Summer
Not So Appealing After All," Computers & Society Winter
,
1980, pp. 721-771.
"Careers in Computer Misuse
-
-
,
Key Words:
vulnerabilities,
awareness, threats.
Key Words:
crime, threats,
1986, pp. 7-9.
laws.
Key Words:
KRU-86
KIR-83 Kirby,
M.D.
Krull, A.
"Computer Crime and Law Reform in Australia," Information
general, crime,
threats.
Age (UK),
'Ten Losing Strategies for Data Security," Computer Security Joumal Vol. 4, No. ,
October 1983. pp. 241-247.
1,
Key Words:
Key Words:
crime, laws,
LAN-85 Landreth, B. (with H. Rheingold)
Out of
1986, pp. 21-28.
the Inner Circle . Microsoft Press, Bellevue,
WA.
awareness,
1985
general, policy, guidelines.
policy, international.
Key Words: book,
KUO-87
KLI-80 Kling, R.
"Computer Abuse and Computer Crime as Organizational Activities,"
Computer/Law Journal
,
Spring 1980, pp. 403-427.
hackers,
general. vulnerabiUties.
Kuong, J.F. "Computer Disasters and Corporate Amnesia and Corporate Paralysis," CPR-J: Contingency Planning & Recovery Joumal No. 4, ,
LAS-81 Lasden,
M.
"Computer Crime," Computer Decisions
,
June 1981, pp. 104-
124.
1987, pp. 1-4.
Key Words:
Key Words:
crime, threats,
Key Words: Awareness,
policy.
awareness, crime,
threats, general.
threats, vulnerabilities, policy.
KNA-83 Knapp,
LAU-88
KUO-88
T.J.
Laureson, A.
Upper Management," Data
Kuong, J.F. "Computer Viruses ~ Are
Management
They
"Selling Data Security to
,
July 1983, pp.
a Threat to Business
22-25.
Continuity?," CPR-J:
Key Words:
Contingency Planning Recovery Joumal No
policy,
KRA-88 Kratz,
.
53-55.
& 2,
1988,
pp. 5-7.
guidelines.
Key Words:
guidelines,
PC,
policy.
Key Words:
M.
"Keeping Your PCs Where They Belong." Security Management, July. 1988, pp.
viruses, threats,
awareness, policy.
LEE-86 Lee, J.A.N., G. Segal, and
"Computer Crime Legislation in Canada" Proc. IFIP/Sec.
R. Steier
'88 . Austraha, 1989, (2:
Report on an Panel on Hacking," Communications of
"Positive Altematives:
ACM
CAE-89). pp. 101-118.
the
Key Words:
ACM
,
AprU 1986,
A pp.
297-299.
crime,
international, legislation.
Key Words: policy.
1-14
hackers, general,
MAR-88
LOU-84
LEH-82 Lehman, R.L.
Louwerse, CP., and
'Tracking Potential Security Violations," Security Audit
J.M.L. Kouwenberg* "Data Protection Aspects in an Integrated Hospital Information System,"
&
Control Review Winter 1981/82. pp. 26-39. ,
Key Words:
policy,
Computers
&
November
1984, pp. 286-294.
Security
Marx, P. "The Legal Risks of Using Information as a Competetive Weapon," Software Law Journal
Key Words:
guidelines.
Key Words: LOB-81
general,
awareness,
general, policy, laws.
guidelines, policy, techniques.
Lobel
MAX-85
J.
"The Foreign Corrupt Practices Act Applied
LYN-83 to
Maxfield,
Lyndon, K.
Information Systems," Proc.
"A New
Comp.
-
&
Sec.
Priv.
Symposiimi, Phoenix, AZ, 1981 (1: HON-81). pp. 69-
Policy in Protection
-
Computer Crime Insured,"
Security World, January 1983,
J.F.
"Computer Bulletin Boards and the Hacker Problem,"
EDPACS
October 1985, pp.
,
1-11.
pp. 38-40.
Key Words:
78.
Key Words:
Key Words:
Lobel
MAY-85
MAD-88
LOB -83 J.
Mayo, K.
Madsen, C. "The World Meganetwork and
Pirates,"
Terrorism," Proc. IFIP/Sec.
Systems February 1985, pp.
'The State-of-the-Art In
'88
Computer Security," Computers & Security
89), pp. 343-349.
November
,
Australia, 1989, (2:
CAE-
Key Words:
MAN-84 Mantle, R.A.
LOB -86
'Trade Secret and Copyright
Computer
Protection of
J.
"Impact of Technology on
Software," Computer/Law
Computer
Journal, Spring 1984, pp. 669-
Security,"
Information Age, (U.K.) April 1986, pp. 77-80.
M. Shain
&
Computer
Security:
Dictionary of Standards and
Terms Stockton ,
Press,
viruses,
McAfee, ID. "Managing the Virus Threat,"
Marbach, W.D., et al. "Beware: Hackers at Play,"
Newsweek
Computerworld, February
13,
1989, pp. 89-96.
Sept. 5, 1983, p.
,
Key Words:
5-1-.
Key Words: awareness, hackers, crime, threats.
viruses, threats.
MCI-81 Mclsaac, D. "Introduction to Computers:
book, guidelines,
laws, general, policy.
York, 1989.
New
York, 1987
Key Words:
New
MCA-89a
MAR-83 Longley, D., and
,
Press,
software piracy,
techniques.
LON-87
Data Diddlers, Killer Programs, and Other Threats to Your System St. Martin's
threats, vulnerabilities.
laws.
general,
MCA-89
Key Words: book,
694.
Key Words:
Key Words:
software piracy.
McAfee, J., and C. Haynes Computer Viruses, Worms,
awareness,
techniques.
Lobel
,
60-65.
awareness,
policy, threats, intemational.
Key Words:
"Business Battles In-House Business Computer
Key Words:
,
1983, pp. 218-222.
hackers, threats.
general, policy.
legislation,
policy.
Data
Spring 1988, pp. 185-
,
201.
,
MAR-84
Security Problems and
Martin, W.P. "Arresting Interface
Considerations," Assets
Computer Crime,"
Age
,
(U.K.)
Protection
,
November/December 1981,
February 1984, pp. 71-75
13-22.
Key Words:
Key Words:
crime, laws,
threats, guidelines.
1-15
awareness,
general, threats, policy.
pp.
MOU-82
MCL-88
NEU-86
W.
McLeod. K.
Moulton, R.T.
Neugent,
"Computer
"A
"Preposterous Opinions About
Insecurity,"
Age
Information
,
(U.K.),
April 1988. pp. 89-93.
Key Words:
Strategy for Dealing with
Computer Fraud and Abuse," Computer Security Journal,
Computer
Winter 1982, pp. 31-40.
Summer
Audit
&
Security," Security,
Control Review, 1986, pp. 1-8.
awareness,
general, crime, threats.
Key Words:
Key Words:
crime, threats,
policy, guidelines.
awareness,
general.
MIL-85 MiUard, C.J. Legal Protection of Computer Programs and Data, Carswell Co., Ltd, Toronto. 1985.
MUR-86
NOR-83
"Aspects of Hacker Crime:
Norman, A.R.D. Computer Insecurity Chajwnan
High-Technology Tomfoolery
and Hall, London. 1983.
Murphy,
I.
or Theft?," Information
Key Words:
software piracy,
Age
.
,
(U.K.) April 1986, pp. 69-73.
Key Words: MIS-85
awareness,
crime, policy,
NOR-84
laws, hackers, threats.
Miskiewicz.
"DP
Key Words: book, general, threats.
laws.
J.
Security:
A
Delicate
Balance," Computer
Decisions
,
April 23, 1985,
pp. 104ff.
Norman, A. "Crime by Computer,"
MUR-86a Murray, W.H. "Security Concepts and the New Computer Economics,"
Computer Security Journal Vol. 4, No. 1, 1986, pp. 7-14.
Information Resources
Management (UK) March .
1984, pp. 18-21.
,
Key Words:
awareness,
Key Words:
crime, threats,
general, policy.
general, policy.
Key Words:
general, poUcy.
NYE-81
MOS-88 Mosaccio,
MYE-83
J.
"Computer
the Threat," Security
Myers, J. "Fraud and Computers."
Management
Law
Sites:
Assessing
July 1988, pp.
,
40-51.
Key Words:
vulnerabilities,
New
January 21, 1983, pp. 71-72. Journal
Key Words:
,
crime, threats,
Nye, J.M. "A Primer on Security, Part " Mini-Micro Systems June 1, ,
1981, pp. 139-148.
Key Words:
awareness,
general.
laws.
threats, general.
NYE-81a
MOU-81
NAF-80
Moulton, R.T. "System Security Standards,"
Computer Security
Journal.
Spring 1981, pp. 73-82.
Key Words:
Naftalis, G.P.
White Collar Crimes American Law Institute and American Bar Association, Philadelphia, PA, 1980. .
.
1981, pp. 166-174.
Key Words:
awareness,
general.
general,
Key Words:
guidelines.
Nye. J.M. "A Primer on Security. Part 2. " Mini-Micro Systems July
book, crime,
OLI-85
general.
M0U-81a
OUver. C.R.
Moulton, R.T.
Than Government Data
"Prevention: Better Protection,"
NBS-80 Guidelines for Security of Computer Applications FTPS ,
Systems Nov ./Dec. 1981, pp.
PUB
20-23.
Standards, Gaithersburg,
,
73, National
Bureau of
MD,
June 1980.
Key Words:
Security Journal
Key Words:
general,
guidelines, techniques, policy.
1-16
,
Winter 1985,
pp. 51-56.
Key Words:
awareness,
general, guidelines, policy.
"A Psychological Approach to Abuse A Case History," Computer Preventing Computer
crime, threats,
laws, guidelines, policy.
OMB-85
PAR-83a
Management of Federal
OMB
RIC-84
Parker, D.B.
Richards, T.C.
"How Much Computer Abuse
"A Computer Fraud
Information Resources Circular No. A- 130, Office of Management and Budget,
Is
There?" Computer Security Journal , Spring 1983. pp. 85-
ACM
Washington, DC, December
89.
1984, pp. 17-23.
,
Security Audit
Control Review
Survey,"
&
Spring-Sum.
,
1985.
Key Words:
Key Words: government,
Key Words: awareness, computer crime, general,
crime, general,
awareness.
threats,
policy.
threats.
PAR-84
OTA-81
RIC-86
Parker, D.B.
Computer-Based National
"A
Information Systems:
Program
Technology and Public Policy Issues Office of Technology Assessm.ent, Washington, DC, September 1981.
Hacking," Computer Security
,
Journal
,
TTieft
Guynes "A Strategic Plan for Reducing Consumer Anxiety About
and System
J.L.
Siunmer 1984, pp.
EFTS
21-32.
Security," Security,
&
Control Review Spring 1986, pp. 4-8.
Audit
Key Words:
Key Words: government,
Richards, R.M., and
Strategy for Preventing
hackers, crime,
,
threats, policy, guidelines.
Key Words:
policy, guidelines, laws.
awareness, policy.
PAR-84a
OTA-86
RIC-86a
Parker, D.B.. and
Nycum
Intellectual Property Rights in
S.H.
an Age of Electronics and
"Computer Crime," Communications of the
Information.
OTA-CIT-302,
R.M. Computer Risks," Computers & Security Richards,
ACM
"Insuring
,
,
U.S. Congress, Office of
April 1984, pp. 313-315.
September 1986, pp. 207-210.
Technology Assessment, Washington, DC, April 1986
Key Words:
Key Words:
crime, threats,
policy, guidelines.
general, awareness, guidelines.
Key Words: government,
RIC-86b
PER-84
policy, legislation.
Richards, T.C.
"A Historical Perspective of Computer Related Fraud,"
Perry, T.. and P. Wallich
"Can Computer Crime Be Stopped?," IEEE Spectrum
PAR-80 Parker, D.B.
"Computer Abuse Research Update," Computer/Law Journal
329-352.
Security, Audit
,
&
Control
Review Summer 1986, pp. 15-
1984, pp. 34-49.
,
25.
Key Words:
Spring 1980, pp.
,
May
crime, policy,
Key Words:
laws.
crime, threats,
awareness, general.
Key Words:
crime, threats,
PAR-81 Parker, D.B. Ethical Conflicts in
Computer
Science and Technology
AFIPS
Press, Reslon,
POD-86
ROB-88
Podell, H.G.. and
policy, awareness, laws.
M.W. Abrams
Roberts, R.
"Computer Security Glossary for the Advanced Practitioner." Computer Security Journal Vol. 4, No.
Computer Viruses Compute! Books, Greensboro, NC, 1988
.
,
VA.
1,
1986. pp. 69-88
,
Key Words: book,
viruses,
threats.
1981.
Key Words:
Key Words:
general, policy,
ROB-88a
guidelines,
Roberts.
general.
MMI
REB-86 PAR-83
Reber,
Parker, D.B.
Fighting
W.
"Remember
ethics.
Computer Crime
Charles Scribner's Sons, York, 1983.
Key Words:
,
New
crime, generd,
policy, guidelines, laws.
J.
to
Lock
the Door:
and the Hacker."
Information Age (U.K.), July 1988, pp. 146-150. ,
"The Essence of Industrial Espionage," Data Processing & Communications Security Winter 1986. pp. 24-25.
,
Key Words:
awareness,
general, threats, laws.
1-17
Key Words:
hackers,
awareness, threats, guidelines.
SCH-84a
ROS-85 Ross. SJ. (Ed.) "Computer Security Issues:
A
Roundtable," Computer Security Journal
,
SEI-84
Scherer, M.E.
Computer Security Journal
Winter
1985. pp. 39-50
Summer
Key Words:
Key Words:
awareness,
policy.
R.A. "Contingency Planning in the
Seif,
"Unsafe Software — The Missing Security Perspective," ,
1984, pp. 43-52.
Banking Community," Computers & Security
Key Words:
awareness,
,
February 1984, pp. 29-34. awareness, policy.
threats.
SER-83
SAM-85
SCH-85
Samociuk, M. "Hacking or the Art of Armchair Espionage," Computer Fraud and Security Bulletin
,
"Industrial Espionage,"
Schweitzer,
Security Worid, April 1983, pp. 33-39.
A.
"A Management View: Computer Security as a Discretionary Decision,"
&
Computers
July 1985.
J.
Security
,
hacking, crime,
Sewell. C.
Key Words: SAT-89
crime, threats.
SEW-84
1985, pp. 13-22.
Key Words:
Key Words:
March
"Screening Out The People Problem." Security World
policy,
guidelines.
.
Sato, O.
October 1984. pp. 50-52.
"Controlling End-User Computing: An Analytical Framework," ACM Security, Audit and Control Review ,
Fall 1989, pp. 6-12.
SCH-86
Key Words:
J. A.
Schweitzer,
"Who Owns
Security?" Security, Audit & Control Review Spring 1986, ,
pp. 1-3.
Key Words:
policy, guidelines.
Information
SEY-85 Seymour.
J.
"Lx)cking
Up Your
Information
Assets," Today's Office
policy,
Key Words:
guidelines.
awareness,
,
April
1985, p. 23ff.
general.
Key Words:
SCH-80
policy, guidelines.
SCH-86a
Schulte, L.A.
"Computer Crime
Schweitzer, J.A.
Bibliography," Computer/Law
Computer Crime and Business
Sieber, U.
Information
The International Handbook on Computer Crime: ComputerRelated Economic Crime and
Journal
,
Sununer 1980, pp.
,
787-803.
York, 1986
Key Words: awareness,
Key Words:
Elsevier,
SIE-87
New
crime, threats.
general, crime, guidelines.
SEC-86
"Safeguarding EFTS,"
Datamation February 1983,
60.
Schwartz, M.B.
.
,
Sons, Somerset,
Key Words:
crime, threats,
general, international.
SIL-83
pp. 148-160.
Key Words:
crime, poUcy.
SEC-89 "10
SCH-84 Schmucker K.J. "Computer Crime: Fiction and Science Fact," Abacus Spring 1984, pp. 8-21.
Silverman, M.E. "Selling Security to Senior
policy,
guidelines, techniques.
Key Words:
&
Wiley
NJ. 1987
"How Business Battles Crime by Computer." Security World October 1986, pp. 54-
SCH-83
Key Words:
the Infringements of Privacy , J.
,
Top
Security
Management, DP Persoimel and Users," Computer Security
Trends, "Security, February 1989, pp. 47-51.
Journal
Key Words:
Key Words:
policy,
,
FallAVinter 1983, pp.
7-18.
awareness,
general, poHcy, guidelines.
techniques.
awareness,
crime.
1-18
TUR-86
STA-85
SIL-85 Silverman, M.E. "Strategic Planning
~ The
Missing Link in Computer Security"
Stanley, P.M.
Turn, R.
"Educating Computer Crime
"Security and Privacy Requirements in Computing," Proc. ACM/IEEE Fall Joint Computer Conference November 1986, pp. 1106-
Investigators," Proc. IHF/Sec.
Computer Security
GRI-
;85, Dublin, 1985, (2:
Journal. Winter 1985, pp. 31-
85), pp. 313-322.
,
38.
Key Words: Key Words:
crime, guidelines.
1113.
policy,
Key Words:
STA-86
guidelines.
D.W. "Computer Abuse and
policy, guidelines.
Straub,
SIM-81 Simkin, M.C. "Computer Crime: Lessons
Security:
and
Security, Audit
TUR-86a
Update of an
Turn, R.
Empirical Pilot Study,"
The CPA Journal December 1981, pp. E)irections,"
&
"Security, Privacy, Safety
Control
Review Spring 1986, pp. 21-
,
,
10-14.
Software Design Methods
31.
Key Words:
NATO ASDI
Key Words:
crime, threats,
crime, guidelines,
techniques.
policy.
SMA-84 Computer
Straub, D.W., and
Crime," Security Managment January 1984, pp. 19-34.
.
crime, poUcy,
"Uncovering and Disciplining Organizational Responses and
Age
,
(U.K.), July 1988, pp. 151-
SMI-83
VAN-84 Van Hoboken, W.R.C. "The Burglar's Viewpoint," Computers & Security ,
November
1984, pp. 295-302.
156.
Key Words:
Smith, T.H.
"Computers and the
Law
of
Evidence," Transnational Data
December 1983,
Report,
Key Words:
VAN-85
threats, guidelines.
van Tongeren, H.
TUR-82
"Information Security in the
Turn, R.
Key Words:
crime, policy,
"Private Sector
Needs
for
Trusted/Secure Computer
laws.
Sokolik, S.L.
National Computer
Conference AFIPS Press, Reston. VA, 1982, pp. 449-
Key Words:
460.
international.
,
"Computer Crime
— The
for Deterrent
Legislation,"
Journal
,
333-383.
Key Words:
policy,
crime,
"The Investigation, Prosecution and Prevention of Computer
TUR-85 Tumer, B.M. 'Tenorist Attacks
STA-84 N.
"Designs for Computer Security," Security World,
March 1984,
Upon
Technological Systems," Journal of Security Administration December 1984, pp. 25-32.
Crime: A State of the Art Review," Computer/Law Journal , Spring 1980, pp. 385402.
,
Key Words: policy, laws.
pp. 52-55.
Key Words:
Key Words:
VOL-80 Volgyes, M.R.
guidelines.
legislation.
Staikos,
policy, guidelines,
Computer/Law
Spring 1980, pp.
Key Words:
Framework of the International Information Flow Debate: A Business View," Proc. MP/Sec'85 (2: GRI-85), pp. 323-328.
Systems," Proceedings, 1982
SOK-90
crime, threats.
crime, policy,
pp.
451-454.
Need
policy, guidelines,
W.D. Nance
Options," Information
techniques.
,
Volume
techniques.
Computer Abuse:
Key Words:
Series
F22, Springer- Verlag, New York, 1986, pp. 653-679.
Key Words:
STR-88
"Controlling
andResiliency in Computing," J. Skwirzynski (Ed.),
in
crime, threats.
policy,
guidelines, techniques.
1-19
crime, guidelines,
WEB-85a
VOL-83
WON-84
Volkman, T.C. "Computers — America's
Webster, W.H.
Achilles' Heel," Air
Industrial Espionage,
University Review 1983. pp. 43-47.
,
May-June
&
"Computer-Related Fraud in EDPACS. June
the U.K.,"
Computer Crime: The FBI's Computer Security
1984. pp. 5-9.
Activities,"
Journal
Key Words:
Wong. K.
'Technology Transfer,
vulnerabilities,
Winter 1985, pp. 7-
,
Key Words: awaraiess.
12.
crime,
international.
threats.
Key Words:
WAR-83
WON-85
crime,
government, guidelines,
Ware, W.H. "Computer Security Standards for Government and Industry:
Wong. K.K.
policy.
"Computer Disaster
WEI-82
Where Will They Come From?," Computer Security
Weiss, E.A. "Self-Assessment Procedure
Journal. Spring 1983, pp. 71-
With Ethics in Computing," Communications of the ACM March 1982. pp.
76.
E)ealing
,
Key Words:
guidelines, government.
awareness, ethics.
WAR-84
WOO-82
NCC
England. 1982.
"Information Systems
Weinberger, F.
Security and Privacy,"
"Computer Security: Plan for Action," TeleSystems Journal
Communications of the ,
April 1984, pp. 315-
Keyword: awareness, general. ,
Key Words:
awareness,
Yngstrom, L.
Key Words:
"Experiences from a One- Year Academic Programme in
awareness,
policy, guidelines.
Security Informatics." Proc. IFIP/Sec. '88 . Australia, 1989.
general.
WEL-86
WAR-88
(2:
WeUer.
Ware. W.H.
on Trusted
"Perspectives
Computer Systems," IFIP/Sec. '88 (2:
,
Proc.
Wall "Source Code Under Lock and Key," Computerworld June 2, 1986. p. 69. and
R..
awareness,
general, techniques.
Keyword: awareness, general.
,
YOS-85 Yost, G.
Key Words:
guidelines,
Spy-Tech. Fact On File Pub., York, 1985.
New
techniques.
Key Words:
CAE-89). pp. 83-86.
S.
Australia,
CAE-89), pp. 309-
YNG-88
March/April 1984. pp. 11-21.
312.
WON-83
Key Words:
Wong, K.
awaroiess,
general.
"Computer-Related Fraud,"
WEB-85 Webster,
Information
W.H.
'Technology Transfer, Industrial Espionage and Computer Crime: The Problems We Are Facing,"
Computer Crime
Digest,
January 1985. pp. 1-5.
Key Words:
Age (UK)
,
January 1983, pp. 16+
crime,
guidelines, policy, techniques.
YOU-82 Yourdan, E. Silent Witness Yourdan Press, New York. 1982. .
Key Words:
awareness,
general, crime, threats,
Key Words: awareness,
WON-83a
general.
Wong, K. "Computer-Related Fraud in Age. (U.K.) October 1983, pp. 238-240. the U.K.," Information ,
YOV-89 Yovel. S. "On Viruses and Top Managers." Information
Age
(U.K.), September 1989. pp.
Key Words:
awareness, crime,
202-210.
international.
Key Words:
awareness,
viruses, guidelines.
1-20
.
Publications. Manchester.
WEI-84
Ware, W.H.
1989, 330.
crime,
Introducing Computer Security
Key Words:
ACM
Key Words: awar^ess, international.
Wood, M.
181-195.
policy,
in the
United Kingdom," EDPACS. January 1985, pp. 1-7.
.
ZAL-83
ZAJ-85 Zajac, B.P..
Jr.
Zalud, B.
"Police Response to
"Computer Criminals Will Be
Computer Crime in the United States," The Computer
Prosecuted: Adoping
Law
Data Management, April 1983, pp. 30+.
and Sectmty Report, July-August 1985, pp. 16-17.
A
'Prevention First' Approach,"
ZIM-85 Zimmerman, J.S. "PC Security: So What's New?" Datamation November ,
1,
1985, pp. 86-92
Key Words: general, PC.
Key Words:
crime,
ZAJ-86 Zajac, B.P.,
Jr.
"What to Do When You Have Reason to Believe Your Computer Has Been Compromised". Computers & Security
.
Key Words:
crime, policy,
guidelines.
legisIatiorL
March. 1986, pp.
11-16.
ZIM-84 Zimmerman,
J.S.
"The Human Side of Computer Security," Computer Security Journal
,
Summer
1984, pp. 7-20.
Key Words:
awareness.-
general, threats, guidelines.
Key Words:
hackers, viruses,
threats, guidelines.
1-21
awareness,
2.
The
Management
on various management issues, including: the need for minicomputer and personal computer systems (risk management, risk analysis); administrative and personnel policies and controls; physical security in computing facilities; and operational (disaster) recovery. Also included are publications containing technical discussions of threats and vulnerabilities (e.g., viruses). section cites publications
security in mainframe,
ADD-87 Addison, K., et
"Computer Security Microsystems,
at
SUN
Inc.," Proc.
Comp.
10th Natl. (5:
AIM-81 AIM/SAFE:
al.
Data Processing Contingency Planning Methodology
Al-Saffar, H.
Advanced Information Management, Inc., Woodbridge, VA, 1981.
1986, pp. 1-14.
"Using
Sec. Conf.
,
219.
Key Words:
Key Words: company, management,
Symposium on
Proceedings,
Physical/Electronic Security,
1986.
Planning," Proc. IFIP/Sec. '83
"Preliminary Formulation of a
Stockholm, 1983,
Policy Based on Risk (PER) Asessment Methodology,"
pp. 143-146.
Comp.
Key Words:
Sec. Risk
guidelines,
physical.
Austin, B.B.
Proceedings, 2nd Annual
Key Words:
Symposium on
methods.
Physical/Electronic Security Philadelphia,
risk, policy,
ALK-89
Spring 1981, pp. 83-98.
Alkemi Computer Risk Manager Elsevier Advanced Technology New York, NY, ,
Key Words:
proceedings,
physical.
"ControUing Physical Access from a Central Locations," Computer Security Journal ,
,
PA,
August 1986.
Key Words:
physical, control,
techniques.
BAD-89
1989.
AFC-87
Badenhorst, K.P., and
Key Words:
Proceedings, 3d Annual
Symposium on Physical/Electronic Security
1987.
risk,
management, methods. ,
ALL-81 Allen, B.R.
Key Words: physical.
,
FAK-83),
AUS-81
AFC-86
AFCEA,
(2:
,
pp. 225-242.
AFCEA,
Computers and
Office: Security Conscious
Aldridge, B.T.
Proc. physical.
Audit February
Ancker, A.
Manag. Model Builders Workshop 1988 (2: NBS-88),
proceedings,
,
auditing, methods.
"Facilities for
AFC-85
for
ANC-83
guidelines,
recovery, techniques.
ALD-88
Key Words:
Data
EDPACS
Key Words:
techniques
AFCEA,
SMF
Purposes,"
,
NCS-87a), 1987, pp. 216-
general, policy,
ALS-86
A
proceedings,
"Threat Teams:
A
Technique for the Detection and ftevention of Fraud in Automated and Manual Systems," Computer Security Journal
,
Spring 1981, pp. 1-
13.
Key Words:
guidelines,
techniques.
2-1
J.
Eloff
"Framework of a Methodology for the Life Cycle of
Computer Security in an Organization," Computers & Security August 1989, pp. ,
433-442.
Key Words:
general, methods.
BER-83b
BEC-83
BAK-85 Baker, R.H.
Becker, H.B.
The Computer Security Handbook TAB Professional
Information Integrity:
.
Structure for
Bernstein. R.A.
A
Definition
Its
and Reference Books, Blue Ridge Summit, PA, 1985.
and Management McGrawHill, New York, 1983
Key Words:
Key Words: book,
,
.
Key Words: book, geberal,
integrity,
A
"Contingency Planning — Case Study," EDPACS October 1983. pp. 9-12. contingency,
methods.
general, methods, guidelines.
techniques.
BER-84 BEC-84
BAL-87
Berg. R.
Baldwin, R.W. "Rule Based Analysis of
Becker, H.B.
Computer
the Small Systems Environment," Proc. IFIF/Sec.
Security,"
IEEE Compcon
Proceedings,
1987 pp. 227-233.
Toronto. 1984, 85), pp. 501-516.
_;84,
,
Key Words:
"Security Considerations in
(2:
FIN-
"Risk Management for Computer Centers,"
Informormation Resource
Management (U.K). March 1984, pp. 16-17.
Key Words:
general,
Key Words:
methods.
risk,
management,
methods.
general,
guidelines.
BAR-80
BES-88 BEI-84
Barbarino, P.
"Multi-Tiered Approach to
System Security," Proc. 1980 IEEE Symp. on Security & Privacy (5: IEE-80), pp. 114-120. ,
Bessenhoffer. R.
Beitman, L. "An Audit Software Program
Modem
Base,"
Center."
Computer Security
Journal,
Volume V, No.
EDPACS March ,
general, method,
1,
1988. pp. 53-66.
Key Words: Key Words:
1984,
pp. 6-8.
"Designing Security Into a Data Processing
auditing,
Key Words: methods,
software.
techniques.
techniques.
BEN-89
BEA-84
BIC-89
Benzel, T.C.V.
Beatman, L. "Microcomputer Function,"
in the
EDPACS
Audit
"Integrating Security
Bickner. L.
Requirements and Software
"Security Engineering of Secure Ground Stations," Proc. Aerospace Comp. Sec. Conf. (5: IEE-85a), 1985, pp. 49-54.
Development Standards," Proc.
,
September 1984, pp. 4-6.
12th Natl. (5:
Key Words:
Comp. Sec.Conf.
NCS-89), 1989. pp. 435-
458.
auditing,
Key Words:
methods.
Key Words: methods,
BEA-85
software
BIS-86
Beatson, J.G.
BER-83
"Development and Organization of the Audit
Bishop,
Bermhed, L.
M.
"Analyzing the Security of An Existing Computer System,"
and Security Function," Proc.
"A Method
MP/Sec.
VuherabiUty." Proc. IFIP/Sec. ^83. Stockholm. 1983. (2: FAK-83). pp. 161-166.
Joint
Key Words:
Key Words:
(2:
physical,
techniques.
'85 , Dublin, 1985,
GRI-85), pp. 251-259.
Key Words:
for Testing
Proceedings.
ACM/IEEE
Fall
Computer Conference,
Nov. 1986, pp. 1115-1119.
audit,
management.
vulnerability,
risk,
methods.
methods.
BEA-86
BLA-81 BER-83a
Beatson, J.G.
"Managing the
EDP
Audit
and Security Function," Computers «fe Security September 1986, pp. 201-206. ,
Blanding, S.F.
Bemhard, R.
A
Doors, Trojan Horses...,"
Aug./Sept. 1981, pp. 4-24.
management.
,
Systems and Software April ,
1983, pp. 67-68.
Key Words:
"Computer Fraud Auditing Case Study," EDPACS
"Foiling the Spoofers, Trap-
audit,
Key Words:
hackers, threats,
methods.
2-2
Key Words: crime, company.
auditing,
BOL-84
BON-81 a
Bologna, J. "Disaster/Recovery Planning: Qualitative Approach," Data Processing &
A
Communications Security
.
March/April 1984, pp. 11-15.
BRA-81
Bonyun, D.A. 'Towards A Standard All-
Brafman, M.J.
Purpose Activity Log,"
Using the Matrix Approach,"
Proceedings. Honeywell Computer Security and Privacy Symposium April
EDPACS December
"Evaluating Computer Controls
.
,
Key Words:
1981. pp. 133-145.
Key Words:
contingency, auditing,
BRI-83
guidelines.
BOL-88
BriU, A.E.
BON-88
Bologna, G.J., and R.J. Linquist
Fraud Auditing and Forensic Accounting J. Wiley & Sons, New York, 1988. ,
Key Words: book,
auditing,
Building Controls into
Bonyun. D.A.. and J. Graeme "An Expert Systems Approach to the Modelling of Risks in
Structured Systems ,
Dynamic Envirorunent," Proc. Comp. Sec. Risk Manag. Model Builders Workshop
Key Words:
,
1988
control.
(2:
NBS-88). pp. 203-
223.
BOL-88a
Press.
New
Yourdon
York, 1983. controls, methods.
BRO-84 Browne, P.S. 'The Automated Risk
Profile
(RiskPac), Proc. 7th Seminar,
Bologna,
J.
"Selection Risks in Hiring
Information Systems Personnel," Computers Security
risk, control,
methods.
Key Words:
recovery, management.
1981. pp.
1-10.
,
&
August 1988, pp.
353-355.
Key Words:
risk, personnel.
Bound, W.A.J.. and D.R. Ruth "Risk Mangement — How It Can Become a Useful Tool," Proc. IFIP/Sec. '83 , (2:
FAK-
"The One Minute Fraud
&
Security , February 1989, pp. 29-31.
Key Words:
crime, auditing.
BON-81 Bonyun, D. "The Role of a Well Defined Auditing Process in the Enforcement of Privacy PoUcy and Data Security," Proc. 1981 IEEE Symp. on Sec. & Privacy (5: IEE-81),
Key Words: methods.
policy, auditing,
risk,
pp. 402-404.
methods,
management.
BRO-86 Brown. R.V. "Managing Diffuse Risks from
(DR/AS)
with Special Refemce to
Key Words: risk, methods, management.
Computer Nati.
Security," Proc. 9th
Comp.
Sec. Conf. (5:
NCS-86). 1986. pp. 162-167.
BOU-83a Bound, W.A.J., and D.R. Ruth "Making Risk Analysis A Useful Management Tool with Microcomputer Electronic Worksheet Packages." Computers & Security June .
Key Words:
risk,
methods,
risk,
management,
BRO-87 Brown, R.L. "Specification for a
Management Tool," Proc. 10th NaU. Comp. Sec. Conf. (5: NCS-87a), 1987. pp. 84-90.
management.
Key Words: management,
BOY-82 Boyer. T.J. "Contingency Planning: Opportunity for DP
methods.
An
Management." Computer Security Journal
.
Winter 1982,
pp. 41-49.
Key Words:
Key Words: methods.
CanonicalConfiguradon
1983. pp. 102-115.
,
pp. 19-25.
Sec. Progr. (5:
Adversarial Sotirces
J.
Auditor," Computers
DoD Comp.
DOD-84). 1984.
Key Words:
BOU-83
Stockholm. 1983, 83), pp. 147-160.
BOL-89 Bologna,
Key Words: risk, methods, management.
contingency,
recovery, methods.
Browne,
P.S.,
and
Laverty "Using Decision Analysis to Estimate Computer Security Risk," Proc. Comp. Sec. Risk Manag. Model Builders J.E.
Workshop 1988
(2:
.
88)
CAR-82
BUR-85
BRO-88
,
Bums, R.W.
Carroll, J.M.
"Security Implications of the
Controlling White Collar
Space Station Information System," Proc. Aerospace Comp. Sec. Conf. (5: lEE-
Crime: Design and Audit for Systems Security Butterworths, ,
Wobum, MA,
1982.
85a), 1985, pp. 3-10.
NBS-
Key Words: book, Key Words:
pp. 117-134.
requirements,
crime,
auditing.
govenmient.
Key Words:
CAR-83
risk,
BUR-88
management, methods.
Computer Viruses: A HighTech Disease Abacus, Grand Rapids, MI, 1988.
BRO-89 Brothers,
M.H.
,
"A 'How To' Guide for Computer Virus Protection
89)
,
Key Words: book,
,
January 1983, pp. 24-
general,
Key Words:
virus, risk, techniques.
risk, threats,
methods, managements.
1989, pp. 349-358.
Key Words:
Security 34.
in
MS-DOS," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-
and O. Wu "Methodology for Security Analysis of Data Processing Systems," Computers & Carroll, J.M.,
Burger, R.H.
BUU-84
virus, guidelines,
CAR-83a
Buurmeijer, F.
"IBM's Data Security
methods.
BRU-85
Carroll, J.M.
Some
Strategy:
"Descision Support for Risk
Implementation Aspects,"
Bruske, S.Z., R.E. Wright,
Computers
&
Analysis," Computers Security
and W.D. Geaslen "Potential Uses of Probabilistic Risk Assessment Techniques for Space Station Development," Proc. Aerospace Comp. Sec. Conf
November
1984, pp. 273-277.
.
(5:
IEE-85a), 1985, pp. 21-
Security
Key Words: methods, company.
risk,
methods.
,
Age
Proc.
Introduction to Data
Information Sciences, Wellesley,
MA,
Q.E.D.
,
May
Amsterdam 1989.
Key Words:
methods.
BUI-87
MA
1984.
Key Words: book, risk, methods, management.
CAR-84a Carroll, J.M.,
CAM-83
control,
Stoneham,
proceedings,
general, international.
and
W.R. Maclver 'Towards an Expert System
Campbell, R.P.
Key Words: book,
Managing Risk: A ComputerAided Strategy Butterworth,
1988, North-
Inc.,
1987.
risk, threats,
,
Gold Coast,
IFIP/Sec. '88,
Holland,
Security and Controls
230-236.
Carrroll, J.M.
in the
Buck, E.R.
An
&
1983, pp.
CAR-84
AustraHa,
BUC-87
November
Key Words:
CaelU, W.J. (Ed.) of Information
Key Words:
,
methods, management.
CAE-89 Computer Security
29.
,
Up
Mainframe, Part 1," Computerworld, October 10, 1983, pp. IDlID15. "Lxjcking
the
for Computer-Facility
Certification," Proc. IFIP/Sec.
J4, Toronto, 1984,
(2:
FIN-
85),'84, pp. 293-306.
Bui, T., and
T.R. Sivasankaran
Key Words:
"Cost-Effectiveness Modeling
methods.
System Computer Security," Computers & Security April
threats, policy,
Key Words:
physical, methods,
risk.
fora Decision Support in
,
1987, pp. 139-151.
CAM-83a
Part 2,"
Key Words: methods, management.
CAR-85
Campbell, R.P. "Locking Up the Mainframe,
Computerworld
,
Carroll, J.M.,
and
W.W. Mac Iver "COSSAC: A Framework
October 17, 1983, pp. IDlID14.
Analyzingand Configuring
Key Words:
1985, pp. 5-12.
for
Secure Computer FaciUties," Computers & Security March .
threats, policy,
methods.
Key Words:
2-4
physical, methods.
CHO-89
CAR-87 Carroll,
]M.
COH-84a
Chokhani,
Cohen, F. "Computer Viruses: Theory and Experience," Proc.
S.
Computer Security Second
"Protection of Call Detail
Edition, Butterworths, Boston,
Records Data in Federal Telecommunications," Proc. 5th Sec. Applicat. Conf. (4:
,
MA,
1987
Key Words: book, general, methods, guidelines,
IEE-89C), 1989. pp. 70-77.
techniques.
Key Words: government,
(2:
Computers
&
COH-87
CLA-86 Clark, R.
Security
,
March
1985, pp. 33-45.
"Risk Mangement ~ A New Approach," Proc. IHF/Sec. ;86,
Key Words:
Monte
Cohen, F. "Computer Viruses: Theory and Experiments," Computers & Security February 1987, pp. ,
22-25.
Carlo, 1986, (2:
Key Words:
GRI-89).
controls,
methods.
virus, techniques,
theory.
Key Words: risk, methods, management.
CHA-82
COH-88
Chambers, A.D.
Cohen.
Computer Auditing
CLY-87
,
Commerce
Clyde, A.R.
Inc.,
"Insider Threat Identification System," Proc. 10th Natl.
Clearing House, Chicago, 1982.
Key Words:
Comp.
auditing,
Conf
Sec.
.
(5:
NCS-
F.
"On the In-iplications of Computer Viruses and Methods of Defense,"
&
Computers
Security , April
1988. pp. 167-184.
87a), 1987, pp. 343-356.
methods.
Key Words:
Key Words:
CHA-85 "A Low-Cost Approach
COH-88a
to
Disaster Recovery Planning,"
Computer Security Journal
,
Winter 1985, pp. 57-61.
Key Words:
contingency,
COC-84 Cochrane,
Cohen,
"Automated Data Processing
Information Integrity,"
Security Accreditation
Computers
Program (A Composite
1988, pp. 489-494.
Guideline)," Proc. 7th
maangement.
Seminar, Progr. (5:
CHA-86
DoD Comp.
Sec
Differences Between Computer Security Practices
and Private
Sectors," Proc. 1986
Symp. on Security
&
IEEE Privacy
IEE-86), pp. 71-77. policy, methods,
management.
integrity,
methods.
F.
'Terminal Viruses," The Sciences Nov.-Dec. 1988, pp.
guidelines,
accreditation.
,
24-30.
COH-84 Cohen, F. "Computer Viruses: Theory and Experiments," Proc. 7th Seminar, DoD Comp. Sec .
Key Words:
Security . October
COH-88b Cohen,
Key Words:
&
Key Words:
.
DOD-84), 1984, pp.
351-363.
Chalmers, L.S. "An Analysis of the
F.
"Maintaining a Poor Person's
J.S.
recovery, methods,
in the Military
virus, threats,
methods.
threats, risk,
methods.
Chalmers, L.S.
(5:
virus, theory,
methods,
MJ.
"General Controls in Computer Systems,"
,
techniques.
techniques.
Cerullo,
'84 Toronto. 1984, FIN-85), pp. 143-158.
Key Words: threats, policy,
CER-85
mP/Sec.
Progr. (5:
DOD-84), 1984,
pp.
240-263.
Key Words:
virus, techniques.
COH-89 Cohen, F. "Computational Aspects of Computer Viruses," Computers & Security June 1989, pp. ,
CHA-88
Key Words:
Chantino York,
325-344.
theory.
Disaster Recovery
New
virus, techniques,
NY,
,
Key Words:
Elsevier,
1988.
Key Words: book,
recovery,
methods.
2-5
virus, techniques.
CRO-84
COU-85
COO-89 Cooper, J.A.
Courtney, R.H., and
Computer and Communications
M.A. Todd
"A Flow Charting Technique
"Problem Quantification: Importance of Cost-Effective
for Designing
Security," Proc. IFIP/Sec. '85 ,
March/April 1984, pp. 22-27.
Security-
Strategies for the 1990s,
McGraw-Hill,
New
York,
Dublin, 1985,
1989.
(2:
Croft, R.B.
Key Words:
CRO-85
Key Words: methods,
Cronhjort, B.T., and A. Mustonen "Computer Assisted Reduction of Vulnerability of Data
techniques.
COP-88 Copigneaux, F., and S. Martin "Software Security Evaluation Based on Top-Down McCallLike Approach," Proc. 4th Aerosp. Comp. Sec. Conf (4: IEE-88b). 1988, pp. 414-418. .
risk,
methods.
COU-86 Courtney, R.H. "Security Measures
Centers," Proc. IFIP/Sec. '84
Are
Inherently Undesirable,"
EDPACS March .
1986, pp. 9-
Coryen, G.C.
Methodology
for Assessing
Security Risks Associated
with Computer Sites and Networks UCRL-53292, Lawrence Livermore National ,
Laboratory, Livermore,
Key Words:
(2:
,
FIN-85),
risk,
Key Words: methods,
vulnerabilities,
management.
techniques.
methods,
CRO-86
Courtney, R.H.
Cronin, D.
"An Economically Feasible Approach to Contingency
Microcomputer Data
Planning," Proc. 9th Natl.
Communicat./Prentice-HaU, Englewood Cliffs, NJ, 1986.
Comp.
Issues
NCS-
Sec. Conf. (5:
&
Strategies ,
Security:
Brady
86), 1986, pp. 237-244.
Key Words: book, management, PC, techniques.
CA,
Key Words:
June 23, 1982.
Toronto, 1984, pp. 397-425.
12.
COU-86a
COR-82
A
risk, techniques.
general,
networks.
Key Words:
,
GRI-85),
pp. 55-63.
Key Words: book,
On-Line Data
Security," TeleSystems Journal
contingency,
recovery, methods.
Key Words:
risk,
COU-88
networks.
Crocker,
J.
"Source Code Security: A Checklist for Managers," Sec. Audit & Control Review , Spring 1987, pp. 12-
ACM
But Unclassified
Sensitive
Data," Computers
&
and
S.,
M. Pozzo
"A Proposal for VerificationBased Virus Filter," Proc. 1989 IEEE Symp. on Sec. &
Courtney, R.H. "Another Perspective on
COR-87 Corelis,
CRO-89
methods,
Security
,
Privacy
IEE-89b), pp. 319-
(5:
February 1988, pp. 19-23.
324.
Key Words:
Key Words:
policy,
virus, techniques.
requirements.
16.
CSC-85
Key Words:
software,
COU-89
PC
COU-84
Responsibility for Data
Age
Courtney, R.H., and
Security," Information
M.A. Todd
(U.K.) April 1989, pp. 83-87.
"Problem Definition:
An
Essential Prerequisite to the
Implementation of Security Measures," Proc. IFIP/Sec. 284, Toronto, 1984, (2: FIN85), pp. 97-106.
Security Considerations
,
NSSC-TG-002-85, National Computer Security Center, Ft. Meade, MD, 1985.
Courtney, R.H. "Proper Assignment of
guidelines.
,
Key Words:
guidelines, PC,
techniques.
Key Words: policy, management.
CSI-83
Computer Security Handbook Computer Seciffity Institute,
CRO-82 Crow, W. "Making the
Key Words: methods,
Secure,"
techniques.
Magazine
ATM
Northboro,
Jan./Feb. 1982, pp.
Key Words: book, general, techniques,
management.
70-74.
Key Words:
policy,
techniques.
2-6
1983.
More
The Bankers ,
MA,
,
guidelines,
DEM-85
CSI-87
Commercial EHsastCT Recovery Services," Computer Security Journal Volume IV, No. 2, 1987, pp.
DeMaio, H.B. "Controlling Advanced Information System Technology," Computer
49-64.
Security Journal
"A Guide
to
,
.
DON-84 Donovan,
and Contingency Planning," Proc.
mP/Sec.
Winter 1985,
pp. 63-67.
Key Words:
contingency,
(2:
'84. Toronto. 1984. FIN-85), pp. 401-406.
Key Words: contingency, management.
Key Words: management,
recovery.
J.F.
"Industrial Relations
control.
CWO-86 Hot Computerworld May
"Disaster Recovery Sites,"
,
12, 1986, p. 62ff.
Key Words:
contingency,
DOS-85
DEN-81
Doswell, R.T. "The Audit, Control and Security of the Project Life
de Boef, A. "Audit Monitoring of Production Data Files,"
EDPACS
,
Cycle
February 1981, pp.
1-16.
recovery.
DAV-87
pp. 277-281. auditing,
methods.
Key Words:
R.E. Gantenbein
Computer Virus Attack,"
Denning, D.E.
Journal of Systems and
"An
Software December 1987, pp. 253-258.
Model," IEEE Trans, on Software Engr. February 1987, pp. 222-232.
,
Key Words:
DPC-84
Intrusion-Detection
"Computer Security Administration and Staffing,"
Data Processing
,
Key Words:
threats,
&
Communications Security May/June 1984.
virus, recovery,
methods.
auditing,
management.
DEN-87
"Recovering from a
Pre-Implementation
Dublin, 1985, (2: GRI-85),'85,
Key Words:
Davis, F.G.F., and
~
Stage," Proc. IFIP/Sec. '85 ,
,
methods.
Key Words: management,
DAV-89
DES-88
persoimel.
Davida, G.I., Y.G. Desmet,
Desman, M.B.
and B.J. Matt "Defending Systems Against
Attention to Your People,"
"Physical Security for Data
Viruses through Cryptographic
Computer Security Journal
Processing Facilities," Data
Authentication," Proc. 1989
49-51.
Security
Key Words: policy, personnel, management.
Key Words:
IEEE Symp. on
Volume V, No. Sec.
&
Privacy (5: IEE-89b), pp. 312-318.
Key Words:
—
"Recovery Palnning
1,
Pay
1988. pp.
DEV-83
virus,
techniques, cryptography.
Computer Viruses:
Data Center," Computer
Proceedings, Invitational
Security Journal
Symposium October ,
10-11,
1988, Deloite Haskings
New
&
York, 1989.
Processing ,
&
Communications
Sept./Oct. 1984.
physical,
techniques.
DUG-86
DeVries, D.
"A Baker's Dozen: Security Suggestions for Moving a
DEL-89
Sells.
,
DPC-84a
,
Spring 1983,
Dugan, E. "Disaster Recovery Planning: Crisis Doesn't Equal Catastrophe," Computerworld
,
January 27, 1986, pp. 67-74.
pp. 91-95.
Key Words: Key Words:
guidelines,
contingency,
recovery, management.
physical.
Key Words: virus,
DUN-84
proceedings,
methods, management.
DOD-88
Dunmore, D.
Security Requirements for
"An EDP Risk Analysis
Automated Information
Model,"
Systems (AIS) U.S. Department of Defense, Washington, DC, March 1988.
1984. pp. 6-11.
,
Key Words: methods.
Key Words:
policy,
requirements, government.
2-7
EDPACS risk,
.
October
management,
EAS-82
FEU-88
ESS-85
Eason, T.S., and D.A. Webb Nine Steps to Effective EDP
Essen,
and B. Lindberg "The Bofors-Model for
Feuerlicht,
Loss Control Digital Press, Bedford, MA, 1982.
Working mP/Sec.
Information in Controlling
,
(2:
Key Words: book,
J., and P. Grattan "The Role of Classification of
J.,
ADP
Security," Proc. '85 , Dublin, 1985,
GRI-85), pp. 47-53.
control,
Data Proliferation in End-User PC Environment," Proc. IHP/Sec. '88 Australia, 1989, (2: CAE-89). pp. 167-176. .
Key Words:
policy, guidelines.
risk, threats,
methods.
Key Words: control, methods management.
EIC-89 Eichin,
FAK-83
M.Q.W., and
J.A. Rochlis
Fak, V.A. (Ed.)
"With Microscope and Tweezers: An Analysis of the
Security, Proc. of IFIP/Sec'83 .
November 1989 IEEE
Internet Virus of
1988," Proc.
Symp. on Sec.
&
Privacy IEE-89b), pp. 326-343.
Stockholm, Sweden,
(5:
FEU-89 J., and P. Grattan "The Role of Classification of
Feuerlicht,
North-HoUand Publishing Co., Amsterdam,
Information in Controlling
1983.
Data Proliferation in End-User Personal Computer
methods.
virus,
16-
19, 1983,
Key Words: Key Words:
May
proceedings,
general, international.
Environment," Computers & Security February 1989, pp. ,
59-66.
ENG-80
FAS-89
M.V.
Enger, N.L., and
Fastiggi,
P.W. Hoverton Computer Security: A Management Audit Approach
"Detection of Surreptitious
Anacom,
New
Insertion of Trojan Horse or ,
Viral
Code
in
Computer
AppUcation Programs,"
York, 1980.
Age
Information
Key Words: book,
Key Words: control, methods, management.
(U.K.),
,
January 1989, pp. 3-10.
auditing,
methods,
Key Words:
FIE-82 Fierello,
of Computer Security Standards & Guidelines," Proc. 5th Seminar, DoD Comp. Sec .
EPP-80
Prog
FED-85
Epperly, E.V.
M.
"Cost-Benefit Impact Analysis
.
DOD-82), 1982, pp.
(5:
177-201.
"The Department of Defense
Proceedings, Federal
Computer Security Initiative Program and Current and
Information System Risk
Key Words:
Analysis Workshop U.S. Air
methods, management.
Future Security Policies,"
Force Computer Security Program Office, San Antonio, TX, January 1985.
Proc.
,
DoD (5: DOD-
2nd Seminar,
Comp.
Sec. Prog.
Key Words:
EPP-82 Epperly, E.V.
Sec. Prog.
DoD (5: DOD-
82), 1982, pp. 99-137.
-
Computer
A
Sept., 1984,
Business," Proc. 10th Nad.
Company, Amsterdam, 1985.
Comp.
Global
North-Holland
Ferris,
Conf
Sec.
.
(5:
Publishing
NCS-
87a), 1987, pp. 266-272.
Key Words:
proceedings,
general, international.
Key Words:
cerification,
ns-89
policy.
Fish, T.
Key Words:
Security:
,
M., and A. Cerulli "Certification: A Risky
Proc. 5th Seminar,
Finch, J.H., and
Challenge. Proc, IFIP/SEC '84 Toronto, Canada, 12-12
FER-87
government.
Comp.
proceedings, risk.
policy,
"Computer Security Policies Challenges and Prospects,"
FIN-85 E.G. Dougall (Eds.)
80a), 1980, pp. J1-J34.
Key Words:
guidelines,
and
S.
Meglathery
"Professional Certification for
policy,
Computer Security
government.
Practitioners," Proc. 12th Natl.
Comp.
Sec.
Conf
.
(5:
NCS-
89), 1989. pp. 433-434.
Key Words: management.
2-8
personnel,
FRY-83
FIT-81 Fitzgerald,
"EDP Risk
GAO-81
W.F. Main "A Conceptual Methodology
Fry. B.G.P. and
J.
Analysis Using
Matrices,"
EDPACS
November
1981. pp. 1-7.
for Evaluating Security
,
risk,
methods,
management.
Security
&
Computers
November
.
to
1983. pp.
237-241.
Key Words:
FIT-89
Key Words: auditing, management, government.
requirements,
methods.
Fites, P.E.
GAO-81 a
Control and Security of
Computer Information Systems Computer Science ,
Press, RockvUle.
MD,
Key Words: book,
1989.
control,
methods.
FUG-84
Evaluating Internal Controls in
Fugini, M.. and C. Martella
Mangement
"Security
Office Information Systems." Proc. IFIP/Sec. '84 Toronto, .
1984,
Computer-Based Systems
,
AFMD-81-76, U.S. General
in
Accounting Office, Washington, DC, June 1981.
FIN-85), pp. 487-
(2:
Key Words:
498.
FLA-86 Flach,
Need
Still
Develop Greater Computer Audit Capabilities AFMD-827. U.S. General Accounting Office, Washington, DC, 16 October 1981. ,
Requirements for Data Assets."
Key Words:
Federal Agencies
control,
government.
Key Words: management,
J.
"Disaster Planning
--
Beyond
a Prayer," Computer Security Products Report Spring ,
GAR-87
policy.
Garcia, A.A. (Ed.)
Computer Security: A Comprehensive Controls
GAG-85
1986, pp. 9-11.
Gage, D.W. "Security Considerations for
Checklist
Key Words:
Autonomous Robots," 1986 IEEE Symp. on
Somerset, NJ, 1987.
contingency,
recovery.
Privacy
FRA-83
Proc.
Sec.
&
IEE-86), pp. 224-
(5:
,
Wiley
J.
Key Words:
&
Sons,
guidelines,
methods.
228.
Francella, K.
"Multiple Controls
Combat
Computer Crime," Data Management, July 1983, pp.
Key Words:
requirements.
GAL-85 Gallery, S.M.
21+.
Computer
Key Words:
crime, controls,
methods, management.
Security: Readings from Security Management Magazine Butterworths, ,
GAR-88 Gamett, P.D. "Selective Disassembly: A First Step Towards Developing Virus Filter," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 2-6.
Boston, 1987.
Key Words:
FRI-82 Friedman, S.D. "Contingency and Disaster Planning," Computers and Security January 1982, pp. ,
34-40.
Key Words:
contingency,
recovery, management.
FRI-84 Friedman, S.D. "Contingency and Disaster Planning in EDP," EDPACS . January 1984. pp. 4-9.
Key Words:
Key Words: book,
virus, techniques.
general,
GAR-89
methods.
Gardner, P.E.
GAO-80
"Analysis of Five Risk
Most Federal Agencies Have Done Little Plaiming for ADP Disasters AFMD-81-16, U.S. ,
Assessment Programs," Computers & Security October ,
1989, pp. 479-485.
General Accounting Office, Washington, DC, 18
Key Words:
December 1980.
techniques.
Key Words:
contingency,
recovery, government,
management.
contingency,
risk,
management,
GAS-86 Gascoyne, R.J.N. "Basic Protection for
Microcomputers," EDPACS June 1986, pp. 5-6.
,
recovery, management.
Key Words: PC, management.
2-9
techniques,
GRE-81 a
GIL-89
GIL-81 Gilhooley, I.A.
EDP EDPACS January
"Controlling the
Auditor,"
,
1981, pp. 1-7.
Key Words:
GUbert, I.E.
Green, G., and R.G. Farber
Guide for Selecting Automated Risk Analysis
Introduction to Security
Tools SP 500-174, National Institute of Standards and Technology, Gaithersburg, MD, October 1989.
World
Principles
,
auditing, control,
management.
&
Practices , Security
Publishing, Los
Angeles, 1981.
Key Words:
general, methods,
policy, techniques.
Gilhooley, I.A.
Key Words: risk, management, methods,
"Auditing System
guidelines.
GIL-84
GRE-89 J.L., and P. L. Sisson 'The 'Father Christmas
Green,
Development Methodology,"
EDPACS
July 1984, pp. 1-8.
,
Key Words:
Worm'," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-
GIN-89 Ginn, R. Continuity Planning: Preventing, Surviving and
auditing,
methods.
89), 1989, pp. 359-368.
Key Words:
Recovering from Disaster ,
GIL-84a Gillin, P.
Technology
'Tightening Controls on MicroBased Software,"
1989.
Computerworld, December
5,
1984, pp. 41-44.
Key Words:
control,
York,
NY,
Key Words:
Computer
book,
"The Impact of Current EDP Development on Separation
CQM-SAC.
of Duties,"
Computer
management.
World
Proc. IFIP/Sec '85, Dublin, Ireland, 12-15 August,
,
No.
2,
.
1985, North-Holland Elsevier
W. for
&
Key Words:
Viruses,"
Computers
Security
February 1989, pp.
,
Company, Amsterdam/New York, 1985 Publishing
proceedings,
general, international.
35-41.
GRI-89
Security, Auditing
Controls
The
Practical Issues in a Troubled
"A Mathematical Theory the Spread of Computer
Gilhooley, I.A.
Security:
contingency, recovery,
GLE-89
GIL-85
GRI-85 Grimson, J.B., H.J. Kugler (Eds.)
Gleissner,
&
New
PC,
software.
virus, techniques.
Advanced
Elsevier
1985, pp.
Key Words:
Grissonnanche,A. (Ed.)
virus, theory.
A7-A14.
Security Protection in
GOT-81
Information Systems
M.
Key Words: management,
Gottlieb,
methods.
"Audit Concerns About Minicomputers," EDPACS
GIL^86
,
Proceedings IFIP/Sec '86,
Monte
Carlo,
December 1986,
Oct. 1981, pp. 12-15.
North HoUand/Elsevier, Amsterdam, 1989.
Key Words:
Key Words:
,
Gilhooley, I.A. "Productivity and Control System Development,"
EDPACS
,
in
auditing,
methods.
July 1986, pp. 1-6.
GUA-87
GRE-81
Key Words:
control,
management.
GIL-86a
Greguras, P.M.
Guarro, S.B.
"DP Contingency Planning: The Legal Considerations,"
the
Assets Protection
,
May /June
1981, pp. 26-29.
Gilhooley, I.A.
"Principles and Procedures of
LRAM
,
Key Words:
contingency,
Approach
Analysis and Management,"
&
Security
December 1987,
,
pp. 493-504.
laws.
Key Words:
Key Words:
to
Information Systems Risk
Computers
"Controlling End-User
Computing," EDPACS October 1986, pp. 1-9.
proceedings,
general, international.
control,
management.
2-10
risk,
methods.
GUA-88
Key Words:
Guano, S.B.
HAR-80a
auditing,
methods.
Hardenburg, K.L. "Auditing the MVS Operating Systems," EDPACS June
"Analytical and Decision
Models of
the Livermore Risk Analysis Methodology," Proc. Comp. Sec. Risk
Manag. Model Builders Workshop 1988 (2: NBS.
HAL-88
.
Habne, L.R., and B.L. Kahn "Building a Security Monitor with Adaptive User Work
Key Words:
Profiles." Proc. 11th Natl.
techniques.
Comp.
88), pp. 49-71.
Sec. Conf. (5:
methods.
risk,
GUI-89
auditing,
techniques.
Guinier, D.
Design for Security, 2nd Ed. John Wiley & Sons, New
,
York. 1983.
"Biological Versus
&
HEA-83 Healy, R.J
Key Words:
Viruses,"
auditing,
NCS-
88), 1988, pp. 374-383.
Key Words:
1980, pp. 1-10.
ACM
Computer
Sec.,
Audit
Summer
HAM-82 Hammer, C.
Key Words: book, physical, methods, techniques.
1989. pp. 1-15.
"Managing Computer Security." Computer Security Journal Winter 1982, pp. 17-
Key Words:
21.
Heaton, Y.
Key Words: management,
Auditor's Point of View,"
Control Rev. ,
.
virus, general.
HEA-86 "The
GUS-88 M.E. "Personal Computer
methods.
Gustoff,
Security," Information
Age
,
Hansen, J.V. and
195-202.
W.F. Messier
Key Words: PC,
"Scheduling the Monitoring of EDP Controls in Online Systems," Intematl. Journal of
HAE-84 Haeckel, D.A., and
B.B. Johnson
Risks
- An
The Computer Law and Security Report, Sept.-Oct. 1986, pp. 21-23.
HAN-83
(U.K.), October 1988, pp.
techniques.
Human
Key Words:
risk,
persormel.
HEA-87 Hearden, K.
Computer and Information
A
Sciences, February 1983, pp. 35-46.
Security
Key Words:
Key Words: book, general, methods, guidelines,
Handbook of Computer Kogan Page. London, ,
1987.
"Complete the Cycle of Information Security
control, methods.
Planning," Security
Management May 1984, .
pp.
management.
HAN-83a
54-59.
Hansen, J.V.
Key Words: management,
Distributed Processing
Hebbard. B.,
methods.
Systems," Communications of
"A
"Audit Considerations in
the
HAH-88
ACM
,
August 1983, pp.
562-569.
Hahn, M. Proc. IFIP/Sec. '88 (2:
,
MVS,"
Australia,
Key Words:
auditing,
methods.
HAR-80
HAL-86
,
Henrion, M., and
M. G. Morgan, "A Computer Aid
1-24.
Van Home
Key Words:
control,
management.
(5:
Comp.
for Risk and Other Policy Analysis," Risk Analysis September 1985. pp. ,
195-208.
Key Words:
Trails for Security Purposes,"
Proc. 9th Natl.
HEN-85
January 1980, pp.
Halme, L.R., and
"Automated Analysis of Computer System Audit
vulneabilities,
Activities,"
Programming
EDPACS
20.
threats.
Hardenburg, K.L. "Controlling Systems
auditing,
methods.
Conf.
Michigan Terminal System," ACM Operating Systems Review January 1980, pp. 7-
Key Words:
CAE-89), pp. 407-
Key Words:
J.
et al.
Penetration Analysis of the
,
"Auditing Changes to 1989, 424.
HEB-80
risk,
policy, methods.
Sec.
NCS-86), 1986, pp.
71-74.
2-11
management,
HER-84
HIG-85
HIG-88C
and R. Paans "The Programmer's Threat: Cases and Causes," Computers & Security
"Microcomputer Security: Data Protection Techniques," Computers & Security June
Fantasy," Computers
November 1984,
1985, pp. 123-134.
367-370.
Key Words: PC,
Key Words:
Herschberg,
I.S.
,
Key Words:
pp. 263-272.
threats,
Highland, H.J.
,
techniques.
Highland, H.J. "The Brain Virus: Fact and Security
,
&
August 1988, pp.
virus, techniques.
persoimel, management.
HIG-87 HIG-83
HIG-89
Highland, H.J.
Highland, H.J. "The Mibiet/Arpanet Attack,"
Highland, H.J. "Impact of Microcomputers on Total Computer Security,"
"Data Physician - A Virus Protection Program,"
Computers
Computers
February 1989, pp. 3-10.
Proc. IFIP/Sec. '83 ,
February 1987, pp. 73-79.
Stockholm, 1983, 83), pp. 119-129.
(2:
FAK-
&
Security
,
&
Key Words: Key Words:
Security .
virus, techniques.
virus, techniques.
HIG-89a
Key Words: PC,
techniques,
management.
HIG-87a
Highland, H.J. "A Macro Virus" Computers Security May 1989, pp. 178-
Highland, H.J.
"How HIG-83a Highland, H.J.
"Impact of Microcomputers
to
Evaluate
Microcomputer Encryption Software and Hardware," Computers & Security June ,
on Total Computer Security," Computers & Security June
1987, pp. 229-244.
1983, pp. 171-183.
Key Words: PC,
techniques,
management.
cryptography.
"Operational Security for
Security April 1988, pp. 122.
Microcomputers," Proceedings, 1983
Key Words:
CQMPCON Computer
Fall ,
,
,
1
369-373. 17-
virus, techniques.
IEEE
virus, techniques.
techniques.
HIG-84
April 1989, pp. 91-94.
'The Anatomy of a Virus Security
Highland, H.J. "Data Protection in a Microcomputer Environment,"
,
&
Key Words: HIG-89d
150.
Highland, H.J.
Key Words:
virus, techniques.
"Anatomy of Three Computer Virus Attacks," Computers
HIG-88b
Security
,
&
October 1989, pp.
461-466.
Highland, H.J.
531.
virus, techniques.
April 1988, pp. 145-
Proc. IFIP/Sec. '84 . Toronto,
FIN-85), pp. 517-
Highland, H.J. Virus,"
Attack," Computers
(2:
Key Words:
'The ItaUan or Ping-Pong Computers & Security
HIG-88a Highland, H.J.
1984,
Highland, H.J.
HIG-89C
Society, 1983.
Key Words: PC,
virus, techniques.
Revisited,"
"Computer Viruses: A Post Mortem," Computers &
Highland, H.J.
Key Words:
"The Marijuana Virus Computers & Security August 1989, pp.
HIG-88 Highland, H.J.
HIG-83b
182.
HIG-89b
,
Key Words: PC,
&
,
"An Overview of 18 Virus
Key Words: PC,
techniques.
HIG-84a
Key Words:
Protection Programs,"
Computers
&
Security
,
virus, techniques.
April
1988, pp. 157-163.
HIG-89e Highland, H.J.
Highland, H.J.
Your Microcomputer System J. Wiley & Sons, New York, Protecting
Key Words:
virus, techniques.
"Secure File Storage and Transfer," Computers
,
Security
,
466-474.
1984.
Key Words: book, PC,
Key Words:
techniques.
techniques.
2-12
&
October 1989, pp.
database,
,
HIR-89
fflG-89f Highland, H.J. "Secret Disk
—
11
&
Administrator," Computers Seciirity ,
HOF-86a
Hirst,
November 1989,
pp.
563-568.
Hoffman,
J.
"Rotten to the Core: Bombs, Trojans. Worms, and Viruses,"
New
Scientist,
March
4,
1989,
pp. 40-41.
Key Words:
Key Words:
virus,
Key Words:
HOA-82
Handbook
Elsevier
,
Technology,
New
"Controls and Risk in Data
Hoffman,
The Bankers Magazine May/June 1982, pp.
"A Prototype Implementation
Processing,"
Advanced
York,
NY,
,
49-52.
Key Words:
Key Words: book, virus, methods, techniques,
HIG-89h
HJ.
"Datacrime Virus and Anti -Virus Products,"
&
Computers
Security
December 1989.
management.
New
Key Words:
Hoebeke. L. "Computer Security — Prevention: Lessons from the Operation of a Nuclear Power Plant," Computers & Security June 1986, pp. 122-127. .
.
Key Words:
pp. 659-661.
virus,
Security
.
December 1989,
Key Words: risk, PC, management, techniques, L.J.,
and
methods.
L.A. Neitzel "Inexact Analysis of Risk,"
Computer Security Journal
.
Spring 1981. pp. 61-72.
pp. 669-674.
Key Words: Key Words:
risk,
techniques.
HOF-85
and K. Jackson
Hniska,
J.,
The PC
Security Guide 88/89
Elsevier
Advanced Technology,
New
York,
NY.
HI 1^83
"A Survey:
J.
Security and Private
July 1983, pp.
76.
18-1-.
contingency,
recovery.
Practices."
Journal
.
Winter 1985. pp. 69-
(Eds.),
York, 1988.
Key Words: book, general, methods, techniques,
management.
guidelines.
IBM-84 Good
L.J.
Computerworld, March 26.
Computer Security Risk Analysis: Problems and
1984. pp. ID/9-16.
Issues
Disaster,"
al.,
Computer Security Handbook McMillan Pubhshing Co.. New
Key Words: methods,
Hoffman,
Hiller, E.
Hutt. A.E.. et
.
Computer Security
HOF-86
HIL-84
guidelines.
HUT-88
Office Automation
"Records Retention: Management's Involvement is Critical," Data Management,
,
Security Practices for
Dial-Up Systems G320-0690,
0,
GWU-nST-86-04. The
IBM
Plains,
Corporation, White
NY, March
1984.
George Washington
Key Words: recovery.
.
1988.
Key Words: PC,
Hoffman, L.J., and A.F. Westin
Key Words:
HRU-88
virus,
techniques.
Hildebrand.
Hoffman, L.J. "Smoking Out the Bad Actors: Risk Analysis in the Age of Microcomputer," Computers & Security June 1989, pp. 299-
management.
Hoffman,
"VCHECKER - A Virus Search Program," Computers
HOF-89
,
HOF-81 Highland, H.J.
risk, techniques.
302.
techniques.
HIG-89i
.
NBS-88), pp. 135-
(2:
144.
Key Words: methods,
"Up from
of a General Risk Model," Proc. Comp. Sec. Risk Manag.
1988
risk,
HOE-86
guidelines.
&
L.J.
Model Builders Workshop
1989.
Highland.
management.
risk,
HOF-88
Hoar, T.
Highland, H.J.. (Ed.) The Computer Virus
Gap," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86). 1986, pp. 156-161.
virus, threats.
techniques.
HIG-89g
L.J.
"Risk Analysis and Computer Security: Bridging the Cultural
contingency,
University. Washington,
March 1986.
Key Words: risk, management.
2-13
DC,
Key Words: methods.
techniques,
IBM-84a Good
JAE-84
ISA-83 Security Practices for ,
IBM
Corporation,
White
Plains,
NY, March
Jaehne, E.M.
"A Guide
"Security and Productivity," Proc. IFIP/Sec. '84 Toronto,
Commercial BackupServices," Computer
Personal Computers G320-
9280-0,
Isaacson, G.I. to
Security Journal
.
Spring 1983,
pp. 51-69.
1984.
Key Words: PC,
(2:
FlN-85). pp. 107-
111.
Key Words:
techniques.
.
1984.
Key Words: management,
contingency,
methods.
recovery.
IBM-85 Information Systems Security
Executive Checklist, GX202430, IBM Corporation, White Plains, NY, 1985.
:
JAN-81
JAC-81
Jancura, E.G.. and R.
"Analyzing the Limits of
Establishing Controls and
Government Data Systems Nov. -Dec, 1981. pp. 28-29.
Auditing the Computerized Accounting System Van Nostrand, New York, 1981.
Key Words: risk, management.
Key Words: book, auditing, methods, management.
Risk,"
,
Key Words:
guidelines,
Boos
Jacobson, R.V.
.
methods.
IBM-86 Control Planning for Catastrophic Events in Data Processing Centers G320,
IBM
6729,
White
Corporation,
NY,
Plains,
Key Words:
JAR-83
JAC-81 a
Jarvis,
"Optimizing Disaster Recovery
"Designing Security into the Computer Environment," Assets Protection March/April
Planning," Proceedings,
1986.
Honeywell Computer Security and Privacy Symposium April
contingency,
,
recovery, management.
M.
Jacobson, R.V.
.
1983, pp. 9-12.
1981. pp. 95-100.
Key Words: management, IEE-87
COMPASS
Proceedings.
Key Words: contingency, '87:
Computer Assurance Washington. DC, June 1987,
methods.
recovery.
JOH-80
,
IEEE
New
JAC-86
Johnson, K.P. and
Jackson. C.B.
Publishing Service.
"Making Time
York, 1987.
for
Analysis." Security
Key Words:
March 1986.
proceedings,
DP
Risk
World
.
pp. 68-70.
general.
Key Words: IEE-88
COMPASS
Proceedings.
Computer Assurance
Key Words: book,
'88:
control,
methods.
JAC-86a
.
June 1988, IEEE PubUshing Service. New York, 1988.
Key Words:
.
risk,
management.
MD,
Gaithersburg,
R.H. Jaenicke Evaluating Internal Control: Concepts, Guidelines, E)ocumentation J. Wiley & Sons. New York, 1980.
proceedings,
JOH-83a
Jackson, C.B.
"Dau
Processing Risk
"Auditing
Unnecessary?" ISSA Newsletter July/August/ September 1986, pp. 6-8.
Software."
,
general.
Johnson. T.W.
Analysis: Beneficial or
DOSA'SE System EDPACS January ,
1983, pp. 1-14.
Key Words: IEE-89
COMPASS
Proceedings.
Key Words: '89:
risk,
JOH-88
management.
4th Annual Conference on
Computer Assurance. Gaithersburg,
1989,
IEEE
Service.
MD.
June
Publishing
New
York, 1989.
Johnson, H.L., and J.D. Layne
JAC-88
"IST/RAMP and CRITICALC: Risk Managemnt Tools," Proc.
Key Words: general.
proceedings,
"Modeling Security Risk in Networks," Proc. 11th Natl.
Jacobson, R.V.
Comp.
,
pp. 73-87.
Key Words:
risk, techniques,
2-14
Sec.
Conf
.
(5:
88), 1988, pp. 59-64.
Sec. Risk
Manag. Model Builders Workshop 1988 (2: NBS-88),
methods.
Comp.
Key Words:
NCS-
KAR-88
JOH-88a Johnson, H.L.
KOC-84
Karrent, D.T.
"Security Protection
Based on
Koch. H.S. "Auditing On-Line Syitems:
'Typical System Access
Mission Criticality," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 228-
Control Problems and Solutions," Information Aec (U.K.), January 1989, pp.
An
232.
41045.
Security. February 1984. pp. 9-
Evaluation of Paraileil v>. Continuous and Intermittent Simulation,''
A
Compulert
20,
Key Words:
Key Words:
risk,
KEA-86
JOS-88 Josej^ M.K., and Avizienis
"A Fault-TolCTance Approach to
Computer Viruses," Proc.
1988 IEEE Svmp. on Sec. Privacy .
(5:
Key Words:
methods.
requirements.
AA.
guidelines,
&
IEE-88a). pp. 52-
auditing, methnds.
KRA-80
Kearby, D.B. "Personnel Policies Procedures and Practices: Key to
SAFE:
Computer
Facilities
Security,"
Computer
Krauss. L.I. Security Audit and
Field Evaluation for Comnrpater
Security Journal . Vol. 4, No. 1. pp. 63-68, 1986.
Systems. 1980.
Key Words: policy, personnel, management, methods.
methods.
and Information
Amacom, New
York,
58.
Key Words:
virus,
Key Words:
book, auditing,
techniques.
KUH-86
KEE-88 JUD-87
Keenan, T. "Emerging Vulnerabilities in Office Automation Security,"
Judd, T.C., and
H.W. Ward,
Jr.
Stockholm, 1983,
Contingency Planning."
Proc. 10th Natl.
Comp.
(2:
FAK-
.
Key Words:
vulnerabilities.
Key Words: Kinnon, A., and R.H. Davis "Audit and Security Implications of Electronic
JUI-89
Fimds Transfer," Computers
D.
Through System Management," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS089), 1989. pp. 418"Security Assurance
Security,
March 1986,
KUO-82 Kuong,
&
pp. 17-
23.
Key Words:
J.F.
Audit and Control of Computerized Systems, Management Advisory Publications, Wellesley
MA,
,
Hills,
1983.
auditing,
Key Words: book,
requirements.
422.
auditing, methods.
KIN-86
contingency,
recovery, management.
Juitt,
(5:
204-208
Conf.. (5: NCS-87a). 1987, pp. 379-383.
Key Words:
Comp. Sec. NCS-86A 1986. pp.
Proc. 9th Natl.
Conf
83), pp. 139-145.
Sec.
J.
"Research Toward Intrusion Detection Through Automated Abstraction of Audit Data,'
Proc. IFIP/Sec. '83 ,
"Return to Normalcy: Issues in
Kuhn.
auditing,
control
KNE-83
Key Words: methods,
Kneeer, D.C., and J.C.
management.
Lampe
"Distributed Data Processing:
KAR-85 Karabin.
Internal Control Issues
Safeguards,"
S.J.
"Data Classification for
EDPACS
.
and June
.
1985.
pp. 1-20.
Key Words: management.
J.F.
Line/Database Systems,
Management Advisory
Key Words:
MA,
Publications, Wellesley Hills, control, methods.
1983.
Key Words: book,
KOB-89 guidelines,
Kuong,
Controls for Advanced/On-
1983. pp. 1-14.
Security and Control."
EDPACS December
KUO-83
Kobus. P. Jr., and G.H. Rovin "C -Guard Computer Security Systems." Information Age, (U.K.), January 1989, pp. 4145.
Key Words:
policy,
techniques.
2-15
general.
concrol,
KUO-86b
KUO-85 Kuong, J.F. "What to Look for
When
Auditing Your Company's EDP Contingency and Recovery Plan for Business Continuity,"
LAN-85
Kuong,
COM-AND.
Computer Audit News & Developments September-
Lane, V., and
J.F.
"What Are
EDP
Audit Test
How to Them," COM-AND,
Objectives, and
Develop
If
Not
1986.
1984,
,
,
FIN-85), pp. 361-
(2:
369.
Key Words:
auditing, policy,
Key Words:
contingency,
recovery, management.
auditing,
guidelines, contingency,
KUO-86C Kuong,
recovery.
KUO-85a Kuong,
-
-
Developments July -August,
methods, management.
Key Words:
Insurmountable
Organizational Problems in Disaster Recovery Planning," Proc. IFIP/Sec. '84 Toronto.
&
Computer Audit News
,
October, 1985.
Step
J.
"The Formidable
LAP-86
J.F.
"Pinpointing Areas of High
Lapid, Y., N. Ahituv,
Exposure for Effective
and S. Neumann "Approaches to Handling Trojan Horse' Threats," Computers & Security September 1986. pp. 251-256.
COM-SAC,
Safeguards,"
J.F.
"Evolution of Information
Computer
Security, Auditing
Processing Technology, and
&
Controls,
Deficiencies in the Present
1,
1986, pp. A1-A4.
Volume
No.
13,
.
Internal Control
Methodologies," Computer Audit
COM-AND,
Key Words:
News
vulnerabihties, methods,
&
Developments NovemberDecember, 1985. ,
Key Words:
risk,
management.
LEC-83
KUO-88 Key Words:
control, methods.
KUO-86 Kuong, J.F. "Reducing Your Audit Risk Level and Improving Audit Option Reliability when Auditing Computer Based Systems,"
COM-AND,
Computer Audit News & Developments January-
Lechter,
Kuong, J.F. "Computer Viruses: Should the Audit and Security Professional
Be Concerned?,"
COM-AND, Computer
,
3, 1988, pp. 1-4.
Key Words:
Key Words:
virus, auditing,
methods.
KUO-86a Kuong, J.F. 'Towards a Unified View to the Building and Assessing of Internal Control in Computerized Systems," COM-AND, Computer Audit
News
&
Developments
,
March-April, 1986.
Key Words:
control, policy.
Firmware Development," IEEE Computer September 1983, ,
pp. 73-82.
Key Words: methods, management. LEE-88 Lee,
threats.
W.
"Automation of Internal
KUO-89
auditing, risk,
M.A.
"Protecting Software and
Audit
News and Developments No.
,
February, 1986.
threats,
techniques.
Kuong, J.F. 'Test Approaches and Techniques for Testing EDP Disaster Recovery Provisions," COM-AND. Computer Audit News and Developments No.
Control Evaluation," Proc. IFIP/Sec. '88 AustraUa, 1989, ,
(2:
CAE-89), pp. 391-406.
Key Words: control, management.
,
2,
Lrr-81
1989, pp. 1-7.
Litecky, C.R., and
Key Words:
contingency,
recovery, management.
L.E. Rittenberg
"The External Auditor's
Review of Computer Controls," Communications of
KUR-86
ACM May
Kurzban, S.A.
the
"Computer System Defenses"
295.
ACM
Security, Audit
Control Rev.
,
&
Winter 1986,
pp. 1-27.
Key Words: methods, techniques.
2-16
.
Key Words:
1981, pp. 289-
auditing, controls.
MAR-84
LOB-80 Lobel
Mar,
J.
"Risk Analysis in the 1980s," Proceedings, 1980 National Computer Conference, AFIPS Press, Reston,
VA,
1980, pp.
MEN-85a Menkus, B. "The Impacts of the Bell System Breakup on DP Disaster Recovery Planning," Computers & Security September 1985. pp. 219-222.
S.
"EDP Security & EDP Audit Team Work," COM-SAC. Computer
Security, Auditing and Control January 1984, ,
,
A1-A4.
831-836.
pp.
Key Words: risk, management.
methods.
Key Words:
Key Words:
auditing,
MAU-84
LOB-89
contingency,
recovery, management.
MEY-83
Lobel J. "Managing Information
Maude, T., and D. Maude "Hardware Protection Against
Meyer, M.M. "Checking References:
Security in the Space Age,"
Software Piracy,"
Worth
September 1989, pp. 195-198.
Communications of the ACM September 1984, pp. 950-959.
Key Words: management,
Key Words:
Age
Information
(U.K.),
,
software piracy.
It's
the Investment,"
Management, March
Security
1983, pp.
10-I-.
Key Words:
persormel,
methods, management.
policy.
MAY-87 LOT-80
Mayerfield. H.N., et
Lott,
Auditing the Data Processing Functions Amacom, New York, 1980. ,
Key Words:
MIC-83
al.
"M2 RX: Model Based
R.W.
Risk
Assessment Expert." AIAA No. 87-3080, Proc. 3d
"Microcomputers: A Checklist of Security and Recovery Considerations," Assets
Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 87-92.
Protection
Key Words: risk, management.
Key Words:
Aerosp.
May/June 1983, pp.
,
15-16.
auditing,
methods.
LUN-89
guidelines, PC,
MIG-87
MCA-89
Lunt, T.F.
"Real
Time
Detection," Proceedings,
IEEE Compcon
Spring
1989,
,
Migues,
McAfee, J.D. "Managing the Virus Threat,"
Intrusion
pp. 348-353.
Computerworld, February 13, 1989. pp. 89-96.
S.
"A Guide
to Effective
Risk
Management," AIAA No. 873078, Proc. 3d Aerospace Comp. Sec. Conf (5: lEE.
87b), 1987. pp. 66-86.
Key Words: virus, management.
Key Words: methods, techniques.
threats,
MCC-85
MAL-83
McCormack, W.G..
Malvik, C. "Security and the
Home
"The Audit of
EDP
Key Words:
m Backup."
EDPACS November
Computer," Information Age (UK), April 1983, pp. 87-90.
pp. 1-5.
Key Words:
Key Words:
.
1985,
MIL-85 Miller. J.E.
'Transaction Controls: Steps to
Take After the Equipment Has Been Secured," Computers & Security
requirements,
PC.
,
June 1985, pp. 139-
141.
auditing,
contingency.
Key Words:
MAR-83
MEN-85
Mar,
S.
"Long Range Plaiming
EDP
Audits,"
Computer
for
COM-SAC:
Security, Auditing,
and Control January 1983, ,
pp.
risk, guidelines.
Menkus, B. 'The EDP Auditor's Role in Computer Security," Computers & Security June
auditing,
MOE-88 MoeUer, R.
1985. pp. 135-138.
"Considering Security when Auditing Applications Under Development," Proc. IFIP/Sec.
Key Words:
:88, Australia, 1989, (2:
.
A1-A8.
Key Words:
control,
guidelines.
auditing,
CAE-
89), pp. 245-262.
methods.
management.
Key Words:
2-17
auditing, methods.
MUR-81
MOL-84
NAN-86
Molnar, L.
Murray,
"Disaster Recovery Testing,"
"Protecting Corporate Data
"Auditing
EDPACS November
with Off-Site Vault Storage,"
Security,"
Computerworld. March
1986, pp. 1-10.
.
1984,
pp. 1-6.
Nancekivell, B.D.
J.P.
16,
IBM System/38 EDPACS January ,
1981, pp. ID/l-ID/24.
Key Words:
Key Words:
contingency,
Key Words:
recovery.
NBS-81
recovery.
MOR-81
auditing, methods.
contingency,
ADP
Guidelines for
MUR-82
Morrison, R.M.
"Advanced Audit Concepts
A
for
Distributed System,"
Proceedings. Honeywell Security and Privacy
Symposium, April 1981, pp. 119-127.
Contingency Planning FIPS PUB 87, National Bureau of .
Murray, J.P. "Contingency Planning," Computerworld. May 10, 1982, pp. ID/36-ID/44.
Standards. Gaithersburg.
Key Words: Key Words:
contingency,
MD,
27 March 1981. contingency,
recovery, guidelines.
recovery.
Key Words:
NBS-83
auditing,
MUR-83
methods.
MOU-84 Moulton, R.T. "Data Security
Management
&
Computers
Is
Guidelines for Life Cycle
Murray, W.H.
Validation, Verification and
"Good Computer Security
Testing of Computer Software
Two
Practices for
A
Areas of
Current Concern: Personal
Responsibility,"
Security ,
February 1984, pp. 3-8.
Computers and Dial-Up Systems," Computer Security Journal
,
Fall/Winter 1983, pp.
77-88.
FIPS PUB 101, National Bureau of Standards,
MD,
Gaithersburg,
Key Words:
1983.
guidelines,
software.
Key Words: management, Key Words:
policy.
techniques,
MOU-84a
Security Certification and
MUR-83a
Moulton, R.T.
"A
NBS-83a Guidelines for Computer
methods, PC.
Practical
Approach
to
Accreditation
.
"Computer Security:
Gaithersburg,
Observations on the State of
27, 1983.
1984, pp. 93-100.
the Technology."
Key Words:
&
techniques,
PUB
102,
National Bureau of Standards,
System Security Devices," Computers & Security May ,
FIPS
Murray. W.H.
Security
,
MD,
September
Computers
January 1983, pp.
Key Words:
guidelines,
methods, certification.
16-23.
methods.
Key Words:
MOU-86
techniques,
Security Risk Management Model Builders Workshop
Moulton, R.T.
Computer Security Handbook: and Techniques for Preventing Data Loss or
MUR-84
,
Strategies
Murray,
Theft, Prentice-Hall, Inc.
"Surviving (and Profiting from) the Audit: Manager's View," Computerworld,
Englewood
Cliffs,
NJ, 1985
Key Words:
book, guidelines, techniques, methods.
J.P.
September 24. 1984, pp.
EDPACS
.
October 1980, pp.
1-6.
1988
Key Words:
proceedings, risk.
Nesbit, I.S.
"On Thin
management. Security Practices,"
26,
NES-85 auditing,
Murray, W.H.
"Good
National Bureau of Standards et al., Denver, CO, May 24-
ID/13-23.
Key Words:
MUR-80
NBS-88 Proceedings, 1988 Computer
methods.
Data
MUR-84a
Ice:
Micros and Datamation
Integrity."
November
1,
Murray, W.H. "Security Considerations for
Personal Computers,"
IBM
Key Words: methods,
Systems Journal Vol. 23. No.
techniques.
3,
.
1983. pp. 297-304.
Key Words:
requirements. PC.
2-18
Key Words:
.
1985. pp. 80-84. integrity,
PC.
,
NEU-82
PAS-86
Neugent, W. "Acceptance Criteria for
PER-81
Proceedings, 1982 National
A. "Contingency Planning Options Protect Corporate Data Assets," Computerworld.
Computer Conference. AFIPS
January 27. 1986. pp. 73-74.
Computer
Passori,
Security,"
Press, Reston,
VA,
EDP Security EDPACS April
"Optimizing the Function,"
,
1981, pp. 1-11.
Key Words: management,
1982, pp.
Key Words:
441-448.
Perley. E.H.
contingency,
policy.
recovery, management,
Key Words:
PER-81 a
methods.
guidelines,
Perry, W.E. Computer Control and Security J. Wiley & Sons,
methods.
PED-86
NOL-85 Nolan,
Pedigo,
M.
J.
,
Making Plans That Could Save Your Company." Computerworld, "Disaster Recovery:
"Disaster Recovery for
Online Systems," Proc. IFIP/Sec. '84 Toronto. 1984, (2: FIN-85), pp. 163-174. ,
May
contingency,
Perry,
Perry,
W.E.
"Computer Security:
Environment, Q.E.D.
Operational or Investment
Information Systems.
Cost," Proc. IFIP/Sec. '88 .
WeUesley
MA.
Hills.
1982, pp. 17 26.
Key Words: control, management.
1980.
CAE-89).
Key Words:
pp. 381-390.
PER-82a
book, control,
EDP
Key Words: management, PER-80a
methods.
Perry,
How
OTW-89 Otwell. K.. and B. Aldridge
"The Role of Vulnerability in Risk Management," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989. pp. 32-38. ,
Controls,
W.E. to
Test Internal Control
and Integrity in Computerized Systems Management Advisory Publications, ,
Wellesley
MA.
Hills.
ADP
Audit Areas
.
Auditors Foundation. Altamonte Springs. FL. 1980.
,
Publishing Co., Reston,
Key Words:
auditing,
guidelines.
Key Words: book,
risk,
PER-80C Management Guide Computer Security
management.
PAR-84
,
&
DB.
Parker.
"Safeguard Selection Principles."
Security
.
Computers
May
&
1984, pp. 81-
Sons,
New
to J.
Wiley
York. 1980.
Key Words: book, methods.
92.
Key Words:
Kuong
Effective
Computer Audit
Practices
- ECAP MAnual
MA.
.
1982.
Key Words: book, methods.
VA,
1981.
risk,
controls.
Publications, Wellesley Hills,
W.E.
EDP
Management Reston
Key Words: book,
1982.
Management Advisory
Selecting
Computer Security
MA.
Perry, W.E.. and J.F.
integrity.
Perry.
DB.
Hills,
PER-82b control,
PER-80b Parker,
WeUesley
1980.
risk.
PAR-81
Management
Advisory Publications,
Key Words: book, vulnerabilities,
W.E. and J.F. Kuong Risk Analysis and
Perry,
database.
Key Words:
W.E.
.
Controls in Data Base
Australia, 1989. (2:
control,
"Developing Computer Security and Control Strategy," Computers & Security January
PER-80 Orlandi, E.
Key Words: book,
PER-82
contingency,
recovery, management.
revovery.
ORL-88
York, 1981.
methods.
12. 1986. pp. 49-60.
Key Words:
Key Words:
New
guidelines,
methods.
2-19
guidelines,
auditing,
PRA-85
PER-82C and
Perry, W.E.,
J.F.
Kuong
Generalized Computer Audit Software: Selection and Application.
Management
Advisory Publications, Wellesley Hills. MA, 1982.
QUA-89
Prause. P.N.. and
Quant. H.
G.I. Isaacson
"Virus vs. Vaccine." Information Age . April 1989, pp. 138-143.
"Protecting Personal
Computers: A Checklist Approach." Computer Security Journal Winter 1985, pp. 13,
Key Words:
virus, techniques.
24.
Key Words: book,
How
Key Words: PRE-89
PER-82d Perry,
RAO-89
auditing,
software, guidelines, methods.
W.E. and
J.F.
Kuong
Test Internal Control
to
guidelines, PC.
Rao. K.N. "Security Audit for Embedded Avionics Systems." Proc. 5th
CM.
Preston,
Applied
Security Applicat. Conf. (4: IEE-89c), 1989, pp. 78-84.
Age
Key Words:
.
"Artificial inteUigence
and Integrity in Computerized Systems Management Advisory Publications, Wellesley Hills. MA, 1982.
217-221.
Key Words: book,
Key Words: methods,
"Security Controls in a
techniques.
Manufacturing AppUcations System." TeleSystems Journal March/April 1984, pp. 33-37.
,
to
Information System
Security." Information
RAT-84 Rattner.
control,
guidelines.
PER-83 Perry,
PRI-80
W.E.
Prichard,
Ensuring Data Base Integrity , J. Wiley & Sons, New York,
Key Words:
Key Words:
EDP Threat Assessment Concepts and Planning Guide SIP No.2, Royal Canadian Mounted Police. Ottawa, January 1982.
f)ersormel,
management.
PHE-86 'Top Management's Role Disaster Recovery," Data
in
&
Prigge, E.
Key Words:
"Security and Integrity Issues
threats, risk.
in
Communications Security
Summer
&
Security, Auditing
Controls
,
October 1984, pp.
A7-I-.
Key Words:
management.
requirements, integrity.
"EDP
awareness,
W.V.
Management
EDPACS
,
--
Yestingsmeier
A
Function,"
February 1984. pp.
Management -
A
to Security in Electronic
Key Funds
Transfer Systems," Computers
&
Security 135-140.
PRU-86 Benefits Control
Richards, R.M., and
"Risk
recovery, policy,
Pickard,
RIC-86 J.
contingency,
PIC-84
book, guidelines,
End-User Computing,"
Computer
,
1986, pp. 16-19.
Key Words:
,
PRI-84
Phelps, N.L.
Processing
controls, methods.
RCM-82
March 1980.
integrity,
methods.
.
Unionization," Information pp. 69-74.
Key Words: book,
J.
J.
"Computer Security and Privacy (UK),
1983.
auditing, methods.
(U.K.). September 1989. pp.
,
June 1986, pp.
Pryijm, R.A.M.
"The Audit of Software Maintenance," EDPACS
August 1986, pp.
Key Words:
risk,
management,
methods.
,
1-5.
RID-86
1-5.
Key Words: Key Words:
control,
software.
management, policy.
PWA-84 POR-81 and W.E. Perry EDP Controls and Auditing, 3d Ed. Kent Publishing, Porter, W.T.,
Managing Computer Risks: Guide for the Policymaker,
MA,
threats,
Key Words: book,
auditing,
,
1986, pp. A5-A6.
Key Words: book,
1981.
A
Price Waterhouse, Inc., 1984.
,
Boston,
C, and J. Austin "Updating Security, Auditing and Quality Assurance — The Dedicated On-Line Computer Security Monitor." COM-SAC. Computer Security, Auditing & Controls Volume 13, No. 1, Riddle.
auditing,
risk,
magagement,
guidelines.
methods, control, techiuques.
2-20
Key Words:
auditing, methods.
RUT-84
ROB-83 M.B.
Roberts,
EDP EDP
A
Guide for Auditors and Accountants J. Wiley & Controls:
,
Sons,
New
SCH-80
Ruthberg. Z.G., and
York. 1983.
Key Words: book,
"Policy Structure Gives the
Overview of Computer Security Certification and
Basis for
Accreditation .
auditing.
Schweitzer. J.A.
W. Neugent
SP 500-109,
"Auditor's
Computer Fraud," Commercial Law Journal
May
in
,
1984.
Key Words: policy, management. certification,
SCH-80a
methods.
Schweitzer, J.A.
RUT-86
.
1981. pp. 172-178.
Key Words:
Management December 1980, pp. 18-25.
Key Words:
Watchdog Role
Effective Security
National Bureau of Standards, Gaithersburg, MD, April
ROD-81 Rodgers, G.L.
An
Program," Security
"Personal Computing and Data
Ruthberg, Z.. and B. Fisher (Eds.)
Work
Security." Security World, June
1980. pp. 30-35.
Scheme for EDP Audit and Computer
auditing, crime.
RUB-85
Priority
Rubin, H. "Patient Auditing with Potent Results," Security Audit Control Review, Winter
&
NBSIR
86-3386, National Bureau of Standards, Gaithersburg, MD, March 1986. Security
PC.
guidelines,
SCH-81 Schweitzer, J.A.
"Computing Security Risk Analysis
Key Words:
1985, pp. 4-9.
Key Words:
Security
~ Is It Worth It?." Management, August
1981. pp. 104-106.
Key Words:
SAA-89
auditing,
methods.
RUL-80 RuUo, T.A. (Ed.) Advances in Computer Security Management, Vol.
Heyden
&
and D.B. Parker
Saari,
J.,
"New
Baseline Methodology
Applied to Reviewing Security Experiences from USA and
Age
Finland," Information 1,
Son. Philadelphia,
(U.K.), September 1989. pp.
195-198.
SAR-81 Sardinas, J.L.,
Ruthberg, Z.G. (Ed.) Audit and Evaluation of
EDP
Computer Security
1981.
11:
System
Jr.,
.
Wiley
&
Sons.
New
J.
York,
MD,
April
Key Words: book,
auditing.
SCH-82a Schmitt,
W.R.
Computer Security Journal
,
SAR-82 Sardinas, J.L., and
proceedings,
1982.
Winter 1982, pp. 23-29.
R.J.
auditing.
.
"Data Security Program Development: An Overview,"
National Bureau of Standards, 1980.
Age
Wobum, MA,
et al.
Auditing Primer .
Vulnerabilities and Controls
Workshop Report SP 500-57,
Key Words:
Schweitzer, J.A.
Managing Information Security - A Program for the
Key Words: book, policy, management, methods.
management.
RUT-80
management.
Electronic Information
Key Words: awareness, methods, international.
Key Words: book,
risk,
SCH-82
Butterworth.
1980.
Gaithersburg,
Key Words:
Asebrook
"Bridging the
DP
Gap Between
Professionals and
Auditors," Journal
,
Key Words: policy, management.
Computer Security
Winter 1982. pp. 91-
SCH-83 Schweitzer,
J. A.
Protecting Information in the Electronic Workplace:
97.
to the
Key Words:
auditing,
A
Guide
Managers Reston ,
Publish.. Reston,
VA,
1983.
persoimel.
Key Words: book, guidelines, methods, management.
2-21
SKU-84
SCH-83a Backup Data Mangement
Lackner "The Implementation of Concurrent Audit Techniques
"Evaluating Services,"
SOC-83
Skundra, V.J., and
Schmidt, P.
F.J.
,
July 1983, pp. 30+.
in
Key Words:
Advanced
EDPACS
contingency,
recovery.
April 1984, pp. 1-
,
Key Words:
auditing, methods,
SRI-81
auditing,
Srinivasan, C.A., and
techniques.
"Personal Workstation
P.E. Dascher
Automation Security Vulnerabilities," Computers
&
Security , February 1984, pp.
21-28.
Key Words:
pp. 5-15.
PC.
Key Words: JA.
December 1983,
Systems,"
10.
SCH-84 Schweitzer,
EDP
Socha, W.J. "The Auditor's Own Microcomputer," EDPACS,
vulnerabilities,
PC.
SMI-80
"Computer Security and Problems and
Smith, J.E.
Integrity:
"Risk Management for Small Computer Installations," in RuUo, T.A. (Ed.), Advances in Computer Security Management, Vol. 1 Heyden,
Prospects," Infosystems
integrity, requirements,
Philadelphia, 1980, pp. 3-32.
methods.
,
,
May
1981, pp. 116-123.
Key Words:
awareness,
SHA-82 Shaw,
J.K., and S.W. Katzke Executive Guide to ADP Contingency Planning , SP
500-85, National Bureau of Standards, Gaithersburg,
MD,
January 1982.
Key Words: risk, management, methods.
contingency,
St.Clair, L.
Computer
"Security for Small
SNO-84
EDPACS November
Systems,"
Snow, M. 'The First-Time
EDPACS Key Words:
STC-83
,
EDP
,
1983. pp. 1-10. Audit,"
February 1984, pp.
6-8.
Key Words: awareness, methods, PC.
guidelines, recovery,
Key Words:
management.
STE-84
auditing,
Steinauer, D.D.
guidelines.
SIL-83
SNO-87
Silverman, M.E.
"Contingency Planning: The Backup Site Decision," Computer Security Journal ,
Spring 1983, pp. 43-50.
Snow, D., and
R.J. Aguilar
"A Mission Driven Process for the Risk Management of
ADP
Systems,"
AIAA
contingency,
recovery, management,
Comp.
Sec.
Conf
.,
(5:
lEE-
Summer
1984, pp. 33-
Key Words: awareness, PC, methods, requirements, policy.
87b), 1987, pp. 184-154.
STO-80
methods.
Key Words: SIZ-89 Sizer, R.
"Computer Security — A Pragmatic Approach for Managers," Information Age (U.K.) January 1989, pp. 88,
management, techniques,
"How
methods.
Software,"
to
Audit Libray Control
EDPACS. May
1980, pp. 1-10.
SOB-84 Sobol, M.I.
Key Words:
"Data Communications Primer
guidelines.
EDPACS
March 1984,
pp. 1-5.
Key Words:
auditing,
policy,
guidelines.
Stokel, K.J.
risk,
for Auditors,"
97.
Key Words: management
Journal , 42.
No.
87-3077, Proc. 3d Aerospace
Key Words:
"Security of Personal Computers: A Growing Concern," Computer Security
networks, methods.
auditing,
,
STR-82 Streeter.
B.
"People.
More
than the
Technology Are
EFT
Security,"
Still
ABA
Key
to
Banking
Journal . July 1982, pp. 32-37.
Key Words:
2-22
jjersormel. threats.
TOM-86
TAL-81
VAN-87 Van Meter,
Talbot, J.R.
Tomkins, F.G., and R.Rice
Management Guide to Computer Security Halsted
"Integrating Security Activities
J.D. Veatch
into the Software
"Space Station Program Threat and Vulnerability Analysis," AIAA No. 87-3082. Proc. 3d Aerospace Comp. Sec. Conf..
Press/J.
,
&
Wiley
Sons,
New
York, 1981.
Key Words: book, management, guidelines. TEA-84 Teas, H.
Development life Cycle and the Software Quality Assurance Process," Computers & Security September 1986, pp. 218-242. ,
(5:
S.D., and
IEE-87b), 1987, pp. 104-
107.
Key Words: management,
Key Words:
software.
vulnerabilities.
threats,
"Self-Audit of Microcomputer
EDPACS
Controls,"
December 1984,
TOP-84
,
pp. 1-6.
VDB-84
Toppen, R.
The Audit of Communication "InFmite Confidence:
Key Words:
auditing,
PC,
Networks" Computers
methods.
Security
TIN-89
,
November
&
1984, pp.
,
1984, pp. 171-185.
303-313.
Key Words:
Ting, T.C. "Application of Information
Security Semantics: A Case of Mental Health Delivery," 11.3 (Data Proc. IFIP
WG
base)
vd Berg, B., and H. Leenaars "Advanced Topics on Computer Center Auditing," Computers & Security October
Workshop
(6:
M-89),
1989.
Key Words:
VOU-88
networks.
Vouitilainen, R.
TRO-84
"Experience in the Use of the
SBA
Troy, G. "Thwarting the Hackers,"
Improving Computer Security
Datamation July
in Finland," Proc. IFIP/Sec.
,
1,
1984.
Key Words: methods,
Vulnerability Analysis for
•88 , Austraha, 1988, (2:
Key Words:
database.
auditing, methods.
auditing,
hackers,
CAE-
89), pp. 263-271.
techniques.
TOD-89
Key Words:
Todd, M.A., and C. Guitian
Computer Security Training Guidelines
.
SP 500-172,
WAC-89
Troy, E.F. Security for Dial-Up Lines ,
National Institute of
SP 500-137,
Standards and Technology,
of St^dards, Gaithersburg,
Gaithersburg,
MD, November
MD,
National Bureau
,
500-166, National Institute of Standards and Technology,
Key Words: awareness,
Wack, J.P., and L.J. Camahan Computer Viruses and Related Threats: A Management Guide
SP
1986.
1989.
Key Words:
risk, international.
TRO-86
techniques,
network.
Gaithersburg,
MD. August
1989.
guidelines.
VAN-85 TOI-87
van Eck,
Key Words:
W.
Toigo, J.W.
"Electromagnetic Radiation
Disaster Recovery Planning:
from Video Display Units: An Eavesdropping Risk?," Computers & Security December 1985, pp. 269-286
Managing Risk and Catastrophe in Information
Systems, Yourdan Press,
Englewood
Cliffs,
,
risk,
recovery.
WAD-82 Wade.
J.R.
EDP Risk Assessment," Sectirity 'The Basics of
Management March 1982,
NJ, 1987
,
Key Words:
Key Words:
viruses,
guidelines.
threats,
pp.
56-70.
vulnerabilities.
Key Words:
risk,
management.
WAI-84 Wainwright, 0.0. "Security
Management of
Future," Security
March 1984,
pp. 47-51.
Key Words: management, policy.
2-23
the
Management,
WEB-81
WAR-81 Wardlaw, J. "Pattern Matching for Auditors,"
EDPACS March .
1981, pp. 1-12.
Key Words:
WIN-89
Weber, R.
EDP
EDP
Auditing: Conceptual
Winkler, J.R., and W.J. Page Detection in Trusted Systems," Proc. 5th Security Applicat.
Key Words: book,
Conf. , 39-45.
,
auditing,
techniques.
Anomaly
Foimdations and Practice McGraw-Hill, Highstown, NJ, 1981. auditing,
"Intrusion and
IEE-89c), 1989, pp.
(4:
methods, techniques,
WAR-83
&
Key Words:
,
risks, techniques.
WAR-83a Ward, G. "Micros Pose Mainframe Size Security Problems," Data Mangement, July 1983, pp.
38+
Key Words:
vulnerabilities,
PC.
WAR-84 Ward,
Key Words:
management.
Warren, A.D. "Evaluating Risks of Computer Fraud and Error," Computers Security June 1983, pp. 231-143.
WHI-89 White, S.R. and D.M. Chess Coping with Computer Viruses and Related Problems ,
RC
14405,
IBM Thomas
WOD-88 Woda, A. "Enstiring Reliability and Integrity of
J.
Data
in
EDP COM-
Watson Research Center,
Application Systems,"
Yorktown, NY, January 30, 1989
SAC, Computer
&
Sec. Auditing
Control. No. 2, 1988, pp.
A1-A6.
Key Words:
viruses,
Key Words:
guidelines.
integrity,
methods.
WOF-83
WIE-86 Wiesand, C.G. "An Audit Approach to Microcomputers," EDPACS
May
CM,
auditing, threats,
methods, techniques.
,
1986, pp. 1-18.
Wofsey, M.M. (Ed.) Advances in Computer Security Management, Vol. 2 J. Wiley & Sons, New York, 1983.
Key Words:
and
R.D. Paterson "Surviving (and Profiting from) the Audit: Auditors View," Computerworld,
auditing,
Key Words: book, general, methods, management,
methods, PC.
WIL-84
techniques.
Wilkes, M.V.
Management and
WON-85
September 24, 1984, pp.
"Security
ID/13-18.
Protection:
Key Words:
Approach," The Computer Journal (UK) February 1984,
Management and Computer
pp. 3-7.
Security,"
auditing,
A
Personal
,
management.
Wong, K. "Computer Crime
Security
WAR-84a
Key Words: management,
Warren, A. "Auditing Computer Systems," Information Resource Management (UK), ,
March 1984,
Key Words:
,
pp. 36-39. auditing,
methods.
WAR-86 Ward, G.M., and J.D. Harris Managing Computer Risk: A Guide for the Policymaker, J. Wiley & Sons, Inc., 1986.
—
Risk
Computers & December 1985, pp.
,
287-295.
policy, methods, guideUnes.
Key Words: WIN-83 Winters,
crime, risk,
methods, management.
CM.
"Auditing Data
WON-86
Commimications Networks," EDPACS August 1983, pp.
Wong. K.
1-9.
Computerization."
,
"The Risks Involved in
The Computer Law and Sec.
Key Words:
auditing,
networks.
Report, March-April 1986, pp. 15-18.
Key Words: laws.
Key Words: book, risk, methods, guidelines, management.
2-24
threats, risks,
WOO-86
WON-86a
YAR-84
Wong, K.
Wood. C.C.
Yarberry,
Computer Security Management," EDPACS July
"Establishing Internal
Technical System Security
1986, pp. 7-10.
Standards." Computers
the EDP Audit Fimction - A Practical Approach," EDPACS May
"Effective
,
Security
Key Words: management,
,
&
,
June 1986, pp. 193-
1984, pp. 6-8.
200.
Key Words: auditing, management, personnel.
methods.
Key Words:
WOO-83
guidelines,
Wood, C.C. "Enhancing Information Security with the Information Resource Management Approach," Computers & Security
,
November 1983,
W.A.
"Managing
pp.
policy,
management.
YAR-84a
WOO-86a
Yarberry,
Wood, C.C. "Quantitative Risk Analysis
System,"
and Information System Security," Data Processing
pp. 1-5.
Communications Security Winter 1986, pp. 8-11.
223-229.
W.A.
"Auditing the Change Control
&
EDPACS
Key Words:
,
,
June 1984,
auditing, methods,
techniques.
Key Words: management, Key Words:
methods.
YAR-84b
risk, techniques.
Yarberry,
WOO-87
WOO-84 Wood, M., and
T. Elbra
System Design
for
Protection
.
Data
National
Computer Centre (UK), J. Wiley & Sons, Chichester,
Wood, C.C,
Middle Man," EDPACS September 1984, pp. 1-4. the
et al.
Computer Security: A Comprehensive Controls Checklist J. Wiley & Sons.
Key Words:
,
Somerset, NJ, 1987
methods.
1984.
Key Words: book,
Key Words: book, controls, methods, guidelines.
techniques.
WYS-84
WOO-85
Wysong, E.M.. and
I.
DeLx)tto
Wood. C.C.
Information Systems Auditing
"Floppy Diskette Security Measures." Computers & Security September 1985. pp. 223-228.
Proceedings. International
Conference Milan, 1983, North-Holland, Amsterdam.
Key Words:
Key Words:
.
techniques. PC.
W.A.
"Audit Software: Eliminating
,
1984. proceedings,
auditing, methods,
management.
2-25
.
,
auditing, software,
3.
Foundations
This section cites publications that emphasize fundamental principles, concepts, and
models of computer
security.
ADK-89
BEN-89
Adkins, M.M.,
et al.
"The Argus Security Model," Proc. 12th Natl.
Conf.
.
(5:
Comp.
Sec.
NCS-89), 1989,
pp. 123-134.
BIS-89
Benson, G., W. Appelbe, and I. Akyildiz "The Hierarchical Model of Distributed Systems Security," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b),
M. "A Model of
Bishop,
Security
Modeling," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989, pp. 46-52 .
.
Key Words: models,
Key Words: models,
pp. 194-203.
theory.
description.
Key Words: model,
BAD-89
BOE-84 Boebert, W.E.
hierarchical, network.
"On
Badger, L.
"A Model
BER-87
for Specifying
Multi-Granularity in Integrity PoUcies," Proc. 1989
Symp. on Sec.
&
IEEE
Privacy
,
(5:
IEE-89b), pp. 269-277.
Key Words:
models,
D.M.
'Towards a Formal Basis for the Formal Development Method and the InaJo Specification Language," IEEE Trans, on Software Engr. .
February 1987, pp. 184-200.
integrity, policy.
BEL-88
Key Words:
BeU. D.E. "Concerning 'Modeling' of
Computer
Security," Proc.
1988 IEEE Symp. on Sec. Privacy
Berry,
.
(5:
13.
Key Words: modeling,
Bishop,
M.
Proc. 8th National
Systems," Proceedings, 8th
18-27.
take-
Sec.
&
Privacy
,
Bishop, (5:
(5:
Comp.
Sec.
NCS-85), 1985, pp.
Key Words:
policy, integrity,
methods.
BOE-85a C.T. Ferguson
"A
BIS-88
IEE-88a), pp. 212-216.
,
Boebert, W.E., and
"Security Policy Modeling for
IEEE
capability,
Symposium on
grant.
the Next-Generation Packet
(5:
Practical Alternative to
Conf.
Key Words: models,
BeU, D.E.
Symp. on
Key Words: models,
MLS
"Hierarchical Take-Grant
,
BEL-88a
,
Hierarchical Integrity Policies,"
Operating System Principles December 1981, pp. 109-122.
theory, policy.
Sec. Progr.
DOD-84), 1984, pp. 291-293.
Boebert. W.E., and R.Y. Kain
BIS-81
ACM
Switch," Proc. 1988
DoD Comp.
"A
&
-
Property," Proc. 7th Seminar,
BOE-85
formal,
specification.
IEE-88a), pp. 8-
the Inability of an
Unmodified Capability Machine to Enforce the
M.
Partial Solution to the
Discretionary Trojan Horse
'Theft of Information in the Take-Grant Protection Model,"
Problem," Proc. 8th Natl.
Comp.
Sec. Conf. . (5:
NCS-
85), 1985, pp. 141-144.
Key Words: models, poUcy,
Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),
network.
pp. 194-218.
Key Words: discretionary, method.
Proc.
,
Key Words: models,
take-
BOE-86
grant.
Boebert, W.E., R.Y. Kain, and
W.D. Young "The Extended Matrix Model of Computer Security," Software Engr. Notes August
ACM
,
1985, pp. 119-125.
Key Words: models,
3-1
technique.
BUR-89
BOS-89 S.H.
COH-89
Burrows, M., M. Abadi, and
Boshoff. W.H., and
von Solms
R.
"A Path Context Model for Addressing Security in Non-Secure Environments," Computers Security August 1989, pp. Potentially
Needham
"A Logic of
ACM &
Authentication,"
Operating Systems
Review December 1989, pp. ,
Cohen, F. "Models of Practical Defenses Against Computer Viruses." Computers & Security April .
1989. pp. 149-160.
1-13.
Key Words: models,
,
Key Words:
417-425.
authentication,
virus,
methods.
theory.
Key Words: models,
CSF-88
policy,
CAR-84
methods.
Proceedings,
BOT-83
Transnational Data Report,
Workshop Franconia, NH, June 1988, Report M88-37. The Mitre Corporation,
December 1984,
October 1988.
Problems in
"Intractable
Bottom, N.R.
Computer
Jr.
"An Informational Theory of
November
Security ,
&
Computers
Security,"
Security,"
pp. 472- 474.
,
1983, pp.
Key Words:
275-280.
theory, models,
Key Words: models,
Key Words:
proceedings,
models, theory, methods.
policy.
theory.
DAS-89
CHE-88 BRE-89
Cheng. P.-C. and V.D.Cligor
"A Model
Brewer, D.F.C., and M.J.
The Computer
Security Foundations
Carroll, J.M.
Nash
for Secure
Distributed Computation in
"The Chinese Wall Security Policy," Proc. 1989 IEEE Symp. on Sec. «fe Privacy (5:
Heterogenous Environment," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b),
IEE-89b), pp. 206-214.
1988, pp. 233-241.
Key Words: models, poUcy,
Key Words: model,
,
.
networks.
Dasher. D.N. "Modular Presentation of
Hardware: Bounding the Reference Monitor Concept," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-89). 1989. pp. 591-600. ,
Key Words: models, methods,
MLS.
theory.
CLA-87
BUD-83
Clark. D.D., and D.R. Wilson
DIO-81
"A Comparison of
Dion, L.C.
Model," Proc. 1981 IEEE
International Journal of
Commercial and Military Computer Security Policies," Proc. 1987 IEEE Symp. on
Computer and Information
Sec.
Budd, T.A. "Safety in Grammatical Protection Systems,"
Sciences
,
Vol. 12, No.
&
Privacy
(5:
.
IEE-87a),
pp. 184-194.
6,
Key Words: models, poUcy,
Symp. on Sec.
&
Privacy
,
(5:
IEE-81), pp. 49-55. theory.
models. poUcy.
DIV-88
integrity.
DiVito. B.L.
safety.
CLA-88
BUR-88
"Derived Information
Clark, D.D. and D.R.
Burrows, M., R. Needham, and M. Abadi
Computer
"Authentication:
Postscript,
A
Sec. Conf.
for
Uth (5:
.
Natl.
Sensitivity as a
Comp.
CSF-88).
Key Words: models, techniques.
Key Words:
models, integrity.
Los Altos, CA,
1988, pp. 325-342.
proceedings,
theory, authentication,
methods.
3-2
Comp.
NCS-88a),
1988. pp. 14-27.
,
Modeling
Technique." Proc.
Sec.
Foundat. Workshop . 1988.
Integrity."
Morgan Kaufmann
Key Words:
WUson
Model
"Evolution of a
Practical
Study in Belief and Action," Proceedings, 2nd Conference on Theoretical Aspects of Reasoning About Knowledge Publishers,
Protection
Key Words: models,
1987, pp. 413-431.
Key Words:
"A Complete
(3:
DOB-89
FOL-89
Dobson,
and
J.E.,
JA. McDermid "A Framework for Expressing
&
Privacy
.
(5:
"A Model of Secure Information Flow," Proc. 1989
IEEE Symp. on
Models of Security Policy," Proc. 1989 IEEE Symp. on Sec.
GLA-87
Foley, S.N.
Sec.
&
Privacy (5: IEE-89b), pp. 248-258.
Multi-Level Secure System,"
,
IEE-89b),
ACM
pp. 229-239.
.
Key Words: models, methods, general.
theory,
Key Words:
DOB-89a J.
"Conversational Structures as
Means
of Specifying
Security Policy," Proc. IFIP
WG
,
No.2, 1987,
Freeman, J., R. Neely, and G. Dinolt "An Internet System Security Policy and Formal Model," Sec.Conf. .
(6: IFI-89),
1989.
formal,
specifications.
Proc. 11th Natl.
11.3 (Data Base)
Workshop
5.
pp. 151-184.
flow.
FRE-88
a
on Computing
Trans,
Systems Vol.
Key Words: models,
Dobson,
Glasgow, J.J., and G.H. McEwen 'The Development and Proof of a Formal Specification for a
(5:
Comp.
NCS-88), 1988,
pp. 10-19.
GLA-88 Glasgow, J.J., and G.H. MacEwen "Reasoning About Knowledge in Multi-level Secure Distributed Systems," Proc.
1988 IEEE Symp. on Sec.
Key Words:
Key Words: model,
specification,
methods.
Privacy
formal,
network.
Eloff. J.H.P.
Fugini, M., and G. Martella
Specification
"The Development of a Language for a
Model
Computer Security System," Computers & Sectirity June
Design," Computers
"ACTEN:
A
Conceptual Systems
for Security
&
1985, pp. 143-147.
Security , October 1984, pp. 196-214.
Key Words:
Key Words: model,
,
specification,
"A
al.
Unwinding
in
Proc.
Comp. Sec. Foundat. Workshop H 1989, (3: BEE-
Petri
Information Systems , Vol. 13, No. 1, 1988. control.
GAS -89
infCTence, methods.
M.
IEEE Cipher
Foley, S.N.
Analysis,"
"A Universal Theory of Information Flow," Proc.
1989, pp. 32-36.
&
Privacy (5: IEE-87a), pp. 116-121.
Key Words:
,
Jan.
flow.
theory,
,
89a), pp. 64-70. specification,
methods.
GOG-82
GLA-85
Goguen.
Glasgow, J.I., and G.H. MacEwen
"A Two-Level
Security
J.A.,
and
"Security Policies
Model
Secure Network," Proc. 8th Natl. Comp. Sec. Conf. for a
,
(5:
Comp. Sec. Foundat. Workshop E 1989. (3: lEE-
Key Words:
flow, techniques.
,
Key Words: models,
Glasgow, J.I., and G.H. MacEwen Integrity Specification," Proc.
"An Optimization for Automated Information Flow
1987 IEEE Symp. on Sec.
theory,
"Obligation as the Basis of
Gasser,
FOL-87
Key Words: models, MLS.
GLA-89 Key Words: model,
Key Words: models,
pp. 139-146.
Net Model of Access
.
89a), pp. 22-28.
GLA-88a
.
Control Mechanisms,"
LOCK,"
models, theory,
Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),
Fugini, M.G., and G. Martella
"Noninterference and
Key Words: MLS.
Distributed Systems," Proc.
theory.
FUG-87 Fine, T., et
&
IEE-88a), pp. 122-
Glasgow, J., G.H. MacEwen, and P. Panangaden "Reasoning about Knowledge and Permission in Secure
methods.
FIN-89
(5:
128.
FUG-84
ELO-85
,
J.
&
Meseguer, Security
Models," Proc. 1982 IEEE
&
Privacy Symp. on Sec. IEE-82), pp. 11-20.
,
(5:
NCS-85), 1985, pp. 56-63.
Key Words: models,
Key Words: models, network.
3-3
theory.
policy,
GOU-84
HAR-88a
HAI-84
Gougen, J.A., and J. Mesgeur "Unwinding and Inference Control," Proc. 1984 IEEE Symp. on Sec. & Privacy (5:
Haigh, J.T.
IEE-84), pp. 75-86.
Progr. , (5:
,
Security Policy Models," Proc.
Harkness, W., adn P. Pittelli "Command Authorization as a Component of Information
7th Seminar,
Integrity." Proc.
"Comparison of Formal
DoD Comp.
Sec.
DOD-84), 1984,
pp. 88-111.
Key Words: model,
Comp. Sec. Workshop 1988, (3:
Foundat.
,
CSF-88). pp. 201-226.
inference,
Key Words: models,
theory.
theory,
general.
Key Words:
integrity,
techniques.
GOV-85
Comp.
Sec. Conf.
.
(5:
HEA-89
HAI-86
Gove, R.A. "Modeling of Computer Networks," Proc. 8th Natl.
NCS-
Haigh, J. and W.D. Young "Extending the Noninterference Version of
85), 1985, pp. 47-55.
MLS
Key Words: models, methods, netowrks.
239.
SAT," Proc. 1986 IEEE Symp. on Sec. & for
Privacy ,
Heany,
et al.
J.,
Model Development
"Security
Environment," Proc. 5th Security Applicat. Conf. , (4: IEE-89c), 1989, pp. 299-307.
IEE-86), pp. 232-
(5:
Key Words: models, techniques.
Key Words: models, MLS,
GRO-84 Grove, R.A. "Extending the Bell & LaPadula Security Model," Proc. 7th Seminar, DoD
Herlihy, M.P.. and J.M.
HAI-87
Comp. Sec. Program (5: DOD-84), 1984. pp. 112-119. ,
Key Words: MLS.
HER-89
methods.
models, theory,
Wing
"Specifying Security
Haigh, J. and W.D. Young "Extending the Noninterference Version of
MLS
for
SAT," IEEE Trans,
on Software
Constraints with Relaxation
Comp. Sec. Workshop n 1989,
Lattices," Proc.
Foundat. (3:
,
IEE-89a), pp. 47-53.
Engr., February
Key Words:
1987, pp. 141-150.
specification,
methods.
Key Words: models, MLS,
GUT-87 Guttman,
IEE-89
methods.
J.
"Information Flow and Invariance," Proc. 1987
&
Privacy Symp. on Sec. IEE-87a). pp. 67-73.
Key Words: models,
The Computer
Proceedings,
IEEE ,
(5:
flow,
HAR-85 Harrison,
Franconia,
NH,
IEEE
Protection in Operating
Computer Society Press, Washington, DC, June 1989.
Systems," in M.C. Yovits,
Advances in Computers, Academic Press,
New
J., and M. Nadel "What Needs Securing," Proc.
11,
June 11-14, 1989,
Vol. 24
GUT-88
Workshop
M.A.
'Theoretical Issues Concerning
Ed.,
theory.
Security Foundations
.
York, 1985.
Key Words: proceedings, models, theory, methods.
Guttman,
Comp. Sec. Foundat. Workshop 1988, (3: CSF-
Key Words: models,
theory,
Key Words: models,
HAR-88 theory.
J.
"Security Specifications," Proc.
,
88), pp. 34-57.
JAC-88 Jacob,
general.
1988 IEEE Symp. on Sec.
Hartman, B.A. "A General Approach to
Privacy
,
(5:
&
IEE-88a), pp. 14-
23.
Tranquility in Information
GUT-89 Guttman, J.D. "The Second Computer Security Foundations Workshop," IEEE Cipher Fall 1989, pp. 15-26.
Key Words:
Flow Analysis," Proc. Comp. Sec. Foundat. Workshop ,
1988,
(3:
Key Words:
specification,
methods.
CSF-88).
JAC-88a ,
Key Words: models,
flow,
Jacob, J.L.
"A Security Framework." Proc. Comp. Sec. Foundat. Workshop 1988, (3: CSF-88).
methods.
awareness,
.
pp. 98-111.
models.
Key Words: models, general.
3-4
theory,
Jacob,
"On
KOR-88a
KAT-89
JAC-89 J.
the Derivation of Secure
Components," Proc. 1989 IEEE Symp. on Sec. &
Katzke, S.W., and
Korelsky, T., et
Z. G. Ruthberg (Eds)
"Security Modeling in the
Report of the 1987
Ulysses Enviroimient," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 386392.
Workshop on Integrity Policy in Computer Information System SP 500-
Invitational
Privacy (5: IEE-89b), pp. 242-247. .
,
al.
,
160, National Institute of
Key Words: models,
theory,
methods.
Standards and Technology, Gaithersburg,
Key Words:
JAC-89a Jacob,
MD,
1989.
techniques.
integrity, policy.
the
KEE-88
Use of
"A Model
Separability for Detection of
Keefe, T.F.. W.T. Tsai, and
Covert Channels," IEEE Cipher Summer 1989, pp.
M.B. Thuraisingham
25-33.
for Object-Oriented Systems,"
"A
,
covert channel,
methods.
Johnson, D.M., and F.J.
Model
Comp.
Sec.
Conf.. (5: NCS-88). 1988, pp. 1-9.
JOH-88
Trans, on .
&
IEE-80), pp. 9-17.
Key Words: models, methods. LAN-81
methods.
Security,"
for Computer Computing Surveys September 1981, pp.
ACM
247-278.
Keefe, T., and "Security
W.
Tsai
Model Consistency
in Secure Object-Oriented
6,
1989, pp. 290-298.
requirements,
methods.
Key Words: MLS.
JOH-88a
models, theory,
LAN-82 Landauer, C, and S. Crocker "Precise Information Flow Analysis by Program
Symp. on Sec.
FJ. Thayer "Security and Composition of Machines," Proc. Comp. Sec. Foundat. Workshop 1988, CSF-88), pp. 72-89. ,
(3:
"Security Properties of Ring
Key Words:
Comp. Sec. Foundat. Workshop H 1989,
methods.
Brackets," Proc.
Landwehr, C.E., C.L. Heitmeyer,
techniques.
and
KOR-88
FJ. Thayer
Korelsky, T., et
"Security Properties
Consistent with Testing
Semantics for Communicating Sec. (3:
al.
Enviroiunent." Proc. 11th Natl.
Comp.
Sec. Conf.
theory,
Key Words: modeling, techniques.
3-5
J.
McLean
Model for Military Message Systems," ACM Trans, on Computer Systems August 1984, pp. 198-222. Security
,
"ULYSSES: A ComputerSecurity ModeUng .
(5:
NCS-88). 1988, pp. 20-28
CSF-88), pp. 9-21.
Key Words: models,
verification,
Key Words: models,
"A
1988,
(5:
LAN-84
IEE-89a), pp. 41-46.
Johnson, D.M., and
,
,
Ko, H.-P.
theory.
Comp.
1982 IEEE
.
JOH-89
Foundat. Workshop
&
Privacy IEE-82). pp. 74-80.
KOH-89
(3:
Key Words: models,
formal,
general.
Verification," Proc.
Johnson, D.M., and
Processes," Proc.
Key Words: models,
Systems" Proc. 5th Security Applicat. Conf. , (4: IEE-89c),
methods.
(5:
,
,
Computer Systems Vol. No. 3, 1988.
Key Words:
Privacy
Landwehr, C.E. "Formal Models
KEE-89
Requirements with Tolerable
ACM
Describe
Key Words: models, MLS, Thayer
"Stating Sectirity Sets,"
to
Protection Problems," Proc.
1980 IEEE Symp. on Sec.
Multilevel Security
Proc. 11th Natl.
Key Words:
KRE-80 Kreissig, G.
J.
"A Note on
Key Words: modeling,
Key Words: models, techniques.
LAN-89 J.,
T.
Redmond,
and T. Benzel "Formal Policies for Trusted
Comp. Sec. Foundat. Workshop H 1989, Processes," Proc.
.
(3:
MAC-87
LIN-89a
Landauer,
IEE-89a), pp. 31-40.
R.P. Trueblood "Security Algebras and Formal Models - Using Net Theory." Proc. IFIP 11.3 (Data Base)
Workshop
,
MacEwen, G.H., V.Q.W. Poon, and J.I. Glasgow "A Model for Multilevel Security
Based on Operator IEEE Symp.
Nets," Proc. 1987
on Sec.
&
Privacy
,
lEE-
(5:
87a), pp. 130-160.
policy, formal,
Key Words: models, theory methods
models.
LAP-89 La
Petri
WG
1989.
(6: IFI-89),
Key Words:
and
Lin, T.Y., L. Kershberg,
*
Key Words: models, MLS, methods.
LIU-80
Padula, L.J.
"The 'Basic Security Theorem' of Bell and La
MAR-86
Liu, L.
Padula Revisited," IEEE Cipher January 1989, pp. 26-
"On Security Flow Analysis in Computer Systems," Proc. 1980 IEEE Symp. on Sec. &
31.
Privacy
,
,
IEE-80), pp. 22-
(5:
Marcus, L., and T. Redmond "Semantics of Read," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86), 1986, pp. 184-193. .
33.
Key Words:
Key Words: models,
awareness,
Key Words: models,
models, theory, formal.
MAR-88
methods, techniques.
LEI-83
LOC-82
Leiss, E.L.
theory.
flow,
Marcus. L.. and T. Redmond "A Model-Theoretic Approach to Specifying, Verifying, and
"On Authorization Systems With Grant-or -Controlled
Lockman,
"Unidirectional Transport of
Hooking
Propagation of Privileges,"
Rights and Take-Grant
Proceedings, 1983
Control,"
Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),
COMPCON
N. Minsky,
A., and
IEEE
Trans, on
Up ,
pp. 127-138.
499-502.
Software Engr. December 1982. pp. 597-604.
Key Words: models,
Key Words: models,
policy.
authorization, techniques.
grant, techniques,
Spring
.
1983, pp.
,
Security Policies,"
Proc.
Key Words: models, take-
theory,
methods.
MAR-89 LUB-89
LIN-88
Marcus,
L.,
and T. Menas
Lin, T.Y.
Lubarsky. R.S.
"Safety via State Transition
"A Generalized Information Flow Model and the Role of
"Hook-Up Security and
Language Plus
Generalized Restrictiveness,"
Proc.
89a). pp. 71-77.
LAN-88), 1987. pp. 85-103.
Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 112-122.
Key Words: models,
Key Words: models,
the Security Officer," Proc.
IFIP
WG
11.3 Meeting
.
(6:
.
,
Key Words: flow,
theory.
Invariants,"
Comp. Sec. Foundat. Workshop H 1989. (3: lEE-
theory, methods,
safety.
methods.
MAR-89a
LUN-88 LIN-89
Lunt, T.F.
Lin. T.Y.
"Access Control Policies:
"Chinese Wall Security — An Aggressive Model." Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989. pp. 282-289.
Some Unanswered
Policy
,
,
Framework for Computer Security," IEEE Cipher Fall ,
1989, pp. 55-63.
pp. 227-245.
Key Words: Key Words:
Key Words: models,
Questions,"
Comp. Sec. Foundat. Workshop 1988, (3: CSF-88), Proc.
Marcus, L. 'The Search for a Unifying
policy, control.
policy,
theory.
3-6
general.
models, theory,
MCC-87
MCH-86
McCullough. D.M. "Specifications for Multilevel
Security and a
Hook-Up IEEE
Property," Proc. 1987
Symp. on Sec.
&
Privacy
,
(5:
IEE-87a), pp. 161-166.
MCL-87
McHugh, J., and A.P. Moore "A Security PoUcy and Formal Top Level Specification for a Multi-
Level Secure Local Area Network," Proc. 1986 IEEE Symp. on Sec. & Privacy (5: IEE-86), pp. 34-39 .
Key Words: MLS.
specification,
Key Words: MLS. LAN.
MCC-88 McCullough, DJ^. "Noninterference and the ComposabiUty of Security Properties," Proc. 1988 IEEE Symp. on Sec. & Privacy (5: ,
IEE-88a). pp. 177-186.
specification,
McLean,
J.
"Reasoning About Security Models," Proc. 1987 IEEE
&
Symp. on Sec. Privacy IEE-87a), pp. 123-131
Key Words: models,
(5:
,
theory,
general.
MCL-88 McLean,
J.
'The Algebra of Security," Proc. 1988 IEEE Symp. on
MCH-87 McHugh,
Sec.
J.
&
Privacy
,
(5:
"Active vs. Passive Security
pp. 2-7.
Models: The Key to Real Systems," Proc. 3d Aerosp^ice Comp. Sec. Conf. (5: lEE-
Key Words: models,
IEE-88a),
theory.
.
Key Words:
inference,
MCL-89
87b), 1987, pp. 15-20.
theory.
Key Words: models,
MCC-88a
theory,
general.
McCullough, D.M. "Covert Channels and Degrees of Insecurity," Proc.
Properties,"
MCH-88 McHugh, J. "A Formal Definition
Key Words: models,
Information Flow Analysis,"
88), pp. 1-33.
Proc.
Comp.
covert channel,
(3:
CSF-88),
theory.
MEN-81 Mennie, A.L., and G.H. MacEwen Using an Intermediate Code
Key Words:
MCC-88b
formal, models,
flow.
Program Representation," IEEE on Software Engr.
Trans,
,
November 1981,
McCullough, D.M. Foimdations of Ulysses: The
Theory of Sectirity RADCTR-87-222, U.S. Air Force Rome Air Development ,
Rome, NY, July
1988.
MCL-84 McLean, L, C.E. Landwehr,
Key Words:
and C.L. Heitmyer "A Formal Statement of the Security Model," Proc. 1984 IEEE Symp. on Sec. &
verification.
MMS
Privacy
Key Words: verification, theory, MLS.
,
IEE-84), pp. 188-
(5:
194.
Key Words:
MCD-89
formal, models,
pp. 594-607.
flow, techniques,
MIL-81 MiUen, J.K. "Information Flow Analysis of Formal Specifications." Proc. 1981 IEEE Symp. on Sec. &
Privacy .
(5:
IEE-81), pp. 3-8.
network.
McDermid, E.
Fall
"Information Flow Certification
pp. 147.
theory.
Center,
,
for
Sec. Foundat.
Workshop. 1988,
Key Words:
IEEE Cipher
1989, pp. 27-36.
Comp. Sec. Foundat. Workshop 1988, (3: CSF,
McLean, J., and C. Meadows "Composable Security
J.,
MCL-85
"Security Policies for Integrated Project Support
Environments," Proc. IFIP 11.3 (Data Base) Workshop (6: IFI-89), 1989.
WG
,
Key Words: techniques.
Key Words:
and
Hocking
specification,
formal, flow, methods.
McLean, L "A Comment on the Basic Security Theorem of Bell and LaPadula," Information Processing Letters February 1985, pp. 67-70. ,
MIL-84 MiUen, J.K. "Al Policy Modelling," Proc. 7th Seminar, DoD Comp. Sec Progr. (5: DOD-84), 1984, pp. .
,
137-145.
policy,
Key Words: models,
formal,
Key Words: models, MLS,
theory.
methods.
3-7
MIN-84
MIL-87 MiUen, J.K. "Covert Channel Capacity," Proc. 1987 IEEE Symp. on Sec.
&
PAG-89
Minsky. N.. "Selective and Logically
Privacy. (5: IEE-87a),
pp. 60-66
Controlled Transport of Privileges."
Comp.
ACM Trans, on Programming Languages and ,
covert channel,
et al.
J.
"Evaluation Security Model Rule Base." Proc. 12th Natl.
Systems Vol.
Key Words:
Page.
No.
6,
Sec. Conf.
.
(5:
NCS-
89). 1989. pp. 98-111.
1984.
4,
Key Words: models,
pp. 573-602.
models.
theory,
methods.
Key Words: models, MIL-87a
take-
methods.
grant,
PIT-87
MiUen, J.K.
P.A.
Pittelli,
"Interconnection of
AIAA
MOR-88
'The Bell-LaPadula Computer
Morgenstem, M.
Security
No. 87-3075, Proc. 3d
"Spiral Classification for
a Special Case of the
Aerosp. Comp. Sec. Conf., (5: IEE-87b). 1987, pp. 60-
Multilevel Data and Rules."
Hairison-Ruzzo-Ullman Model," Proc. 10th Natl.
65.
Conf. (5: NCS-88). 1988. pp. 270-273.
Accredited Systems,"
Proc. 11th Natl.
Comp.
Sec.
.
Comp.
Model Represented
Sec. Conf.
,
(5:
as
NCS-
87a), 1987, pp. 118-121.
Key Words: models, Key Words: models,
techniques.
techniques,
Key Words: models,
MLS.
theory,
methods.
MIL-89
MOS-87
MiUen, J.K. "Finite-State Noiseless Covert
Comp. Sec. Foundat. Workshop H 1989.
Channels," Proc.
,
(3:
Computer Systems," Proc. 1987 IEEE Symp. on Sec.
IEE-89a), pp. 81-86.
Key Words:
PIT-88
Moser, L.E. "Graph Homomorphisms and the Design of Secure
covert channel,
Privacy
.
&
"Formalizing Integrity Using Non-interference." Proc. 11th
National
Comp.
Sec. Conf.
(5:
.
NCS-88). 1988. pp. 38-42.
IEE-87a). pp. 88-
(5:
Key Words:
96
models.
PitteUi, P.A.
formal, integrity,
theory.
Key Words: models,
MIL-89a
theory,
RAN-88
methods.
Millen, J.K.
Rangan. P.V. "An Axiomatic Basis of Trust
"Models of Multilevel
Computer
Security," in
MOS-89
M.
Yovits, (Ed), Advances in Computers Academic Press. .
New
York, 1989, pp. 1-40.
Key Words: models, MLS. general.
Moser. L.E. "A Logic of Knowledge and Belief for Reasoning about
in Distributed Systems," Proc.
Computer Security." Proc. Comp. Sec. Foundat. Workshop n 1989. (3: lEE-
211.
89a), pp. 57-63.
network.
.
1988 IEEE Symp. on Sec. Privacy
,
(5:
&
IEE-88a), pp. 204-
Key Words: models,
theory,
MIN-83 Minsky, N.H.
Key Words:
"On
general.
the Transportation of
Privileges," Proc. 1983
Symp. on Sec.
&
grant,
methods.
,
take-
(5:
ROS-88 Rosenthal. D.
IEEE
Privacy IEE-83a), pp. 41-48.
Key Words: models,
theory, methods,
"An Approach to Increasing Automation of Verification of
NEU-83
Comp.
Neumann, P.G.
Security." Proc.
"Experiences with Formality
Foundat. Workshop . 1988, CSF-88), pp. 90-97.
Development," in
in Software
D. Ferrari et al (Eds.), Theory and Practice of Software Technology North-Holland, ,
Amsterdam, 1983.
Key Words:
formal, software,
methods.
3-8
Key Words: techniques.
Sec.
verification,
(3:
SAN-88a
ROS-88a Roskos, I.E. "Minix Security Policy Model," Proc. 4th Aerospace Comp. Sec. Conf. . (4: lEE88b). 1988. pp. 393-399.
SNY-81
Sandhu, R.S. "Expressive Power of the Schematic Protection Model," Proc. Comp. Sec. Foundat. Workshop 1988, (3: CSF-88). ,
Snyder. L.
"Formal Models of CapabilityBased Protection Systems." IEEE Trans, on Computers .
March 1981.
pp. 172-181
pp. 188-193.
Key Words: models,
Key Words:
policy,
Key Words: models,
decription.
formal, models,
capability.
description.
RUS-84
SNY-81b SAN-89
Rushby. J. "The Security Model of
Enhanced HDM," Proc. 7th Seminar,
DoD Comp.
Progr. . (5:
Sec.
Snyder, L.
Sandhu. R.S. 'Transformation of Access Rights." Proc. 1989 IEEE
&
Symp. on Sec.
DOD-84), 1984,
Privacy
pp. 120-136.
IEE-89b), pp. 259-268.
Key Words: models,
Key Words:
description.
techniques.
,
'Theft and Conspiracy in the Take-Grant Model." Joumal Comp. and System Sciences .
(5:
December 1981.
Key Words: control,
pp. 333-347.
models, take-
grant, threats.
SOR-83
SAN-89a
SAN-85 Sandhu, R.S. "Analysis of Acyclic Attenuating Systems for the SSR Protection Model," Proc. 1986 IEEE Svmp. on Sec. & Privacy (5: ffiE-86), pp. 197-206.
Sorkin. A., and C.J.
Buchanan
Sandhu, R.
"Measurement of
"Currrent State of the Safety
Cryptographic Capability
Problem
Access Control," IEEE Cipher Fall 1989. pp.
Computers
37-46.
November
in
.
Protection Algorithms,"
&
Security 1983. pp. 101-116. .
,
Key Words:
control, safety,
Key Words:
capability,
techniques.
general.
Key Words: models, SAY-86
description.
STO-81
Saydjari. O.S..
SAN-86
T.
Sandhu, R.S., and M.E. Share
"Some Owner Based Schemes With Dynamic Groups in the Schematic Protection Model," Proc.
1986 IEEE Symp. on Sec. Privacy
,
(5:
and
Kremann
"A Standard Notation in Computer Security Models." Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86), 1986, pp. 194-203. .
&
IEE-86). pp. 61-
70
Key Words: models,
Sandhu, R.S. "The Schematic Protection Model: Its E>efinition and Analysis of Acyclic Attenuation Schemes," Journal of the No. 2, 1988. pp. 404-432.
ACM
Protection
Control and Information Flow." Proc. 1981 IEEE Symp. on Sec. & Privacy (5: lEE81). pp. 9-18. .
Key Words: models, control.
flow,
SUT-86 Sutherland, D.
"Reflections on the
"A Model of
Verification of the Security of
Proc. 9th National
an Operating System,"
Sec. Conf. , (5: NCS-86). 1986.
Proceedings, 9th
pp. 175-183.
ACM
Information,"
Computer
Symposium on Operating Systems Principles October
Key Words: models,
1983, pp. 143-154.
general.
,
,
Key Words:
verification,
description.
Key Words:
A
Integrates Access
general.
Silverman, J.M.
SAN-88
Model which
Key Words: models, methods,
SIL-83
methods.
Stoughton. A. "Access Flow:
models,
description.
3-9
theory,
TSA-87
SUT-89 Sutherland,
I.,
S. Perlo,
and
WIL-88
V.D. Gligor. and C.S. Chandersekaran "A Formal Method For the Identification of Covert Storage Chaimels in Source Code," Proc. 1987 IEEE Symp. on Sec. & Privacy (5:
Tsai, C.-R,
R. Varadarajaan "Deducibility Security with
Dynamic Level Assignments," Proc. Comp. Sec. Foundat. Workshop H 1989, (3: lEE.
89a), pp. 3-8
,
IEE-87a), pp. 74-86
Key Words: models,
Profiles," Proc. 11th Natl.
Comp.
Sec. Conf. . (5:
NCS-
88). 1988. pp. 257-266.
Key Words: models, methods, MLS.
theory,
Key Words:
general.
covert channel,
formal, methods, techniques.
TAY-84
WIT-89 Wittbold, J.T..
"Controlled Signalling Systems
TSA-88
Taylor, T. I
Williams, J.C. and M.L.Day "Security Labels and Security
"Comparison Paper Between the Bell-La Padula Model and the SRI Model," Proc. 1984 IEEE Symp. on Sec. & Privacy
,
(5:
IEE-84), pp.
195-202.
Privacy
Key Words: models,
and Covert Channels," Proc.
and V.D. Gligor "A Bandwidth Computation Model for Covert Storage Chaimels and Its Applications," Proc. 1988 IEEE Symp. on Sec. &
Tsai, C.-R.,
.
(5:
IEE-88a), pp.
108-121.
theory,
Comp. Sec. Foundat. Workshop n 1989, (3: lEE.
89a), pp. 87-104.
Key Words:
WRA-89 Wray,
general.
Key Words:
TAY-87
covert channel,
models, techniques.
Taylor, T., and B.
Hartman
"Formal Models, BellLaPadula, and Gypsy," Proc. 10th Natl. Comp. Sec. Conf. (5: NSC-10), 1987, pp. 193-
WEB-89 ,
Hook-Up
Proc. 3d Aerospace
Key Words: models,
formal,
general.
J.C.
"An Optimization for Information Flow Analysis," Proc. Comp. Sec. Foundat. Workshop H 1989. (3: lEE.
Weber, D.G., and R. Lubarsky "The SDOS Project Verifying
200.
covert channel,
methods, techniques.
89a), pp. 105-110.
-
Key Words: models,
Security,"
methods.
Comp.
Sec. Conf. . (5: IEE-87b), 1987, pp. 7-14.
flow,
WUM-81 Wu. M.S. "Hierarchical Protection
Key Words:
TER-89 Terry,
P.,
and
"A 'New'
Wiseman
S.
verification,
description.
&
Model," Proc. 1989 IEEE
WIL-87 Williams. J.C. and
Key Words: models,
IEE-89b), pp. 215-228.
G.W. DLnolt "A Graph-Theoretic
hierarchical.
Key Words:
Formulation of Multilevel Secure Distributed Systems: An Overview" Proc. 1987
Symp. on Sec.
Privacy
,
(5:
models, theory.
TRU-86 Trueblood, R.P., and
IEEE Symp. on
A. Sengupta "Dynamic Analysis of the Effects Access Rule Modifications Have Upon
Privacy
IEEE
general.
Security,"
.
IEE-81). pp. 113-123.
Security Policy
&
Systems." Proc. 1981 IEEE Symp. on Sec. Privacy (5:
Trans, on
.
(5:
Sec.
&
IEE-87a). pp. 97-
YOU-89 Young. W.D. 'Toward Foundations of Security."
IEEE Cipher
.
Fall
1989. pp. 47-54.
103.
Key Words: models, Key Words:
theory, models,
Software Engr. August 1986, pp. 866-870. ,
Key Words: models, techniques.
3-10
general.
theory,
4.
This
section
cites
Access Control
publications
on
identification
and authentication methods
(e.g.,
passwords, biometrical identifiers), traditional access control methods (such as memory and file protection), the use of capabilities and access control lists, and add-on software packages for discretionary access control.
BAC-89
AHI-87 Ahituv, N., Y.Lapid, and S.
BOU-83
Bacic, E.
Neumann
"Process Execution Controls
Mechanism
Ensure
"Verifying Authentication of an Information System User,"
Consistency," Proc. 5th
Journal
Computers
Security AppUcat. Conf. (4:
97-103.
&
Security , April
as a
Bound, W.A.J. "Securing the Automated Office," Computer Security
to
1987, pp. 152-157.
IEE-89c), 1989, pp. 114-120.
Key Words:
Key Words:
,
Fall/Winter 1983. pp.
Key Words: authentication,
controls,
OS,
techniques.
techniques.
BOW-88
BAN-84
ALV-88 Alvare, A., and E. Schultz
"A Framework
Password
for
USENIX UNIX
Banton, B.F. and M.S. Barton "User-Friendly Password
Methods for ComputerMediated Information Systems," Computers &
Selection," Proceedings,
Security
Workshop August 1988. ,
Security
Key Words:
authentication,
,
October 1984, pp.
AND-88
authentication,
methods, passwords.
Anderson, L. "UNIX Password Security,"
USENIX UNIX
Workshop August ,
authentication,
Signatvires,"
Age
(U.K.) January 1988, pp. 20-22. ,
BON-83 Bonyun, D.A. "The Use of Architectural Principles in the Design of
1983, pp. 16-24.
Certifiably Secure Systems," Proc. IFIP/Sec. '83 ,
Key Words:
Stockholm, 1983,
techniques.
authetication,
management.
Brown, R.L. "Computer System Access Control Using Passwords,"
and
"Language Features for Access Control," IEEE Trans. on Software Engr. January
control.
Key Words:
methods, passwords,
BRO-84
control,
mandatory.
M. Boari
,
"Secure Access Control and
Key Words:
ANC-83a
Brand, S.L., and M.E. Flaherty "Password Management in
Comp. Sec. Progr. (5: DOD-84), 1984, pp. 264-269.
methods, passwords.
,
control,
general.
POD
Beker, H.
Information
Ancilotti, P., N.Lijtmaer,
Key Words: book,
Practice," Proc. 7th Seminar,
BEK-88
MAC-Based
1988.
Key Words:
,
Butterworths, Boston, 1988.
BRA-84 Key Words:
Security
Bowers, D.M. Access Control and Personal Identification Systems
186-195.
methods, passwords.
Proceedings.
control.
techniques.
(2:
FAK-
83), pp. 81-94.
Key Words:
architecture,
design.
4-1
Proc. IFIP/Sec. '84 . Toronto,
1984,
(2:
FIN-85), pp. 129-
142.
Key Words: passwords.
control,
COM-84
CAR-88a
BUN-87 Bunch, S. "The Setuid Feature in UNIX and Security," Proc. 10th
Comp.
Natl.
Sec. Conf., (5:
Carlton, S.F., J.W. Taylor,
and
Comer, M. (Ed.)
"How Passwords
Wyszynski
J.L.
Computer Fraud and Security
Mechanisms," Proc. 11th Natl.
Bulletin (U.K.)
NCS-
NCS-87a), 1987, pp. 245-
Comp.
253.
88), 1988, pp. 333-338.
Sec. Conf. , (5:
Key Words:
authentication,
methods.
November
threats,
passwords.
authentication,
CON-83
techniques.
Connolly, W. "Bypassing the Passwords,"
CHA-85
BUR-89
,
1984, pp. 1-10.
Key Words: Key Words:
are Cracked,"
"Alternate Authentication
Burk, H., and A. Pfitzmann
Chaum, D.
Computer Fraud and Security
Payment Systems Enabling Security and Unobservability," Computers & Security August 1989, pp.
"Security Without
Bulletin, July 1983, pp. 1-7.
"Digital
,
399-416.
Identification: Transaction
Systems
Make Big
to
Brother
the
ACM
October 1985, pp.
,
1030-1044.
Key Words:
COO-84 ,
Lexington Books, Lexington,
MA,
1984.
CHA-86
Carlsson, A.
"The Active Card and Contribution to
Chang, C.C. "On the Design of a Key-
its
EDP
Stockholm, 1983,
Key Words: book,
general,
methods.
Lock-Pair Mechanism in
Security," Proc. IFIP/Sec.
Information Protection
(2:
FAK-83), pp. 69-72.
CSC-85
Systems," BIT, July 1986, pp. 410-417.
Department of Defense Password Management
Key Words:
Guideline CSC-STD-002-85, National Computer Security
control,
,
techniques.
control,
Center, Ft. Meade,
techniques.
CAR-87
MD,
12
April 1985.
CLE-87
Carroll, J.M.
Computer
passwords.
Computer Security Technology general, methods.
CAR-83
Key Words:
threats,
Cooper, J.A.
control, methods.
Key Words:
_;83,
Key Words:
Obsolete," Communications of
Security,
2nd
Edition, Butterworths, Boston,
1987.
Key Words:
Clements, P.C. "Engineering More Secure Software Systems," Proc.
COMPASS Assurance
book, general,
,
'87: (2:
Comp.
IEE-87), 1987,
guidelines,
CSC-88 Trusted Unix Working Group
(TRUSIX)
pp. 79-81.
methods, techniques.
Key Words: passwords.
Rationale for
Selecting Access Control
Key Words:
CAR-88 Carroll, J.M., et
al.
'The Password Predictor — Training Aid for Raising Security Awareness," Computers & Security October 1988, pp. 475-481. ,
Key Words:
authentication,
passwords, awareness,
A
architecture,
Features for the Unix System,
NCSC-TG-020-A,
design.
National
Computer Security Center, Ft. Meade, MD, 18 August 1988.
COH-88 Cohen, F. "Designing Pro v ably Correct Information Networks with Digital Diodes," Computers & Security June 1988, pp. 279,
Key Words:
control,
guidelines.
CUS-80 Gushing, S. "Software Security and
286.
techniques.
Key Words:
design, network,
hardware.
How
Handle It," in Rullo, T.A. (Ed.), Advances in Computer Security Management, Vol. 1
Heyden
&
Son, Philadelphia, 1980, pp. 79-105.
Key Words: guidelines.
4-2
software,
to
,
DEH-89
DAV-81 and
Livesey "The Design of Secure CPUMultiplexed Computer Systems: The Master/Slave Approach," Proc. 1981 IEEE Symp. on Security & Privacy (5: IEE-81), pp. 133-139.
Davida,
G.I.,
J.
DPC-83
Dehnad, K. "A Simple Way of Improving the Login Security." Computers & Security ,
November 1989,
"Special Issue
Comm.
&
Security . SeptA^cU
1983, pp. 8-29.
pp. 607-611.
Key Words:
Key Words:
on Access
Control." Data Processing
control, methods,
general.
authentication,
methods.
Key Words:
DUC-85
design, control,
DEN-86
methods.
du Croix,
DAV-85
"An
Intrusion Detection
Model," Proc. 1986 IEEE
Davida, G.I. and B.J. Matt "Crypto-Secure Operating
Symp. on Security
Systems," Proceedings, 1985 National Computer
Conference AFIPS Press, Reston. VA, 1985. pp. 575.
(5:
&
A.J.
"Data Sharing and Access Protection in Business System
Denning, D.E.
Computers
12,"
Privacy
,
&
Security
,
December 1985, pp. 317-323.
IEE-86), pp. 118-131.
Key Words: Key Words:
control,
techniques.
auditing,
techniques.
DUP-86
581.
DES-86
Key Words:
control,
OS.
Deswarte, Y., et
DAV-88 Davida,
and
G.I.,
"UNIX
CP8
Card," Proc. IFIP/Sec.
Tolerate Faults and
'86,
Monte
Intrusions," Proceedings, 5th
GRI-89).
"A
techniques.
Matt
B.J.
Dupy, M., et al. "About Software Security with
al.
Satuj-ation
Network
to
IEEE Symposium on Reliability in Distributed
Key Words: techniques.
Protection," Proc. 4th Aerosp.
Software and Database Systems, January 1986, pp.
Comp.
74-81.
Guardians: Active
User Intervention in Data Sec. Conf. , (4: lEE-
Key Words:
IFIP/Sec. '88. Australia, 1989,
DOB-86 DEB-85
(2:
Dobson,
"Signature Verification Using
and B. Randell "Building ReUable Secure Computing Systems out of
Holistic Measures,"
Unreliable, Insecure
de Bruyne,
P.
&
Security
December 1985,
,
pp. 309-315.
Key Words:
authentication,
.
Key Words:
VAX Systems Equipment Corporation, Maynard, MA, Key Words: book,
control,
November
Key Words:
DOW-84
guidelines.
Downs. D.D.
Mechanisms." Electronics
March
8.
,
1984, pp. 122-127.
Key Words: OS,
4-3
techniques.
&
1983, p.
256.
architecture,
"Operating Systems Key Security with Basic Software
1989.
,
design.
,
Digital
"Selection Process for Security
Packages," Computers
193
Security
DEC-89
authentication,
Eloff, J.H.P.
IEE-86), pp. 187-
(5:
Key Words: methods.
ELO-83
methods, techniques.
Security for
CAE-89), pp. 479-481.
J.E.,
Components," Proc. 1986 IEEE Symp. on Sec. & Privacy
general.
as
Identity Verification," Proc.
techniques.
Computers
S., et al.
"Use of Fingerprints
architecture,
design.
control,
software,
DUV-88 Duval,
88b). 1988, pp. 199-204.
Key Words:
Carlo, 1986, (2:
software,
FAR-86
ELS -88 Ekbury,
ns-88
Farrow, R.
J.
"Personal Authentication
Fish, T.
"Security for Superusers,
Or
"A Model for Mainframe Access Control Software
Devices: Data Security Applications," Proc. IFIP/Sec.
How
•88
AustraUa, 1989. (2: CAE-89), pp. 471-478.
1986, pp. 65-70.
Key Words: OS,
Key Words:
Key Words:
vulnerabilities.
methods.
.
authentication,
to
UNIX UNIX/Worid May
Break the
System,"
Selection,"
.
EDPACS May .
1988, pp. 1-5.
model,
control,
methods, techniques.
FAY-86
ENG-87 Engelman. P.D. "The Application of 'Orange Book' Standards to Secure a Telephone Switching System." Proc. 10th Natl. Sec. Conf. (5: NCS87a), 1987. pp. 282-287.
Comp.
.
Key Words:
FIT-88
Fray, J.-M., and J.-C. Fraga
Fitzgerald, K.
"Fragmented Data Processing: An Approach to Secure and
"Choosing a Logical Access Control Strategy," Proc.
Reliable Processing in
MP/Sec.
Distributed
Computing
(2:
Systems," Preprints,
244.
Working Conference on Dependable Computing for Critical
Key Words:
International
,
techniques.
FRA-86
137.
Fray, J.M., Y. Deswarte, and
EST-89 Estrin, D.,
control,
guidelines.
AppUcations Santa Barbara, CA, August 1989, pp. 131-
control,
'88 . AustraUa, 1989,
CAE-89), 1988, pp. 235-
D. Powell
Key Words:
and G. Tsudik
"Security Issues in Policy
Routing," Proc. 1989
Symp. on Sec.
&
"Intrusion-Tolerance Using
architecture,
design.
Fine-Grain Fragmentation
IEEE
Privacy
.
(5:
FEI-86
IEE-89b). pp. 183-193.
Feinstein, H.
Key Words:
Sensitive
Scattering," Proc.
1986 IEEE
Symp. on Sec.
Privacy
&
,
(5:
IEE-86), pp. 194-201.
"Security in Unclassified control,
Computer Systems,"
Proc. 9th Natl.
requirements.
Conf.
EVA-83
,
(5:
Comp.
Key Words:
Sec.
NCS-86), 1986, pp.
81-90.
FRI-88 Friedman,
"Evaluating Security Software," Assets Protection, July/August 1983, pp. 9-13.
Key Words:
architecture,
design.
Key Words:
M.
"Access-Control Software,
control,
Information Age, (U.K.), July 1988, pp. 157-161.
techniques.
FIL-86
guidelines,
software.
Filipski, A.,
"Making
FAK-84
and
UNIX
J.
Hanko
Key Words:
Secure," Byte
control, software.
,
FUG-88
April 1986, pp. 113-128.
Fugini, M., and R. Zicari
Fak, V. "Characteristics of
Good
Key Words:
One- Way Encryption Functions for Passwords
—
Some Rules
and
for Creators
control,
OS,
"Authorization and Access
Control in the Office-Net Systems," Proc. IFIP/Sec. '88
design.
ns-84
AustraUa, 1989, pp. 147-162.
Evaluators," Proc. IFIP/Sec.
Fisher, R.P.
:84, Toronto, 1984, (2: FIN-
Information Systems Security
85), pp. 189-191.
Prentice-Hall,
New
York,
1984.
(2:
,
CAE-89),
,
Key Words:
control,
techniques.
Key Words: passwords, techniques.
Key Words: book, general, methods, techniques.
GON-89 Gong, L.
"A Secure Identity-Based Capability System," Proc. 1989
IEEE Symp. on Privacy
.
(5:
Sec.
&
IEE-89b), pp. 56-
63.
Key Words: capabiUty.
4-4
architecture,
GON-89a
HAG-86
Gong, L.
"On Security of Based Systems',
Capability-
ACM
Operating Systems Review April 1989, pp. 56-60.
Key Words:
,
HEN-87
Hagopian. G. "Planning and Implementing a Security Package, Part I." Computer Security Products Report. Winter 1986, pp. 18-
Security: A Workable Compromise." Proc. 10th
22.
Comp.
control,
,
Natl.
NCS-
(5:
control, software,
Key Words:
design.
GRA-84
control, integrity,
design.
HAG-86a
Grampp, F.T., and R.H. Morris "UNIX Operating System
Hagopian. G. "Planning and Implementing a Security Package. Part 11." Computer Security Products Report, Spring 1986, pp. 18-
System Technical Journal August Security," Bell
.
1984. pp. 1651-1971.
Key Words:
control.
OS.
Key Words:
design.
"On the Need for a Third Form of Access Control," Proc. 12th Natl. Comp. Sec. ,
(5:
"Pass-Algorithms:
A
Algorithms." Communications
ACM
.
August 1984.
GRE-81
Herlihy, M.P.. and J.D. Tygar
HAY-88
Introduction to Security Practices
World
"Implementing Distributed
Haykin, M.E.. and
,
R.B.J.
Publishing,
Warner
Los Angeles, CA. 1981.
Smart Card Technology: New Methods for Computer Access
Key Words:
Control
book, general,
SP 500-157, National
Institute
MD,
GRO-84 Grossman, G. "Gould Software Division's Security Program," Proc. 7th Seminar, E)oD Comp. Sec.
DOD-84), 1984.
control,
techniques.
,
CA, Aug.
1989, pp.
113-120. capabilities,
Key Words:
control, methods.
HIG-85
HEB-80
Highland, H.J.
Hebbard, B.,
et al.
Penetration of the
"Microcomputer Security: Data Protection Techniques."
&
Michigan Terminal System," ACM Operating Systems Review January 1980, pp. 7-
Computers
20.
Key Words:
Security
,
June
1985, pp. 123-134.
,
Key Words:
S.
Computer
Software," Security Audit
Control Review
.
&
vulnerabilities,
OS.
Winter
1985. pp. 31-35.
Key Words:
Applic Santa
for Critical
Barbara,
general.
"Security of
Working
Kernel." International
Conf on Dependable Comp.
Key Words: OS,
1988.
GUY-85 Guynes.
Capabilities Without a Trusted
design.
"A
pp. 180-187.
Key Words:
,
of Standards and Technology, Gaithersburg,
methods, techniques.
control, software.
HER-89
techniques.
Progr. , (5:
104.
control,
Green. G.. and R.G. Farber
Security
.
Key Words: Key Words:
&
"A Comparison of Data Access Control Packages: Part n," Computer Security Journal Vol. V, No. 1. 1988, pp. 67-
pp. 777-781.
control,
requirements.
Principles
control, software.
Henderson, S.C.
User
Vahdation Scheme Based on
of the
Key Words:
,
HEN-88
Haskett. J.A.
Knowledge of Secret
NCS-89). 1989.
pp. 296-303.
"A Comparison of Data Access Control Packages: Part I," Computer Security Journal
Key Words:
HAS -84
Graubart, R.
Henderson, S.C.
control, software,
design.
GRA-89
HEN-87a
Vol. IV, No. 2, 1987, pp. 75111.
20.
Conf.
Sec. Conf.
87a), 1987, pp. 334-339.
Key Words:
capability.
Henning, R.R., and S. A. Walker "Data Integrity vs. Data
control,
software, design.
4-5
control,
PC,
IBM-83
fflG-86 Highland. H.J.
"How
Modify a Microcomputer Operating System for Added Security," Computers & Security December 1986, pp. 340-343. to
System Security Guide, IBM System 36 FSC 219042, IBM Corporation, White Plains, ,
NY,
JOH-83 Johnston, R.E.
"Comparison of Access Control Software Packages,"
Computer Security Journal
1983.
Key Words:
,
Fall/Winter, 1983, pp. 19-58.
,
control,
Key Words:
guidelines.
control, software.
Key Words: OS, PC, IBM-88 AS/400 Programming:
guidelines.
HIG-88
JOH-83a Johnston, R.E.
Security Concepts and
Planning
Highland, H.J. "Program Aids for Office
Automation Security," Computers & Security
.
SC2 1-8083, IBM
"Security Software Packages for
CICS," Computer Security
Corporation. White Plains,
Journal
NY, June
41.
1988.
,
Spring 1983, pp. 19-
,
Key Words:
February 1988, pp. 37-43.
Key Words:
control,
control, software.
guidelines.
Key Words:
JOH-83b
control,
ISR-83
software.
HOG-88 Hogan, C.B.
The of Some Computing
Johnston, R.E.
and T.A. Linden
"Authentication in Office
"Comparison of Access Control Software for IBM
System Internetworks,"
Operating Systems:
Israel, J.E.
ACM
"Protection Imperfect:
Trans, on Office Infor. Syst.,
Security
July 1983, pp. 192-210.
Environments,"
ACM
Operating Systems Review
Journal ,
Key Words:
ACF2,
RACE, SAC, SECURE, TOP SECRET," Computer Security .
FallAVinter 1983, pp.
19-58.
July 1988.
JOB -89 Key Words:
control, general,
HOS-88 Hosmer, H.H. and
M. Merriman
CASE
Johnson, H.L., and C. Arvin
to
Embedded
Mechanisms: Weaknesses and Potential Improvements, Part " Computers & Security 1,
Tactical Systems," Proc. 12th
November
NCS-89). 1989. pp. 339-348.
,
Tools
control, software.
JOH-89
A.E. Oldenhoeft "A Survey of Password
design.
"Using
Key Words:
Jobush, D.L., and
1989, pp. 587-604.
"Security for Natl.
Comp.
Sec. Conf. . (5:
Improve the Security of Application Systems," Proc. 4th Aerosp.
Comp.
Sec.
Conf. (4: IEE-88b), 1988, pp. 205-208.
Key Words:
Key Words:
control,
passwords.
control,
requirements.
,
Key Words:
control,
techniques, methods, design.
JON-80
JOB-89a Jobush, D.L., and
Jonekait,
A.E. Oldenhoeft "A Survey of Password
"Gnosis:
Mechanisms: Weaknesses and Potential Improvements. Part " 2, Computers & Security
HOV-83 Hovig, P.L.
.
'To Install an Access Control System: Activities and
December 1989,
Checklists," Proc. IFIP/Sec.
Key Words:
;83, Stockhohn, 1983, (2:
passwords.
guidelines.
,
Key Words:
control,
OS,
capabiHty.
control,
JON-86 JOH-81
control,
Secure Capability
Based 370 Operating System." Proc. 3d Seminar, DoD Comp. Sec. Progr. (5: DOD-80a), 1980, pp. G1-G16.
pp. 675-689.
FAK-83), pp. 57-67.
Key Words:
J.
A
Jones,
Johnston, R.E. "Security Software Packages,"
Computer Security Journal
,
Spring 1981, pp. 15-38.
Key Words:
control, software.
R.W.
"The Design of Distributed Secure Logical Machines," ICL Technical Journal (UK) November 1986, pp. 291-308. ,
Key Words: network.
4-6
control, design,
JON-89
KAI-86
R.W.
KIE-88
M.
Kain, R.Y., and
Kielsky,
"Security Classes and Access
C.E. Landwehr
"Security and Access Control
Rights in a Distributed System," Report, Invitat.
Capability-Based Systems,"
Workshop on Data
Proc. 1986
Jones,
NIST,
"On Access Checking
Integrity ,
RUT-89), 1989,
(4:
Sec.
&
in
IEEE Symp. on
Privacy ,
pp. A.6.1-27.
pp. 95-101
Key Words:
Key Words:
IEE-86),
(5:
Features of the VAXA'MS Operating System," Information Age (U.K.) October 1988, pp. 203-210. .
Key Words: control, network,
control,
OS,
methods.
control,
c^abiUty.
design.
KNO-87 JOS-89
KAI-87
Joseph,
M.K.
Kain. R.Y., and
"Integration Problems in
C.E. Landwehr
Fault-Tolerant Secure
"On Access Checking
Computer Design," Preprints, International Working
Capability-Based Systems,"
IEEE
Conference on Dependable
Engr.
Computing
for Critical
Santa Barbara, 1989, pp. 141-147.
Applications
CA, Aug.
F.,
"A Least
Privilege
and
Bunch Mechanism
S.
for Unix," Proc. 10th Natl.
Comp.
in
Sec. Conf.
.
(5:
NCS-
87a). 1987. pp. 257-262.
Trans, on Software
Key Words:
February 1987, pp. 202-207. ,
control, technique.
KNO-88
,
Key Words:
Knowles,
Key Words:
Knox. M.J.. and E.D. Bowden "Unix System Security Issues."
KAR-88 Karger, P.A.
Information Age (U.K.) April 1988, pp. 67-72.
Juenemann, R.R.
"Implementing Commercial Data Integrity with Secure Capabilities," Proc. 1988
methods.
architecture,
design.
JUE-88
,
"Integrity Controls for
IEEE Symp. on
Military and Commercial
Privacy
Applications," Proc. 4th
130-139.
Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 298322.
(5:
,
Sec.
Key Words: OS,
&
KOE-84
IEE-88a), pp.
Koehring, J. "Automatic Identity Verification," Information Age (UK), April 1984, pp. 103-110.
,
Key Words:
control, integrity.
Key Words:
integrity,
,
capability.
KAR-88a
Key Words:
authentication,
methods.
Karren, D.T.
JUE-89
techniques,
'Typical System Access
Jueneman, R.R.
Control Problems and
"Integrity Controls for
Solutions," Information
Military and Commercial
(U.K.)
AppUcations,
32.
Invitat.
11,"
Report,
,
KON-81 Age
January 1988, pp. 23-
NIST,
(4:
RUT-89),
Key Words:
,
Spring 1981, pp. 45-60.
control,
techniques.
1989, pp. A.5.1-61.
Key Words:
"Developing Standards for Operating System Security,"
Computer Security Journal
Workshop on Data
Integrity ,
Konigsford, w.L.
Key Words:
control, integrity.
KAR-89
control,
OS,
methods.
Karger, P.A.
KAH-88
"New Methods
Kahane, Y., S.Neumann, and C.S. Tapiero "Computer Backup Pools, Disaster Recovery, and
Communications of
ACM
,
Symp. on Sec.
the
&
IEEE
Privacy ,
(5:
KRA-88 Krayem, R. "Smart Cards:
A New
Identification and
Tool for Access
Protection," Information capability,
Age
Key Words:
control,
techniques, authentication.
83.
contingency,
risks.
4-7
.
(U.K.). April 1988. pp. 85-88.
methods.
January 1988, pp. 78-
Key Words:
Immediate
IEE-89b), pp. 48-55.
Key Words:
Default Risks,"
for
Revocation," Proc. 1989
KUR-85
LAN-89
LEG-88
Landau, C.R. "Security in a Secure Capability-Based System," Operating Systems Review October 1988, pp. 2-
Legge, J. "Rendering a Commercial Operating System Security."
85). 1985. pp. 86-90.
4.
289.
Key Words:
Key Words: control, c^abiUty, techniques.
methods.
Kurth, H.
"Paper Output Labeling in a Dedicated System Running
Under MVS." Proc. 8th
Comp.
Sec. Conf.
(5:
,
Natl.
NCS-
techniques,
methods.
KUR-85a
ACM
,
"Easily
Remembered
Passphrases
— A Better ACM
Approach," Sec., Audit & Control Review FallWinter 1985. pp. 10-21. ,
passwords.
'88 . Australia,
CAE-89), pp. 273-
control,
OS,
LEV-83 Leveson, N.G., and
"Granting and Revoking
P.R. Harvey
"Analyzing Software Safety," Trans, on Software Engr. . September. 1983, pp. 569-579.
Discretionary Authority."
IEEE
Information Systems (U.K.). Vol. 13. No. 1. 1988. control,
Key Words:
discretionary, methods,
control,
(2:
Larson. J.A.
Key Words: Key Words:
1989,
Key Words:
LAR-86
Kurzban, S.A.
MP/Sec.
Proc.
software, safety.
techniques.
LIP-82
KUR-89
LEE-84
Kurzban,
S.
'Toward a Model for Commercial Access Control," Report, Invitat. Workshop on Data Integrity NIST, (4: RUT-89), 1989. pp. A.9.1-6. ,
Lipner, S.B.
Lee, T.M.P.
'Tlondiscretionary Controls for
"Future Directions of Security
Commercial Applications," Proc. 1982 IEEE Symp. on
for Sperry Series 1100 Computers," Proc. 7th Seminar, DoD Comp. Sec
Sec.
Key Words:
control, models.
J.Y.
on Newton's Interpolating Polynomial," IEEE Trans, on Software Engr. September ,
1989. pp. 1135-1137.
Key Words:
"Secure System Development
Lee, T.M.P.
at E)igital
"Using Mandatory Integrity Enforce 'Commercial' Security," Proc. 1988 IEEE
Symp. on
&
Sec.
Privacy
,
to
(5:
IEE-88a), pp. 140-146.
Key Words:
control,
control, integrity,
LAM-81
Legrand, S. "Access Control for a Safety
With Insecure Communication." Communications of
Critical Distributed
ACM. November
Interface Set,"
1981. pp.
770-772.
Commercial and Government Customer Base," Proc. 9th Natl.
Comp.
Key Words: developemnt,
System No. 87-
AL^
3083, Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b). 1987. pp. 108-113.
Key Words:
authentication,
Wong
Lipton, D.L. and H.K.T.
"Modem
Trends in
Authentication,"
ACM
Security
Audit & Control Review Winter 1985, pp. 35-42.
,
.
Key Words: general.
methods, passwords, network.
Sec. Conf. , (5:
NCS-85), 1985, pp. 120-123.
LIP-85a
LEG-83
Lamport, L. "Passwords Authentication
the
Equipment:
Targetting the Needs of a
description.
methods.
techniques.
controls, methods,
Lipner, S.B.
LEE-88
"On the Design of a SingleKey-Lock Mechanism Based
IEE-82),
LIP-85
Ham. and
Lee
(5:
control, design,
methods.
Laih. C.S., L.
,
techniques.
Key Words: LAI-89
Privacy
DOD-84), 1984,
Progr. , (5:
pp. 161-168.
Key Words:
&
pp. 2-10.
.
Key Words:
control,
techniques.
4-8
authentication,
MEN-88
LIP-86
MON-84
Lipton, D.L.
Menkus, B.
Montini, G., and F. Sirovich
"Logical Authentication
Audit & Control Review Spring 1986,
"Understanding the Use of Passwords," Computers & Security April 1988, pp. 132-
Office Structures," Proc. mP/Sec. '84 Toronto, 1984,
pp. 9-20.
136.
(2:
Study,"
ACM
Sec., ,
Key Words:
authentication,
.
Key Words:
"Access Control Models and .
FIN-85), pp. 473-485.
Key Words:
awareness,
control, models.
passwords.
methods.
MOR-86
MEN-88a
LOP-84
Morshedian, D.
"How
Menkus, B.
Lopriore, L.
"Capability Based Architectures,"
Tagged
IEEE
Trans,
"Understanding Password
Compromise," Computers Security
1984, pp. 786-803.
549-552.
Key Words:
Key Words:
,
,
&
December 1988, pp.
on Computers September
Passwords and Win," IEEE Computer January 1986, pp. to Fight
Pirates
,
104-105.
Key Words: architecture,
awareness,
control,
passwords.
passwords.
capability.
MUR-84 LUK-84
MIL-89
Luke, L.R. "Password Security Systems," EDPACS October 1984, pp. ,
1-6.
Murray, W.H.
MiUer, D.V., and
"Security Considerations for
R.W. Baldwin
Personal Computers,"
IBM
"Access Control by Boolean Expression Evaluation," Proc. 5th Security Applic. Conf. (4: IEE-89c), 1989. pp. 131-139.
Systems Journal No.
3,
,
1984,
pp. 297-304.
,
Key Words:
control,
Key Words:
LUN-89
Password Usage FIPS-PUB 112, National Bureau of .
MIN-84
"Access Control Policies:
Some Unanswered
&
Questions," Computers
February 1989, pp.
43-54.
Key Words:
control, policy.
MAR-87
Minsky. N.H. "Selective and Locally Controlled Transport of
May
Privileges."
ACM Trans, on Programming Languages and
Key Words:
Systems October 1984.
management.
.
Key Words:
Maria, A. "RACE Implementation
control,
control,
software,
MD,
1985.
passwords,
guidelines, techniques,
NBS-85a Authentication ,
at
,
Standards, Gaithersburg,
Standard on Computer Data
techniques.
Pudget Power," Proc. 10th Nad. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 91-97.
Key Words:
PC,
NBS-85
Lunt, T.F.
,
control,
control,
techniques.
Security
Key Words: methods.
passwords.
MOF-88 Moffett, J.D. and
M.S. Sloman "The Source of Authority for Commercial Access Control," IEEE Computer February ,
FIPS-PUB
113.
National Bureau of Standards, Gaithersburg. MD. May 1985.
Key Words:
authentication,
methods, guidelines, techniques.
1988, pp. 59-69.
MAR-88
NES-83
Martin. D.F., and J.V.
"Adding
ADA
Cook
Key Words:
control,
management.
Program
Nati.
Comp.
Sec. Conf.
,
(5:
NCS-88). 1988, pp. 139-146.
Key Words: verification, methods.
in
LINCS," Proc. 6th Seminar,
DoD Comp.
MOL-84
System (SDVS)," Proc. 11th
D.M. Mechaiusms
"Security
Verification Capability to the State Delta Verification
Nessett,
Molloy, C. "Improving Security Controls within CICS." TeleSystems Journal . March/April 1984, pp. 3-11.
Key Words:
control, methods.
4-9
Sec. Progr. , (5:
DOD-83a), 1983, pp. 60-64.
Key Words: description.
control,
NEW-86
PAA-86
Newsome, R.M. "Access Controls Within an IBM System/34 Environment," EDPACS ,
December 1986,
Key Words:
POZ-89
Paans, R.
pp. 1-6.
Close Look at MVS Systems: Mechanisms, Performance and Security North-Holland Elsevier, New York, 1986.
A
,
"Work-in Progress: Transformation Procedure (TP) Certification." Report. Invitat.
Workshop on Data NIST.
(4:
Key Words:
book, control,
Key Wprds:
methods.
NEW-88
certification,
methods.
Newberry, M., and J. Seberry "Experience in Using a Type Signature Password for User
PAA-86a Paans. R.
Authentication in a Heavily
"Performance Aspects of Access Control," Proc.
Used Computing
IFIP/Sec. '86 .
Environment," Proc. IMF/Sec.
1986.
'88 . Australia, (2:
(2:
Monte
MVS
Carlo,
GRI-89).
Key Words:
Information for Security, Load Balancing, and Fault
ACM
,
348.
PAA-86b
Key Words:
Paans, R.. and I.S. Herschberg
OPA-86 Opaska, W.P. "Access Control Systems for Personal Computers,"
"How to Control MVS User Supervisor Calls." Computers
&
Security
March 1986,
,
pp.
Key Words:
6-8.
RAJ-82 Rajunas, S.A.
Systems," Proc. 5th Seminar,
control,
DoD Comp.
description. control,
control, design,
methods.
"Meeting Policy Requirements Using Object-Oriented
46-54.
August 1986, pp.
Key Words:
M.O.
control,
passwords.
,
Rabin,
Tolerance," Journal of the AprU 1989. pp. 335-
control,
description.
Key Words:
RAB-89 "Efficient Dispersal of
CAE-89).
1989, pp. 303-307.
Sec. Progr.
.
(5:
DOD-82), 1982. pp. 227-232.
PC,
POS-87
methods.
G.V. "Improving Operating System
Post,
OPA-86a Opaska, W.P. "Closing the
VAX
Security."
Default
Computers
&
Security . October 1987. pp.
417-425.
pp. 6-9.
Key Words:
control,
OS,
Underwood
"CRACK; A
Proceedings.
control,
POW-87
,
Paans, R., and G. Bonnes
Key Words:
"Surreptitious Security
Computers
passwords.
Violation in the
February 1987, pp. 41-48.
MVS
&
Security
,
&
Security . June
1983. pp. 144-152.
1988.
Key Words:
authentication,
methods.
Randell. B.. and J.E.
threats,
OS,
Dobson
and Security Issues Distributed Computing
"Reliability in
Key Words:
control,
RAN-86
Operating System,"
Computers
USENIX UNIX
Workshop August
Security
Power, J.M., and S.R. White "Authentication in a Heterogenous Environment,"
PAA-83
Distributed
Password Adviser,"
methods. passwords, vulnerabilities.
requirements,
RAL-88 R.
,
Key Words:
Key Words: policy.
Raleigh, T.. and
Password 'Backdoor'," EDPACS September 1986,
methods.
Integrity .
RUT-89). 1989, pp.
A.8.1-15.
control,
description.
EDPACS
P0ZZ0.M.. and S. Crocker
POZ-86
Systems," Proceedings, 5th
Pozzo. M.M.. and T.E. Gray
IEEE Symposium on
"Managing Exposure
Reliability in Distributed
to
Potentially Malicious
Programs," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS86). 1986, pp. 75-80. .
Software and Database Systems January 1986, pp. 113-118. ,
Key Words: Key Words:
threats,
management.
4-10
methods.
control, design,
RUT-89
REE-84 Weinburger "File Security and the UNIX System Crypt Command,"
Reeds,
AT&T
and
J.,
P.
SAT-88
Ruthberg, Z.G., and W.T. Polk Report of the Invitational
M.
Satyanarayanan,
"Integrating Security in a
Large Distributed System," Postscript, 11th
Journal October 1984, pp.
Workshop on Data Integrity SP 500-168, National Institute
1673-1684.
of Standards and Technology,
1988, pp. 91-108.
Bell Lab. Technical .
,
Gaithersburg,
Key Words:
MD,
Sept. 1989.
Key Words:
control,
Key Words:
techniques.
Nad. Comp.
Sec. Conf. , (5: NCS-88a),
proceedings,
control, design,
network.
integrity.
SCH-83
REI-86 Reid, B.
"Lessons from the UNIX Breakin at Stanford," Software Engineering Notes, October 1986, pp. 29-35.
ACM
SAN-88 'Transaction Control
"Computer Security: Make Your Passwords More
Expressions for Separation of
Effective,"
Duties," Proc. 4th Aerosp.
1983. pp. 6-11.
Comp.
Key Words: OS.
Schweitzer, J.A.
Sandhu, R.
.
control,
SCH-88
DA.
Schokley. W.R.
(U.K.). July 1988. pp.
162-168.
SAN-88a Sandhu, R.S. "The N-Tree: A Two Dimensional Partial Order for Protection."
Key Words:
Key Words:
integrity,
techniques.
"Access Control Methods of VAXA'MA." Information
Age
February
passwords, methods.
Key Words: Reisinger.
,
Sec. Conf. . (4: lEE-
88b). 1988. pp. 282-286.
vulnerabilities.
REI-88
EDPACS
ACM
Trans, on
Computer Systems May 1988.
control,
.
"Implementing the Clark/Wilson Integrity Policy Using Current Technology." Postscript, 11th
Sec. Conf.
.
(5:
Nad. Comp. NCS-88a).
1988, pp. 29-37.
pp. 197-222.
descriptions.
Key Words: Key Words:
RID-89
control, methods.
intgerity, policy,
methods.
Riddle. B.L.. M.S. Miron,
and J.A. Semo "Passwords in Use in a University Timesharing Environment," Computers Security,
November
SHA-87
SAN-88b
&
1989, pp.
Sandhu, R.S. "Nested Categories for Access
Shannon, T.C.
Control," Computers
Mechanisms and Techniques," Computer
Security
,
&
December 1988, pp.
599-605.
569-579.
"An
Introduction to
VAX/VMS
Security
Security Journal
,
Vol. IV, No.
2, 1987, pp. 39-47.
Key Words:
Key Words:
control,
control, methods.
Key Words:
passwords.
SAN-89
ROW-87 Rowe,
K.E., and
Sandhu, R. 'Terminology, Criteria and System Architectures for Data
CO. Ferguson, Jr. "ADA Technology/Compusec
Integrity," Report, Invitat.
Insertion Status Report,"
Workshop on Data
Proc. 10th Nad.
Comp.
Sec.
Conf. (5: NCS-87a). 1987, pp. 357-360. .
NIST,
(4:
control,
Integrity ,
RUT-89). 1989, pp.
SHE-89 Sherizen, S., and F. Engel "Striving for Unix Security," Computerworld, March 20,
1989, pp. 85-93.
A.4.1-14.
Key Words: Key Words:
Key Words:
control,
description.
control, general,
methods, guidelines.
requirements.
4-11
description.
control,
SIM-81 Simmons, GJ. "Half a Loaf Is Better than None: Some Novel Integrity Problems," Proc. 1981 IEEE Symp. on Sec. & Privacy (5: IEE-81), pp. 65-69. ,
STO-89
TEN-88
and R. Furuta "Access Control and
W.
Stotts, P.S.,
Tener,
Verification in Petri-Net-Based
"AI and 4GL: Automated Detection and Investigation
Hyperdocuments," Proc.
Tools," Proc. IFIP/Sec. '88.
COMPASS Assurance
Comp.
'89: (2:
,
IEE-89), 1989,
Australia, 1989, (2:
CAE-89),
pp. 23-29.
pp. 49-55.
Key Words:
Key Words: methods,
integrity, design,
methods, requirements.
Key Words:
control,
verification,
methods.
THO-82
SIN-85
SUM-84
Singh. K.
"On Improvements
Password Security," ACM Operating Systems Review
Thom, A.B.
Summers, R.C. "An Overview of ComjHiter
to
,
January 1985, pp. 53-60.
Security,"
IBM
Systems
control,
THO-88
awareness, general.
SMI-87
SYM-84
Smith, S.L. "Authenticating Users by
Symons, C.R., and
Word
JA. Schweitzer "A Proposal for an Automated
Association," Security ,
December 1987,
control, methods,
architecture.
Key Words:
&
pp. 105-107.
Key Words:
control,
passwords.
Computers
"Hardware Security," Computer Security Journal , WintCT 1982,
Journal, Vol. 23, No. 4, 1984,
pp. 309-325.
Key Words:
techniques.
pp. 464-470.
Logical Access Control
Thomas, T. "A Mandatory Access Control Mechanism for the UNIX File System," Proc. 4th Aerosp. Sec. Conf. (4: EEE88b), 1988, pp. 173-177.
Comp.
.
Standard," Proc. IFIP/Sec. '84.
Key Words:
authentication,
methods.
Key Words:
SOL-88 K.R. "Cascaded Authentication," Proc. 1988 IEEE Symp. on Sollins,
Sec.
Toronto, 1984, pp. 115-127.
&
Privacy, (5: IEE-88a).
pp. 156-163.
Key Words:
authentication,
(2:
FIN-85),
control,
TAN-82
Proc. 9th Nad.
Comp.
Sec.
Conf. (5: NCS-86). 1986. pp. 138-142. .
Computer
Interactive
Key Words:
control, design,
methods.
USA-80
Computer Users
(Tokens)," Computers
&
Security , October 1987, pp.
Key Words:
control,
techniques.
Proceedings. Third Automation Security
Workshop U.S. Army .
Computer Systems Command, December 1989.
TEN-87 Tensa, D.
385-395. authentication,
methods.
'Typical Weaknesses in Operating Systems Software," Information Age (U.K.), April 1987, pp. 74-78.
Key Words:
proceedings,
control.
,
STE-83
VAC-89 Vaccaro, H.S., and
Steinauer, D.D.
Key Words: OS,
'Technical Security Issues in
vulnerabilities.
Small Computer Systems," Proceedings, 1983 CQMPCQN Fall, September
G.E. Liepins "Detection of Anomalous Computer Session Activity," Proc. 1989
Sec.
&
IEEE Symp. on
Privacy .
(5:
pp. 289-289.
1983.
Key Words:
Habibi
70.
with Authentication Devices
Key Words:
J.
the Interactions of
Security and Fault-Tolerance,"
Tangney, J.D., and P.S. Tasker "Safeguarding Today's
Spender, J.-C. "Identifying
TUR-86 "On
.
SPE-87
control,
Turn, R., and
guidelines.
Systems," Computer Security Journal Winter 1982, pp. 57-
methods.
Key Words:
mandatory, description.
control,
Key Words:
PC,
methods.
techniques.
4-12
control,
IEE-89b),
WAG-88
VAN-83 Van de
Riet, R.R.,
and
M.L. Kersten "Privacy and Security in Information Systems Using Language Features," Information Systems (U.K.), Vol. 8, No. 2. 1983, pp. 95,
103.
WIL-81
Wagner, D.A. "System Security
in
Space
Flight Operations Center,"
Proc. 4th Aerosp.
Comp.
Sec.
Key Words:
Key Words:
control,
vulnerabiUties,
Developments on System Security," Computers &
November 1984,
WON-85
Walsh, M.E. "Software Security," Journal of Systems Management, October 1981, pp. 6-13.
Goor, A.J. "Effects of Technical
Key Words:
control, design,
methods.
Key Words:
VAS-83
Security Aspects,"
Information Privacy (U.K.), March 1981, pp. 68-74. ,
Vasak, J.M. "Issues in Secure System
No. 87-
3089, Proc. 3d Aerosp. Comp. Sec. Conf. (5: lEE87b), 1987, pp. 114-117.
control,
passwords.
Wattam, K.W. "Virtual Machine Enviromnent
—
AIAA
R.
"One-Time Passwords Fortify System Security," Computerworld, December 23,
control, software.
WAT-81
Acquisition,"
Wong,
1985, pp. 31-32. pp.
315-322.
Key Words:
,
threats, description.
WAL-81
,
Review January 1981, pp. 1425.
control, methods.
VAN-84 Van de
Security
Burroughs Large Systems," ACM Operating Systems
Conf. . (4: IEE-88b), 1988, pp. 426-430.
description.
Key Words:
Wilkinson, A.L., et al. "Penetration, Analysis of the
WON-89 Wong, R.M. and Y.E. Ding "Providing Software Integrity
Using Type Managers," Proc. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 287-
4th Aerosp.
Key Words:
control,
.
298.
architecture.
,
WEI-88
Key Words:
Key Words:
control, design,
methods.
VET-80
E.G. Amoroso "Ensuring Software Integrity," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 323-330. .
Vetter, L.L.
"Computer Access Control Software,"
EDPACS
Key Words:
,
February 1980, pp. 1-12.
Key Words:
Vinter, S.T.
Password Techniques." in RuUo. T.A.. (Ed.). Advances in
Computer Security Management Vol. ,
1,
Heyden
Key Words:
control,
passwords, general.
,
pp. 128-130.
IEEE Symp. on
Key Words:
(5:
Wood. H.M. "A Survey of Computer-Based
Son, Inc. Philadelphia, PA, 1980, pp. 140-167.
"Extended Discretionary Access Controls," Proc. 1988 ,
WOO-80
&
WeUs, P. "On-Chip Hardware Supports Computer Security Features," Electronics March 8, 1984,
VIN-
Privacy
integrity,
software,
WEL-84
control,
software.
integrity, software,
techniques, methods.
Weiss, J.D., and
Sec.
&
IEE-88a), pp. 39-
Wood, C.C. control,
control,
With Password
Controls," Computers
WEL-88 discretionary.
"Effective Information Systems
Security
architecture.
49.
Key Words:
WOO-83
&
Security , January 1983, pp. 5-
WeUs, C. "A Note on
10.
'Protection
ACM
Operating Systems Review October
Imperfect',"
,
1988.
Key Words:
control, methods.
4-13
Key Words:
control passwords.
WOO-84
WUM-84
WOO-87
Wood. M., and
T. Elbra
System Design
for
Woodcock, M.E. "The Use of ADA
Data
Wu, M.L., and T.Y. Hwang in Secure
Computer Centre (UK), J. Wiley & Sons, Chichester,
and Reliable Software," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 362-
1984.
365.
Protection
,
National
,
"Access Control with Single Key-Lock," IEEE Trans, on Software Engr. May 1984, pp. ,
185-191.
Key Words: Key Words: book,
general,
control, design, methods.
Key Words:
YEO-85
methods.
Yeo. O.K.
WOO-88
WOO-85
"Incorporating Access Control
Wood, C.C.
Wood, C.C.
"Floppy Diskette Security Measures," Computers & Security September 1985, pp. 223-228.
"Extended User
&
The Next Major Enhancement to Access
109-122.
Packages," Proc. IFIP/Sec.
Key Words:
,
in
Authentication:
'88 , Austraha, (2:
Key Words:
control,
PC,
authentication,
methods.
System Security
Hayden Publishing
Lines:
WOR-85 "IBM Dynamic
Verification," Proc. IFIP/Sec.
control,
85), pp. 129-154.
methods, description.
Key Words:
WOO-86
authentication,
methods.
Wood, C.C, and H.M. Zeidler "Security Modules: Potent
Information Security System
Components," Computers
&
June 1986, pp. 114-
121.
Key Words:
Can They Be
&
Secured,"
Security
,
al.
Signature
284, Toronto, 1984, (2: FIN-
Key Words: book,
Jr.
February 1988, pp. 35-36.
Worthington, T.K., et
,
Co.,
control, methods.
"Dial-Up Communication
Computers
Hasbrouck Heights, NJ, 1985.
,
June 1985, pp.
,
Zajac, B.P.,
Wood, P.H., and S.G. Kochan
Security
Security
ZAJ-88
1989, pp. 223-234.
Key Words:
UNDC
Forms Systems," Computers
CAE-89),
methods.
WOO-85a
control, technique.
control, software,
control,
techniques.
4-14
Key Words:
control, network.
5.
This
section
cites
architecture research
Trusted Systems
publications
on trusted operating systems and trusted systems
and development, formal evaluation
criteria,
implementation of the
reference monitor concept, design of trusted operating systems, descriptions of specific systems,
correcmess proof methods and techniques for trusted systems, and certification AME-81
ABR-86
Security Tutorial
,
S.R.,
Jr.
"Security Kemels:
Anderson, E.R.
A
"ADA'S
Solution
IEEE Symp. on
IEEE
&
Sec.
Privacy. (5: IEE-81), pp. 141150.
book, general,
Key Words: kemels,
Privacy
"Cryptographic Solution to a Multilevel Security Problem,"
and R.R. Schell "Security Kernel Design and
Proc. Crypto '82, Santa
Implementation:
CHA-83b), 1982,
Jr.,
Arnold, T.S.
Gasser,
"The
Seminar,
July 1983, pp. 14-22.
Key Words: MLS,
Key Words:
cryptography.
general.
,
Key Words: MLS,
"Accelerating
Distributed Systems,"
Security Innovations," Proc.
J.P.
Computer
1982 IEEE Symp. on Sec. Privacy
,
"Multilevel Security from a
&
IEE-82), pp. 91-
(5:
trusted,
methods,
AME-80
Anderson,
,
design,
methods.
TCB
Security Kernel," Proc. 1980
Proc. 1983
IEEE Symp. on
Sec.
&
IEE-80), 145-
"Security Approach for Rapid
to
Identification of
"Demonstrating Security for Trusted Applications on a
Minimum
requirements for Various
Threat/Risk Environments," Sec.
&
IEEE Symp. on
Privacy
,
(5:
pp. 102-104.
Prototyping in Mutlilevel
Secure Systems," Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989, pp. 328-334. ,
IEE-83a),
Key Words: MLS, methods.
156.
Key Words: TCB, Key Words:
Sec. Conf.
Asby, V.A., T. Gregg, and A. Lee
J.P.
"An Approach
and
J.G. Keeton-Williams
(5:
Comp.
NCS-85), 1985, pp. 43-46.
ASH-89
AND-83
,
(5:
general.
criteria,
networks.
Privacy
8th Natl.
Key Words: MLS, Key Words:
S.R.,
Practical Point of View," Proc.
97.
127.
Ames,
design,
Arnold, T.S.
"Criteria Extension for
Key Words:
.
ARN-85
Anderson,
,
Sec
DOD-84), 1984, pp.
methods.
AND-82
No. 87-3095. Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 122-
DoD Comp.
Progr. . (5:
30-37.
kernel, design,
Albert, S.B.
AIAA
Practical Aspects of
Multi-level Security," Proc. 7th
An
IEEE Computer
Introduction,"
pp. 237-249.
ALB-87
trusted,
ARN-84 M.
Ames, S.R.
(9:
&
IEE-85), pp. 184-
requirements.
Akl, S.G., and P.D. Taylor
Barbara,
(5:
Key Words:
general,
AME-83
AKL-82
,
189.
methods.
methods.
Suitability for Trusted
Computer Systems," Proc. 1985 IEEE Symp. on Sec.
or a Problem," Proc. 1981
Computer Society Press, Washington, DC. 1986.
Key Words:
AND-85
Ames,
Abrams, M.D., H.J. PodeU (Eds.). Computer and Network
criteria.
tusted, kernel,
requirements, risk.
methods.
5-1
design,
BAR-84
BEN-84
BEV-89
Bames, D. "Secure Communications
Benzel, T.V.
Bevier,
W.R.
"Analysis of a Kernel
"Kit:
Study in Operating
Processor Research," Proc.
Verification," Proc.
DoD Comp.
7th Seminar, Sec. Progr.
,
(5:
IEEE Symp. on
DOD-84),
Privacy ,
1984, pp. 312-318.
Key Words: MLS,
(5:
1984
Sec.
&
IEE-84), pp. 125-
design,
Key Words:
verification,
November 1989,
pp. 1382-
Key Words:
verification,
OS,
case.
kernel.
BAR-88
System Verification," IEEE Trans, on Software Engr., 1396.
131.
network.
A
BEN-85
BIR-86
Barker, W.C., P. Cochrane,
Benzel, T.C.V. and
Birrell,
and M. Branstad "Embedding Cryptography into a Trusted Mach System," Proc. 4th Aerosp. Comp. Sec. Conf.. (4: IEE-88b), 1988, pp. 379-383.
D.A. Travilla,
"A Global Authentication
'Trusted Software
Service Without Global Trust,"
Case Study," Proc. 1985 IEEE Symp. on
Proc. 1986
pp. 14-31.
Key Words: OS,
Key Words:
Verification:
Sec.
&
A
Privacy
,
(5:
IEE-85),
A.D., et
&
Sec.
IEEE Symp. on
Privacy. (5: IEE-86),
pp. 223-230.
Key Words: design,
cryptography.
verification,
al.
authentication,
methods.
software.
BLA-81
BAR-89
-BEN-89
Blakely, G.R., G.
Ma,
Benzel, T.C.V.
and L. Swanson
"Use of Privacy-Enhanced Mail for Software
"Developing Trusted Systems Using DOD-STD-2167A,"
Information Protection
Distribution," Proc. 5th
Proc. 5th Sec. Applicat. Conf. ,
Systems," Proc. 1981
Barker,
W.C.
Security AppHcat. Conf.
,
(4:
IEE-89C), 1989, pp. 344-347.
(4:
IEE-89C), 1989, pp. 166-
176.
Key Words: methods,
Key Words:
software.
methods.
BAX-86
trused, design,
"Security Proofs for
Symp. on Sec.
Key Words:
S., K. Lynch, Lipner
Blotcky,
"A Layered
"Security and Protection of
and
1986,
(2:
GRI-89).
Key Words: MLS,
IBM
Data in the
Proceedings, 7th
System/38,"
IEEE
Comp.
86), 1986, pp. 47-54.
Key Words:
7th Seminar, Sec. Progr.
,
DoD Comp.
(5:
DOD-84),
Key Words: MLS, design.
design, methods,
trusted,
Key Words: MLS,
design,
BOE-85
BER-88 Berch, R.,
et al.
"Use of Automated Software Development Methodology," Proc. 11th Natl.
NCS-
Sec. Conf. , (5:
case.
Verification Tools in a Secure
1984, pp. 24-29.
"SEA^MS: Implementing Mandatory Security in VAXA'MS," Proc. 9th Nad.
252.
case.
BeU, D.E. "Working Toward Al," Proc.
S.
Conference on Computer Architectures, 1980, pp. 245-
architecture.
BEL-84
verification,
BLO-86
Berstis, V.
,
(5:
methods.
BER-80
Multilevel Security," Proc. IFIP/Sec. '86 Monte Carlo,
IEEE
Privacy , IEE-81), pp. 75-88.
Baxter, M.S.J.
Architecture for
&
Comp.
Sec. Conf. , (5:
NCS-88). 1988, pp. 284-289.
Key Words:
verification,
software.
5-2
Boebert, W.E., R.Y. Kain,
and W.D. Young "Secure Computing: The Secure Ada Target Approach," Scientific Honeyweller July ,
1985, pp. 1-17.
Key Words: MLS, methods.
design,
BON-89
BOE-85a Boebert, W.E., et
BRA-88a
Bondi, J.O., and M.A. Branstad
Branstad, M., H. Tajalli,
"Architectural Support of
"Security Issues of the Trusted
Mach
176-183.
Fine-Grained Secure Computing," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989. pp. 121-130.
Key Words: MLS,
Key Words:
policy, case.
verification, design.
design.
"Secure
Ada
al.
Target: Issues,
System Design, and 1986
Verification," Proc.
IEEE Symp. on Privacy
.
Sec.
&
IEE-86), pp.
(5:
and
F.
Mayer
System," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 362-367. ,
,
Key Words: architecture,
Boebert, W.E. Demonstration," 'The
Branstad, M., et
1988, pp. 73-88.
Brand. S.L. "Environmental Guidelines for Using the DoD Trusted Computer Systems Evaluation Criteria," Proc. 7th Seminar.
Key Words: TCB.
DOD-84), 1984, pp. 17-23.
LOCK
Postscript, 11th Natl.
Comp.
Sec. Conf. , (5: NCS-88a),
OS,
BRA-89
BRA-84
BOE-88
trusted,
DoD Comp.
al.
"Access Mediation in a Message Passing Kernel," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b), ,
pp. 66-72.
Sec. Progr. , (5:
Key Words:
architecture, design.
control, kernel,
design.
Key Words: BOE-88a
criteria,
BRA-89a
guidelines.
M„ and J. Landauer "Assurance for the Trusted Mach Op>erating System," Proc.
Boebert, W.E.
Branstad.,
"Constructing an Infosec
System Using the LOCK Technology," Postscript, 11th Natl. Comp. Sec. Conf. (5: NCS-88a), 1988, pp. 89-95. ,
Key Words: TCB,
BRA-86 Branstad, M.A., et 'Trust Issues of Proc. 9th Natl.
al.
MACH-1,"
Comp.
COMPASS-89. Comp. Assurance
Sec.
Conf. (5: NCS-86), 1986. pp. 209-212.
103-108.
Key Words:
case.
,
Key Words:
design,
techniques.
(4.
,
trusted,
OS,
IEE-89), pp.
verification,
OS,
policy, case.
BON-83
BRI-85
Bonyun. D.A. 'The Use of Architectural Principles in the Design of
BRA-87
Britton, D.E.
Branstad, M.. et
'Trusted
Mach
"Verlangen:
al.
Design," Proc.
Certifiably Secure Systems."
3d Aerosp. Comp. Sec. Conf.
Computers
(5:
&
Security
,
June
.
IEE-87b). 1987. pp. 24-29.
Key Words: OS,
Bonyun, D.A. "Formal Verification: Its Purpose and Practice." Proc.
mP/Sec. (2:
'84 Toronto, 1984, FIN-85), pp. 217-223.
Key Words: general.
.
verification,
Verification
Secure Systems," Proc. 8th Natl.
Comp.
Sec. Conf. , (5:
design, case.
Key Words:
BRA-88
verification,
methods.
Branstad, M., and F.L.
BON-84
A
for Designs of
NCS-85), 1985, pp. 70-81.
1983, pp. 153-162.
Key Words: architecture, TCB, design.
Language
Mayer
"Access Mediation in ServerOriented Systems: An Examination of Two Systems," Proc. 11th Natl. Comp. Sec. Conf. , (5: NCS88). 1988. pp. 309-318.
Key Words:
control, design,
BRO-88 Brown, G.L. "Interdependence of Evaluated Subsystems," Proc. 11th Natl. Comp. Sec. Conf. , (5: NCS88), 1988, pp. 330-332.
Key Words: general.
methods.
5-3
trusted, design,
COX-81
CAS-89
BUS-83 Bussolati, U.
and G. Martella
"The Design of Secure Distributed Systems,"
Proceedings, 1983
Delivery," Proc. 5th Security
IEEE
Compcon
Spring Conf. pp. 492-498.
Casey, T., et al. "Secure Automated Document
,
Applicat. Conf.
1983,
IEE-89c),
(4:
Privacy
Key Words: Key Words:
,
1989, pp. 348-355.
Cox, L.A., and R.R. Schell 'The Structure of a Security Kernel for a Z8000 Multiprocessor," Proc. 1981 IEEE Symp. on Sec. &
trusted,
methods.
,
(5:
IEE-81), pp. 124-
129.
trusted, design,
CHE-81
general.
Key Words:
Cheheyl, M.H., et
CAR-86
al.
"Verifying Security,"
ACM
kernel, design,
case, architecture.
CRA-84
Carlson, R.A., and T.F. Lunt,
Computing Surveys
"The Trusted Domain Machine: A Secure Commimications Device for Security Guard Applications," Proc. 1986 IEEE Symp. on
September 1981, pp. 279-339.
Craigen, D.,
Key Words:
"Ottawa Euclid and EVES: Status Report," Proc. 1984
Sec.
&
Privacy
IEE-86),
(5:
.
pp. 182-186.
Key Words:
trusted,
network,
,
verification,
IEEE Symp. on
general.
Privacy
COO-88
(5:
Sec.
&
IEE-84), pp. 114-
124.
Cook, J., and D.F. Martin "Adding Ada Program
Key Words:
Verification Capability to the
design, case.
verification,
State Delta Verification
design.
System (SDVS)," Proc. 11th Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 139-146.
CAR-87
,
Carson, M.E., et
"From B2
to
al.
CMU:
Building
a Compartmental Mode Workstation on a Secure
Comp.
Aerosp.
Sec. Conf.
Craigen, D.
"m-EVES," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-
verification,
87a), 1987, pp. 109-117.
methods.
Key Words: ,
IEE-87b), 1987, pp. 35-
COR-84
design,
case.
CAR-88
Comwell, M.R. and
CRO-88
"Structure of a Rapid
Crocker, S.D., et
Prototype Secure Military
"Reverification of a
Message System," Proc. 7th
DoD Comp.
Microprocessor," Proc. 1989
Seminar,
IEEE Symp. on
Program
(5:
,
Sec.
DOD-84), 1984,
pp. 48-57.
Carroll, J.M.
verification,
design, case, methods.
R.J.K. Jacob
43.
Key Words: MLS,
CRA-87
,
Key Words:
Xenix Base," Proc. 3d (5:
.
A
Privacy
.
(5:
al.
Sec.
&
IEE-89b), pp. 166-
176.
"Implementing Multilevel Security
Key Words: MLS,
Privilege,"
case, network.
by Violation Computers & Security December 1988, pp.
design,
COR-89 Comwell, M.R.
Key Words: MLS,
design,
methods.
CAS-88 Casey, T.A., et al. "A Secure Distributed Operating System," Proc. 1988 IEEE Symp. on Sec. & Privacy (5: IEE-88a), pp. 27,
verification,
architecture, techniques,
methods, case.
,
563-573.
Key Words:
"A Software Engineering Approach
to
Designing
Trustworthy Software," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b). pp. 148-156 .
Key Words:
trusted, software,
CRO-88a Crow,
J.S., et al.
"EHDM
Verification
Environment
38.
Key Words: MLS, OS, network, design.
5-4
Overview,"
Comp.
Sec.
Conf. (5: NCS-88), 1988, pp. 147-155. ,
Key Words: design, case.
design.
— An
Proc. 11th Natl.
verification,
CSC-88a
CRO-89
CSC-89a
Crocker, S.D., and E.J. Siarkiewics
A
"Software Methodology for Development of a Trusted
NCSC-TG-001, National
MBS,"
Understanding Audit inTrusted Systems,
Proc. 5th Security
ApplicaL Conf.
,
Guide
to
Rating Maintenance Phase
Computer Security Center, Ft Meade, MD, 1 June 1988.
Program Document NCSCTG-013, National Computer Security Center, Ft. Meade, MD, 23 June 1989.
Key Words:
Key Words:
,
IEE-89c),
(4:
1989, pp. 148-165.
guidelines,
gtiidelines, design.
auditing.
Key Words:
CUM-87
trusted, software,
CSC-88b
methods.
Cummings,
CSC-85 Computer
Security
Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria ,
CSC-STD-003-85. National Computer Security Center, Ft. Meade, MD, 25 June 1985.
Interpretation of the Trusted
Computer System Evaluation
Prototyping," Proc. 1987
NCSC-TG-009,
Criteria,
Symp. on Sec.
National Computer Security
Ft Meade, September 1988.
Center,
MD.
IEEE
Privacy
,
(5:
16
Key Words: MLS,
design,
case, methods.
Key Words:
guidelines,
TCB,
CUT-88
criteria.
CSC-88C
guidelines,
&
IEE-87a), pp. 2-12.
M.
Cutler,
Key Words:
P.T., et al.
"Compartmented Mode Workstation: Results Through
Computer Security Subsystem
"Verifying Implementation
A
Guide to Understanding Design Documentation in Trusted Systems NCSC-TG-
Correctness Using the State
Technical Rationale Behind
007, National Computer
Comp.
CSC-STD-(X)3-85: Computer Security Requirements CSCSTD-004-85, National
Security Center, Ft. Meade,
88), 1988, pp. 156-161.
Computer Security Center, Ft. Meade, MD, 25 June 1985.
Key Words:
criteria.
CSC-85a
,
,
Key Words:
MD, 2
Key Words: guidelines,
A
Understanding Discretionary Access Control in Trusted Systems NCSCto
,
Understanding
to
52.
15
NCSC-TG-
Meade, December 1988.
design.
Key Words:
guidelines,
Verification Systems ,
A
Guide
to
Understanding
Configuration
Management
Trusted Systems
,
in
Davida,
NCSC-
G.I., et al.
"A System
Architecture to
Support a Verifiably Secure Multi-Level Security System,"
MD,
Proc. 1980
1
AprU 1989.
NCSC-TG-
Sec.
Key Words:
Security Center, Ft. Meade,
verification.
guidelines,
&
IEEE Symp. on
Privacy
,
(5:
design. guidelines,
design.
5-5
IEE-80),
pp. 137-144.
Key Words: MLS,
28 March 1988.
Key Words:
verification,
TG-014, National Computer Security Center, Ft. Meade,
006, National Computer
MD,
Key Words:
DAV-80
Guidelines for Formal
CSC-88
,
methods.
CSC-89
guidelines,
Ernst
MD,
Key Words:
control.
G.W.
Security Center, Ft.
,
008, National Computer
MD,
June 1988.
verification,
design, case.
"Formal Program Verification Using Symbolic Execution," IEEE Trans, on Software Engr. January 1982, pp. 43-
TG-003. National Computer Security Center, Ft. Meade, 1
NCS-
Dannenberg, R.B., and
Guide
Trusted Systems
Guide
(5:
DAN-82
Trusted Distribution in
CSC-87
,
design.
A
guidelines.
Sec. Conf.
October 1988.
CSC-88d
criteria,
Delta Verification System (SDVS)," Proc. 11th Natl.
architecture,
DOD-82
DIT-82 Dittrich, K.R., et al.
Proceedings. Fifth Seminar on
"Protection in the
Computer Security Initiative Program Department of Defense, Washington, DC,
OSKAR
the
Operating System: Goals, Concepts, Consequences," Sec.
&
,
IEEE Symp. on
Proc. 1982
Privacy
,
(5:
DoD
May
1982.
Key Words: proceedings, MLS, design.
Key Words: OS,
policy,
Proceedings, Sixth Seminar on
DIV-87
the
Di Vito, B.L., and L.A. Johnson
"A Gypsy
DoD
Initiative ,
Computer Security National Bureau of
Standards,
November 1983.
Verifier Assistant,"
Proc. 10th Natl.
Comp.
Sec.
Conf. (5: NCS-87a), 1987, pp. 183-192. .
Key Words:
Key Words: proceedings, MLS, design.
DOD-83a
methods.
Evaluation Criteria,
DOD-80
DoD
onthe
DoD
Computer
Security Initiative Program
,
Department of Defense, Washington, DC, January
Key Words: MLS,
1980.
design.
policy, verification,
TCB,
onthe
DoD
Computer Security Initiative Program
DoD Computer Security DoD Computer
Security Center, Ft.
MD,
Meade,
September 1984.
Key Words: proceedings, MLS, design.
DOD-85
Proceedings, Fourth Seminar
DoD
Computer Security Initiative Program
on
the
,
ELO-85 Eloff, J.H.P.
'The Development of a Language for a
Specification
Computer Security System," Computers & Security June ,
1985. pp. 143-147.
FAR-86 Farmer, W.M.,
DM.
Johnson,
and F.J. Thayer 'Towards A Discipline for Developing Verified Software," Proc. 9th Nad. Comp. Sec. Conf., (5: NCS-86), 1986. pp.
verification,
software.
FEL-87 Fellows,
J.,
et al.
Base," Proc. 10th Natl. Sec. Conf. , (5:
Department of Defense
Key Words: network.
Comp.
NCS-87a).
architecture.
1985.
Key Words: MLS, TCB,
1981.
criteria.
FET-88 Fetzer, J.H.
"Program Verification: The Very Idea," Communications of the ACM September 1988. ,
Key Words: general.
DOW-85 Downs, D.D.
et al.
"Issues in Discretionary
Access Control," Proc. 1985
IEEE Symp. on Privacy
,
Sec.
&
IEE-85), pp. 208-
(5:
218.
Key Words:
discretionary,
control.
5-6
TCB,
DoD
5200.28-STD, U.S. Department of Defense, Washington, DC, December
Department of Defense, Washington, DC, August
Key Words: proceedings, MLS, design.
specification,
methods.
Trusted Computer System Evaluation Criteria,
DOD-81
verification,
1987, pp. 68-77.
1980.
Key Words: proceedings, MLS, design.
Key Words:
"The Architecture of a Distributed Trusted Computing
,
Department of Defense, Washington, DC, November
Flow
1987, pp. 175-182.
Key Words:
Initiative ,
Proceedings, Third Seminar
FDM
91-98.
Proceedings, Seventh Seminar
DOD-80a the
criteria,
DOD-84
Key Words: proceedings, MLS, design.
on
CSC-STD-
Computer Security Center, Ft. George G. Meade MD, 15 August 1983. 001-83,
Proceedings, Second Seminar
The
Key Words:
Department of Defense Trusted Computer System
verification,
"InaFlo:
Tool," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a).
methods.
DOD-83
methods, case.
Eckman, S.T.
.
IEE-82),
pp. 46-56.
ECK-87
verification,
GAS -88
FRA-83 Fraim, L.J.
A
"SCOMP:
MLS
GLI-84
M.
Gasser,
Solution to the
Gligor. V.D.
Building a Secure Computer
System Van Nostrand
Problem," Proc. IFIP/Sec. '83 . Stockholm, 1983. (2: FAK-83), pp. 275-
Reinhold,
286.
Key Words: book,
,
MLS, Key Words: MLS,
New
-
"The Challenge After Al the Security
Key Words:
1984, pp.
denial, threats,
al.
'The Digital Distributed System Security Architecture," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-89), 1989, pp. ,
Market," Proc. 9th Natl. Comp. Sec. Conf. , (5: NCS86), 1986, pp. 41-46.
May
design.
Gasser, M., et
Fraim, L.J.
.
design.
GAS-89
FRA-86
View of
Software Engr. 320-324.
general,
design,
network, case.
A
York, 1988
"A Note on Denial-of-Service Problem in Operating Systems," IEEE Trans, on
GLI-85 Gligor. V.D.,
"Analysis of the Hardware Verification of the
SCOMP,"
305-319.
Key Words:
Honeywell
Proc. 1985
IEEE
Symp. on Sec. & Privacy IEE-85), pp. 32^4.
architecture,
,
(5:
design, case.
Key Words:
Key Words:
trusted, design,
Glasgow,
FRE-88 Freeman, L.
verification, case.
GLA-84
general.
J.,
R. Neely, and
Megalo
GLI-86
J.L, et al.
"Specifying Multilevel
Gligor, V.D., et
Security in a Distributed
"On
System," Proc. 7th Seminar,
"Developing Secure Systems: Issues and Solutions," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988,
DoD Comp.
pp. 183-190.
specification, design.
,
Sec.
Program
,
(5:
DOD-84). 1984. pp. 319-340.
Implementation of Secure
Xenix Workstations," Proc. 1986 IEEE Symp. on Sec. Privacy
Key Words: MLS,
al.
the Design and the
,
117.
Key Words: MLS, Key Words: MLS,
design,
GLI-83
"A Note on
GAB-86
the Denial of
Service Problem," Proc.
IEEE
"Smart Terminals for Trusted
Symposium on Security and Privacy AprU 1983, pp. 139-
Computer Systems,"
149.
Natl.
policy,
design, case.
Gligor, V.D.
general.
Gabriele,
&
IEE-86), pp. 102-
(5:
M.
Comp.
Proc. 9th
Sec. Conf.
,
.
GUgor, V.D., and C.S. Chandersekaran 'Toward the Development of Secure Distributed Systems," Proc. IFIP/Sec. '86
(5:
NCS-86), 1986, pp. 16-20.
GLI-86a
Key Words:
denial, threats,
,
Monte
Carlo, 1986, (2: GRI-89).
design.
Key Words:
trusted,
Key Words: MLS, network,
MLS, GLI-83a
design, network.
design.
Gligor. V.D.
GAM-88
GLI-86b
'The Verification of
Gambel,
Mechanisms of High-Level Language
and S. Walter "Retrofitting and Developing
Protection
Applications for a Trusted
NCS-88), 1988, pp. 344-346.
Machines." International Journal of Computer and Information Sciences August 1983, pp. 211-246.
Key Words: TCB,
Key Words:
D.,
Computing Base," Proc. 11th Natl.
Comp.
Sec. Conf.
,
(5:
,
Ghgor, V.D.,
et al.
"A New Security Testing Method and Its Application the Secure
Proc. 9th Natl.
Conf.
,
(5:
Comp.
Sec.
NCS-86), 1986, pp.
40-59 techniques.
design,
verification,
Key Words:
methods.
design, case.
5-7
to
Xenix Kemel,"
verification,
GRA-88
GLI-87 Gligor, V.D., et
HAI-87
Graubart., R.D.
al.
"Design and Implementation of Secure Xenix," IEEE Trans, on Software Engr. February 1987. pp. 208-221.
"Dual Labels Revisited," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp.
Key Words: MLS,
Key Words: MLS,
,
policy,
,
167-172. design,
Haigh, J.T, et al. "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Trans, on Software Engr., February 1987, pp. 157-168.
techniques.
design, case.
Key Words:
GRE-89
GLI-87a Gligor, V.D., et
al.
Grenier, G.-L., R.C. Holt, and
"A New Security Testing Method and Its Application
M. Funkenhauser
Secure Xenix Kernel," IEEE Trans, on Software Engr. February 1987, pp. 169-183.
Secure
to
Key Words:
"Policy vs.
HAI-87a
Mechanism
TUNIS
in
Operating
System," Proc. 1989 IEEE Symp. on Sec. & Privacy
,
,
(5:
IEE-89b), pp. 84-93.
Key Words:
verification,
caase.
covert channel,
case.
Haigh, J.T. and W.D. Young "Extending the Noninterference Version of MLS for SAT," IEEE Trans, on Software Engr. February 1987, pp. 141,
policy, design,
Key Words: MLS, model,
case.
case.
GOL-81
GUS-87
Golberg, D.L.
"The
SDC
Guspari, D.,
Communications
Kernel," Proc. 4th Seminar,
DoD Comp.
Sec. Progr.
,
(5:
DOD-81), 1981, pp. P1-P33.
Key Words:
CD.
HAL-85
Harper,
and N. Ramsey
Haley, C.J., and F.L.
"An
"Issues
ADA
Verification
Environment," Proc. 10th Comp. Sec. Conf. (5: NCS-87a). 1987. pp. 366-371. Nati.
.
Security Related Functional Tests," Proc. 8th Natl.
Sec. Conf.
(5:
,
Key Words:
verification, case.
Key Words:
HAD-88
GOL-84 Gold, B.D., R.R. Linde, and P.F.
Hadley.
S.. et al.
"KVM/370
in Retrospect,"
Library," Proc. 11th Natl.
Proc. 1984
IEEE Symp. on
Comp.
Sec.
&
Privacy
,
(5:
IEE-84),
Sec. Conf.
,
(5:
HAL-86 Halpem,
NCS-
88), 1988, pp. 246-249.
J.D., et al.
"MUSE - A
Proc. 1986
Key Words: kernel, design,
Computer-
Assisted Verification System,"
pp. 13-23.
Key Words:
verification,
design.
"A Secure SDS Software
Cudney
Comp.
NCS-85), 1985,
pp. 82-85.
kernel, network,
case.
Mayer on the Development of
trusted, software,
Sec.
&
IEEE Symp. on
Privacy
,
(5:
IEE-86),
pp. 25-32
case.
case.
Key Words:
HAI-86
GOO-88 Good,
Haigh. J.T., et al., "An Experience Using
D.I.
Two
"Producing Secure Digital Information Systems," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 180-182.
Covert Chaimel Analysis Techniques on a Real System Design." Proc. 1986 IEEE
Key Words: MLS,
Key Words:
.
&
Symp. on Sec. Privacy IEE-86), pp. 14-24.
.
(5:
verification, case.
HAL-87 Halpem,
J.D., et al.
"MUSE ~ A
Computer-
Assisted Verification System,"
IEEE
Trans, on Software Engr ., February 1987, pp. 151156.
techniques.
design,
covert chaimel,
Key Words:
case.
5-8
verification, case.
HAR-89a
HAL-87a
IEE-81
and S. Owre "Specification and Verification Tools for Secure
Harrison, L.J.
Runtime Support," Proc. 5th
Privacy Oakland,
Distributed Systems," Proc.
Security Applicat. Conf.
27-29, 1981,
Halpem,
J.D.,
Comp.
10th Natl. (5:
Sec. Conf. ,
Proceedings. 1981
"Security Issues and
Ada ,
Symposiumon (4:
IEE-89C), 1989, pp. 177-183.
,
IEEE
Security and
CA, April IEEE Computer
Society Press, Washington,
DC, 1981.
NCS-87a), 1987. pp. 78-
Key Words: MLS. methods,
83.
Key Words:
case.
Key Words:
HEN-85
general.
HAL-87b
M.W.
Hale,
proceedings,
research.
verification,
"Using the Computer Security Subsystem Interpretation," AIAA No. 87-3097. Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b). 1987. pp. 128,
Henning. R.R. "Multilevel Application Development," Proc. 8th Nad. Comp. Sec. Conf. (5: NCS85), 1985, pp. 137-140. ,
IEE-82 Proceedings. 1982
Symposium on
CA, April IEEE Computer Society Washington, DC. 1982.
Privacy Oakland, ,
1982, Press,
Key Words: MLS,
IEEE
Security and
design,
Key Words:
methods.
130.
proceedings,
research.
HEN-88 Key Words: TCB,
criteria,
general.
Henning, M., and A. Rhode "On the Suitability of Z for the Specification of Verifiably
HAR-84
Computer February 1983.
Secure Systems," Proc.
Hartman.
BA.
mP/Sec.
"A Gypsy-Based Kernel," IEEE Symp. on
,
'88 , Australia, 1989,
Key Words: MLS,
CAE-89). pp. 197-221.
(2:
Sec.
&
Privacy
,
(5:
IEE-84),
Key Words:
specification,
IEE-83a
case.
Proceedings. 1983
Key Words:
verification,
kernel, case.
HAR-85
ACM
Architecture,"
Operating Systems
CA, April IEEE Computer
Privacy Oakland,
"The Trusted Server Approach
25-27, 1983,
.
Multilevel Security." Proc. .
IEE-89C). 1989. pp. 335341.
IEEE
Security and
Hinke. T.H. to
"KeyKOS
Symposium on
HIN-89
5th Security Applicat. Conf.
Hardy, N.
networks,
methods, design, cryptogr^hy.
Proc. 1984
pp. 219-226.
IEE-83 "Data Security in Computer Networks, Special Issue," IEEE
Society Press, Washington,
DC, 1983.
(4:
Review October, 1985.
Key Words:
proceedings,
research.
,
Key Words: MLS. methods,
Key Words:
architecture,
IEE-83b "Computer Security
design.
kernel, case.
Technology, Special Issue,"
IEE-80
HAR-89
Proceedings, 1980
Symposium on
Harrold, C.L.
"An
Introduction to the
SMTTE Approach
to
Secure
Computing," Computers & Security October 1989, pp. ,
IEEE
,
July 1983.
Privacy Oakland,
Key Words: MLS, methods,
14-16, 1980,
design, kernel, research.
,
CA, April IEEE Computer
Society Press. Washington,
IEE-84
DC, 1980.
Proceedings. 1984
495-505.
Key Words:
Key Words: MLS, methods,
IEEE Computer
Security and
proceedings,
Symposium on
IEEE
Security and
Privacy Oakland, CA, April 29-May 2, 1984, IEEE Computer Society Press, Washington. DC. 1984.
research.
,
design, case.
Key Words: research.
5-9
proceedings,
JAN-89
IEE-88
IEE-85 Proceedings. 1985 ffiEE
Proceedings, 1988
Symposiumon
Symposiumon
Security and
CA. April IEEE Computer
CA, April IEEE Computer
Privacy Oakland,
Privacy Oakland, 18-21, 1988,
,
Society Press, Washington,
Society Press, Washington,
DC, 1985.
DC, 1988.
Keywords; proceedings,
Key Words:
research.
research.
IEE-85a
.
Key Words:
proceedings,
IEEE
verification,
methods.
JOH-89
IEE-88a
Proceedings. 1985
J.VA., J.S. Barlas, and L.L. Chang "Adding CASE Technologies to Formal Verification"* Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 52-64.
Janieri,
Security and
22-24. 1985,
.
IEEE
LA.
Proceedings, Fourth Aerospace
Johnson,
Aerospace Computer Security Conference IEEE Computer Society Press. Washington
Computer Security Conference IEEE Computer Society Press, Washington,
"Formal Specification Verification: Fundamental Concerns," IEEE Cipher Aixil
DC. March 1985.
DC, December 1988.
1989. pp. 25-33.
Key Words:
Key Words:
.
Key Words:
proceedings,
design, methods, case.
,
,
proceedings,
design, methods, case.
IEE-86
Symposium on
Security and
Privacy , Oakland, 7-9. 1986,
IEEE CA,
April
IEEE Computer
verification,
general.
JOS-87
IEE-89
Proceedings, 1986
&
Proceedings, 1989
Symposium on ,
CA. May
M.K.
Joseph,
'Toward the Elimination of
Security and
Privacy Oakland, 3, 1989,
IEEE 1-
IEEE Computer
the
Effects of Malicious Logic:
Fault Tolerance Approaches,"
Comp.
Society Press, Washington,
Society Press, Washington,
Proc. 10th Natl.
DC, 1986.
DC. 1989.
Conf. (5: NCS-87a). 1987. pp. 238-244.
Key Words:
proceedings,
research.
Sec.
.
Key Words:
proceedings,
Key Words:
research.
denial, design,
methods.
IEE-86a
IEE-89a
KAR-84
Proceedings, Second
Proceedings, Fifth Security
Aerospace Computer Security Conference IEEE Computer Society Press, Washington,
Applications Conference ,
Karger, PA., and A.J. Herbert
IEEE Computer Society Press, Washington, DC, December
Architecture to Support Lattice
DC. 1986.
1989.
,
Key Words:
proceedings,
design, methods, case.
IEE-87
Key Words:
proceedings,
Symposium on
IEEE
Security and
CA, April IEEE Computer
A
Secure Message Preparation Workstation Development," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp.
Multilevel
,
Key Words:
proceedings,
architecture,
"Genesis of a Secure
27-29. 1987.
DC, 1987.
&
capabihty.
al.
Application:
Society Press, Washington,
Security and Traceability of Access," Proc. 1984 IEEE Privacy . (5: Symp. on Sec.
Key Words:
Irvine, C.E., et
Privacy Oakland, ,
Capability
IEE-84), pp. 2-12.
design, case.
IRV-88
Proceedings, 1987
"An Augmented
16-29.
KAR-87
PA.
Karger,
"Limiting the
Damage
Potential of Discretionary
Trojan Horses," Proc. 1987
IEEE Symp. on
Sec.
&
Privacy (5: IEE-87a), pp. 32-
research.
,
Key Words: MLS, IEE-87a
policy,
37.
design, case.
Proceedings, Third Aerospace
Key Words:
Computer Security
vulnerabilities,
Conference IEEE Computer Society Press, Washington,
discretionary.
,
DC, 1987.
Key Words:
proceedings,
design, methods, case.
5-10
threats,
methods,
KAU-87
KIN-88
KUH-88
Kaufmann, M., and
King, G., and B. Smith
W.D. Young
"INFOSEC IRAD
"Comparing Specification Paradigms for Secure Systems: Gypsy and the Boyer-Moore Model," Proc.
Magnavox: The Trusted Military Message Processor
10th Natl. (5:
Comp.
Sec. Conf. .
NCS-87a), 1987, pp. 122-
(TRUMMP) &
Kuhn, D.R. "Static Analysis Tools for Software Security
at
Certification," Proc. 11th Natl.
Comp.
the MiUtary
Key Words:
Comp.
Key Words:
NCS-
Sec. Conf. , (5:
Key Words:
specification,
methods, design, case.
design, network,
LAM-85 Lampson, B.W. "Protection,"
KIN-88a
Kemmerer, R. "FDM: A Formal Methodology for Software Development," Proc. 3d Seminar,
DoD Comp.
Progr. , (5:
Sec.
DOD-80b), 1980,
pp. Ll-19.
ACM
Operating
Systems Review December ,
King, G., and
"An
certification,
software.
case.
KEM-80
NCS-
88), 1988, pp. 290-298.
88), 1988, pp. 250-256.
128.
Sec. Conf. , (5:
Message Embedded Executive (ME2)," Proc. 11th Nad.
W. Smith
1985, pp. 13-24.
Alternative
Implementation of the Reference Monitor Concept," Proc. 4th Aerosp. Comp. Sec. Conf. , (4: IEE-88b), 1988, pp. 159-166.
Key Words:
policy, models,
general.
LAN-81 Landwehr, C.E. "Assertions for Verification of
Key Words:
Key Words: MLS, model,
specification,
methods, case.
ACM
design.
KEM-82
KOR-84
Kemmerer, R.A. "A Practical Approach
Timing Chaimels," Proc. 1982 IEEE Symp. on Sec. Privacy
&
IEE-82), pp. 66-
(5:
73.
Key Words:
,
Vol. 5, No.3, July 1980.
Korelskiy, T., and to
Identifying Storage and
covert chaimel,
methods.
KEM-86
D. Sutherland
Key Words:
"Formal Specification of a Multi-Level Secure Operating System," Proc. 1984 IEEE
methods.
&
verification,
LAN-82
IEE-84). pp. 209-218.
Landauer, C, and S. Crocker "Precise Information Flow Analysis by Program
Key Words: MLS,
Verification." Proc.
specification, case.
Symp. on Sec.
Symp. on Sec.
Privacy
,
(5:
1982 IEEE
Privacy IEE-82), pp. 74-80. «fe
(5:
,
KRA-83
Kemmerer, R.A. Verification Assessment Study Final Report C3CROl-86, National Computer Security Center, Ft. Meade, ,
MD,
Multi-Level Secure MUitary Message Systems," Software Engineering Notes
1986.
Key Words:
Kramer, S.M., and D.P. Sidhi "Security Information
Flow
verification,
LAN-83
,
Landwehr, C.E. "The Best Available Technologies for Computer
Key Words: MLS, models,
Security,"
flow.
July 1983. pp. 89-100.
Ketcham, L.R. "Program Containment in a Software-Based Security
Kramer, "Linus
general.
S.
IV~An
Computer
Experiment in
Security," Proc.
Architecture," Proc. 11th
1984 IEEE Symp. on Sec.
Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 299-308.
Privacy
Key Words:
Key Words: MLS, OS,
,
design, methods,
IEEE Computer
Key Words:
KRA-84
KET-88
Key Words: verification, methods, flow.
Multidimensional Arrays,"
IEEE Trans, on Computers December 1983, pp. 11881190.
general.
software.
in
,
(5:
&
IEE-84), pp. 24-
32.
design, case.
5-11
.
design, methods,
LUM-89 Lu, M.M.
LEV-89
LAN-83a Landwehr, C.E. "Requirements for Class Al Systems and Major Differences between Division A and Division B Systems," Proc. 6th Seminar,
DoD
Comp.
Sec. Program (5: DOD-83a), 1983, pp. 27-32
Levin, T, S.J. Padilla, and
C.E. Irvine
"A Formal Model
for
IEEE
Setuid," Proc. 1989
Symp. on Sec.
UNIX
&
Privacy IEE-89b), pp. 73-83.
"Guidelines for Formal Verification Systems: Overview
and Rationale," Proc. 12th ,
(5:
Natl.
Comp.
Sec. Conf.
,
(5:
NCS-89), 1989, pp. 75-82.
,
Key Words:
models, OS, case.
Key Words:
verification,
guidelines.
Key Words: MLS,
LEV-89a
criteria,
MAC-83
Levin, T.E., S.J.Padilla,
general.
MacEwen, G.H.
and R.R. Schell
LAN-84
"Engineering Results from the
Landwehr, C.E., and J.M. CarroU "Hardware Requirements for
Al Formal
Secure Computer Systems:
89), 1989, pp. 65-74.
A
Verification
Process," Proc. 12th Natl.
Comp.
Sec. Conf.
Framework," Proc. IEEE Sympos. on Security and
Key Words:
Privacy April 1984, pp. 34-
design, case.
,
,
(5:
NCS-
verification,
"The Design for A Secure System Based on Program Analysis," IEEE Trans, on Software Engr. , 289-298.
May
Key Words: MLS,
1983, pp.
design,
case.
40.
MAC-84
LOE-85
Key Words:
architecture,
general.
Loeper, K.
MacEwen, G.H., and
"Resolving Covert Charmels
D.T. Barnard "The Euclid Family and Its Relation to Secure Systems,"
Within a B2 Class Secure System," Operating Systems Review July 1985.
ACM
LAN-85 Landwehr, C.E., and H.O. Lubbes "Determining Security Requirements for Complex Systems with the Orange Book," Proc. 8th Natl. Comp. Sec. Conf. (5: NCS-85), .
,
Key Words:
requirements,
criteria.
Lee, T.M.P. "Statistical
TCBs
Privacy
(5:
,
&
Sec.
1989
IEE-89b), pp.
ACM
Operating
models,
general.
LEV-80 Levitt, K.N., P.G.
MacEwen, G.H., B. Burwell, and
Z.J. Lu,
Systems Review April 1989,
"Multi-Level Security Based
pp. 39-44.
on Physical Distribution," Proc. 1984 IEEE Symp. on Sec. &
,
covert channel,
Privacy
,
(5:
IEE-84), pp. 167-
177.
Key Words: MLS,
LUC-86 Luckenbaugh, G.L.,
et al.
Neumann,
nethods,
design.
"Interpretation of the Bellin
Secure
Xenix," Proc. 9th Natl. trusted,
specification, case.
MAC-84a
Loepere, K.
LaPadula Model
10-19.
Key Words:
(5:
Trust:
vs. People," Proc.
IEEE Symp. on
,
DOD-84), 1984, pp. 79-87.
Key Words:
case.
Models of
DoD
Program
LOE-89
Key Words:
LEE-89
Sec.
case.
Revisted,"
Key Words:
covert chaimel,
"The Covert Charmel Limiter
1985, pp. 156-162.
Proc. 7th Seminar,
Comp.
Sec. Conf. , (5:
Comp.
NCS-86),
MAR-83 Marick, B.
"The
VERUS
Design
1986, pp. 113-125.
Verification System," Proc.
Key Words: model, methods,
Privacy
case.
160.
1983 IEEE Symp. on Sec. ,
(5:
&
IEE-83a), pp. 150-
and L. Robinson
The SRI
Key Words:
Hierarchical
Development Methodology and
Its
Application to
Development of Secure Systems SP 500-67, NBS, ,
Gaithersburg,
MD,
1980.
Key Words: MLS, methods, design, case.
5-12
verification, case.
MAY-89
MAR-84
MEA-87
"An Overview of Multics Security," Proc. MP/Sec. ;84. Toronto. (2: FIN-85).
•INFOSEC
1984. pp. 225-235.
12th Natl.
Key Words:
architecture,
(5:
MAR-88
Systems: Reducing Covert Channels." Proc. 1987 IEEE Symp. on Sec. & Privacy (5: IEE-87a), pp. 212-218.
Sec. Conf. .
NCS-89). 1989, pp. 135-
,
"Issues in Process
Key Words:
trusted, design,
case, network.
Modek
MIG-87
McDermott, J. "A Technique
Sec. Conf. , (5:
NCS-88), 1988, pp. 109-113.
Migues. S. "The Need for Rigorous Informal Verification of
Removing
for
an Important Class of Trojan Horses from Higher Order Languages," Proc. 11th Natl. Comp. Sec. Conf. (5: NCS-
Specifications-to-Code
Correspondence." Proc.
COMPASS
.
Key Words:
trusted,
models,
Assurance
88). 1988, pp. 114-117.
Key Words:
MAR-89
ADA (5:
Comp.
Key Words: verification, methods specification.
McHugh, J. "An EMACS Based
to
Sec. Conf. .
NCS-89). 1989, pp. 28-
Downgrader
for the
Proc. 8th Natl.
MIL-81 MiUer. IS.
SAT."
Comp.
"Military
Sec.
Conf. (5: NCS-85). 1985. pp. 133-136.
51.
.
Key Words:
Key Words: MLS,
Sec.
&
Privacy
.
(5:
IEE-81),
techniques,
Key Words: models, methods,
case.
MAR-89a
case.
MCH-85a
Marmor-Squires, A., et al. "A Risk Driven Process
Model
for the
McHugh, J. and D.I. Good "An Information Flow Tool for Gypsy," Proc. 1985 IEEE
Development
of Trusted Systems," Proc. 5th Security Applicat. Conf.
,
IEE-89C), 1989, pp. 184-
Symp. on Sec.
&
Privacy
,
MIL-82 Millen, J.K.
"Kemel
Isolation for the
11/70," Proc. 1982
(5:
Symp. on Sec.
IEE-85), pp. 46-48.
&
PDP
IEEE
Privacy
,
(5:
IEE-82), pp. 57-65.
192.
Key Words:
Key Words: risk,
Message Systems:
Applying a Security Model." Proc. 1981 IEEE Symp. on 101-111.
verification,
methods, case.
(4:
Comp.
IEE-87). 1987.
MCH-85
Approach
VCTification." Proc.
12th Natl.
'87: (2:
threats,
techniques.
Marceau, C. and CD. Harper Interactive
.
pp. 13-25.
design, general.
"An
covert channel,
methods, architecture, case.
MCD-88
and Integrated Environments for Trusted Systems Development," Proc. 11th
Its
Application to Message
Product," Proc.
Comp.
Key Words:
Marmor-Squires, A3., and P.A. Rougeau
Comp.
"The Integrity Lock Architecture and
145.
design, case.
Natl.
Meadows. C.
Mayer, F.L., and J^i. McAuliffe "The Design of the Trusted Workstation: A True
Margulis, B.I.
trusted,
model,
verification,
Key Words: kemel,
methods, case.
methods, desigiL
technique,
case.
MCM-85
MAY-88
MIZ-87
McMahon, E.M.
Mayer. F.L.
"Restricted Access Processor
"An
-
Interpretation of a
Refined Bell-LaPadula Model for the T-Mach Kemel." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 368-378. .
An
Application of Computer
Security Technology," Proc.
Aerospace Computer Sec. Conf. 71-73. .
(5:
IEE-85a). 1985. pp.
Mizimo, M., and A.E. Oldenhoeft "Information Flow Control in a Distributed Object-Oriented System with Statistically Bound Object Variables," Proc. 10th Natl.
Key Words: MLS. methods,
Key Words: MLS. model, kemel, case, methods, design.
-
(5:
Comp.
Sec. Conf.
design, case.
Key Words: techniques.
5-13
,
NCS-87a). 1987. pp. 56-67. control, slow,
MUR-88
NCS-88a
Murray, M., R. Berch, and S. Caperton "Use of Automated Verification Tools in a Secure Software Development Methodology," Proc. lldi Natl.
Comp.
Sec. Conf.. (5:
Computer Security Future,
A
NEU-86 ...
Into the
Postscript, 11th
National Computer Security Conference . National Institute of Standards and Technology/ National Computer Security Center, October 1988.
NCS-88), 1988, pp. 284-289. verification,
proceedings,
design.
general.
software, methods, design,
NEU-88
NCS-89
case.
Neugent. W.,
Information Systems Security: Solutions for Today -
NCS-85 Proceedings, 8th National
Concepts for Tomorrow.
Computer Security
Proceedings. 12th National
Conference National Bureau of Standards/National
Computer Security
,
Computer Security Center,
Key Words:
Conference National Institute of Standards and Technology/ .
Key Words: MLS, methods, design.
Neugent,
Key Words:
proceedings,
W.
"Guidelines for Specifying
general.
Security Guards," Proc. 12th
NCS-86
Natl.
Computer Security - For Today... and for Tomorrow,
.
NEU-89
proceedings,
general.
"Security Guards: Issues and Approaches." IEEE
Communications Magazine August 1988. R). 25-29.
National Computer Security Center. October 1989.
September 1985.
Software Engr.. September 1986. pp. 905-920.
Key Words: models, methods,
Key Words:
Key Words:
Neumann, P.O. "On Hierarchical Design of Computer Systems for Critical Applications." IEEE Trans, on
NEE-85
Comp.
Sec. Conf. . (5:
NCS-89). 1989. pp. 320-338.
Proceedings, 9th National
Neely. R.B. and J.W. Freeman,
Computer Security
Key Words: MLS. methods,
"Structuring Systems for
design.
Conference National Bureau of Standards/National
Formal Verification," Proc. 1985 IEEE Symp. on Sec.
Computer Security Center.
Privacy .
,
(5:
&.
IEE-85). pp. 2-13.
September 1986.
Key Words: Key Words:
proceedings,
verification,
ONE-86 O'Neil-Dunne. J. 'The Access Path," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86). 1986. pp. 149-155. .
design.
general.
NEE-89
NCS-87 Computer
Security...
From
Key Words: TCB.
Neely. R.B.. J.W. Freeman, and M.D. Krenzin
PAR-88
Principles to Practice ,
"Achieving Understandable
Proceedings, 10th National
Results in a Formal Design
Computer Security
Verification," Proc.
Conference National Bureau of Standards/ National
Sec.
Computer Security Center,
124.
,
(3:
Comp. Foundat. Workshop n
Parker.
TA.
"Structuring Trust in a Large .
IEE-89a). 1989. pp. 115-
General Purpose Operating System." Proc. 4th Aerosp.
Comp.
September 1987.
Sec. Conf. . (4: lEE-
88b). 1988. pp. 152-158.
Key Words:
Key Words:
control,
design.
proceedings,
verification,
Key Words:
methods.
trusted.
OS.
design, case.
general.
NEI-84
NCS-88
PAR-89
Neilson. J.O.. and
Computer Security
...
Into the
Future, Proceedings, 11th
National Computer Security
Conference National Institute of Standards and Technology/ ,
National Computer Security
F.E.
Wuebker
Partney. T.J.
"Design Experiences from the Multilevel Secure MCF." Proc. 1984 IEEE Symp. on Sec.
&
Privacy
.
(5:
IEE-84).
pp. 204-208.
'The Incorporation of MultiLevel IPC into UNIX." Proc.
1989 IEEE Symp. on Sec. Privacy .
(5:
&
IEE-89b). pp. 94-
99.
Center. October, 1988.
Key Words: MLS. Key Words:
proceedings,
design,
Key Words: MLS. methods, design, case.
case.
general.
5-14
POZ-84
PER-84 Perrine, T.,
J.
Codd,
and B. Hardy
"An Overview of
the
Kemelized Secure Operating System (KSOS)," Proc. 7th Seminar.
DoD Comp.
Sec.
DOD-84). 1984,
Progr. . (5:
pp. 146-160.
ROU-87
Pozzo, M.M. "Life Cycle Assurance for Trusted Computer Systems: Configuration Mangement
Rougeau, P.A. "Integrating Security into a
A
Total Systems Architecture,"
DoD Comp.
7th Seminar,
3d Aerosp. Comp. Sec.
Proc.
Strategy for Multics," Proc.
Conf. .
Sec
.
(5:
IEE-87b), 1987, pp.
118-121.
DOD-84). 1984.
Progr. . (5:
Key Words: TCB,
pp. 169-179.
architecture,
design.
Key Words: OS,
Key Words:
kernel,
methods,
trusted,
RUS-81
design, case.
design, case.
Rushby, J.M. 'The Design and Verification of Secure Systems," Operating Systems Review
PRO-85
PFL-88 Pfleeger,
CP., and
ACM
Proctor, N.
S.L. Pfleeger
"The Restricted Access
"A Transaction Flow
Processor, an
Approach
Security Certification for
Formal Verification." Proc. 1985 IEEE Symp. on Sec.
Document Handling
Privacy
to Software
Systems," Computers Security
,
&
.
(5:
,
Example of
Vol. 15.
&
IEE-85). pp. 49-
verification, case.
PRO-89
certification,
Proctor, N., and R.
case.
PFL-89 CP., S.L. Pfleeger, and M.F. Theofanos "A Methodology for
Pfleeger,
Wong
Proceedings, International
Secure Distributed Operating System Prototype," Proc. 5th Security AppHcat. Conf. (4: ffiE-89c), 1989, pp. 95-102.
Symposium on Programming
,
pp. 613-620.
,
Springer, Berlin, 1982, pp.
352-367.
Key Words: Key Words: OS,
Security ,
November 1989,
Rushby, J.M. "Proof of Separability, A Verification Technique for A Class of Security Kernels," in
"The Security Policy of
Penetration Testing,"
&
verification,
design.
RUS-82 Key Words:
495-502.
Computers
Key Words:
53.
October 1988, pp.
Key Words:
1982. pp. 12-21.
5.
verification,
techniques.
policy,
design, case.
RUS-83
Key Words:
vulnerabilities,
methods.
RAJ-86
Rushby, J.M., and
Rajimas, S.A., et "Security in
KeyKOS,"
Proc.
1986 IEEE Symp. on Sec.
PFL-89a Pfleeger,
CP.
Privacy
Computing Prentice Hall, Englewood
Security in Cliffs.
B. Randell
al.
,
(5:
&
IEE-86), pp. 78-
Key Words: methods,
NJ, 1989
Distributed Secure System."
Sec.
&
IEEE Symp. on
Privacy
.
(5:
IEE-83a).
pp. 127-135.
85
.
"A
Proc. 1983
design,
Key Words:
architecture,
design, case.
case.
Key Words: book, MLS, RUS-84
ROS-89
cryptography general.
Rushby. J.M.
Rosenthal. D.
PLA-81
"Implementing a Verification
"The Evaluation of Three Specification and Verification
Methodologies," Proc. 4th Seminar, DoD Comp. Sec
for
.
(3:
IEE-89a). pp. 133-140.
"A Trusted Computing Base Embedded Systems." Proc. 7th Seminar. DoD Comp. Sec. Progr. (5: DOD-84). 1984, pp. for
.
294-311.
.
DOD-81), 1981, pp. X1-X17. Progr. . (5:
Key Words:
McCullough Security." Proc. Comp. Sec. Foundat. Workshop 11 1989
Methodology
Platek, R.A.
Key Words:
verification,
design, case.
verification,
methods, specification, case.
5-15
Key Words: TCB, case.
design,
SCH-84
RUS-89
SCH-87
Russell, T.T., and M.Schaefer
Schaefer, M., and R.R. Schell
'Toward a High B Level
'Toward an Understanding of
Security Architecture for the
Extensible Architectures for
IBM ES/3090
'TCB
Evaluated Trusted Computer
Evaluation," Proc.
System Products," Proc. 1984 IEEE Symp. on Sec. &
Comp.
Processor
Resource/System Manger," Proc. 12th Natl. Comp. Sec. Conf. , (5: NCS-89), 1989, pp. 184-196.
Privacy
,
(5:
Schockley, W.R., and R.R. Schell Subsets for Incremental
3d Aerosp.
Sec. Conf. , (5: lEE-
87b), 1987, pp. 131-139.
IEE-84), pp. 41-
5L
Key Words: TCB, methods, design.
Key Words:
Key Words:
architecture,
architecture,
SCH-88
general.
design, case.
Schaffer. M.A., and G.
SAY-87
SCH-84a and T.F. Tao "Microprocessor-Based Trusted Systems for
Saydjari, O.S.,
Leaman
Securely," Proc. 10th Natl.
Comp.
Sec. Conf.
,
NCS-
(5:
87a), 1987, pp. 129-141.
LOCK
TCB," Comp. Sec.
Conf. . (5: NCS-88), 1988, pp. 319-329.
Workstation Application," Proc. 7th Seminar, DoD
Key Words: OS,
Comp.
design, case.
Sec. Progr. . (5:
Walsh
Implementing
Proc. 11th Natl.
Communication and
"Lxjcking Computers
On
Unix on the
Schell, R.R.,
J.M. Beckman, and J.R.
"LCXTK/ix:
DOD-
architecture,
84), 1984, pp. 277-290.
Key Words: TCB.
SCH-88a
Key Words:
architecture, case.
Schockley. W.R., T.F. Tao,
architecture,
and M.F. Thompson "An Overview of the GEMSOS Al Technology and
design,
SAY-89 SCH-84b
Saydjari, O.S.. J.M.
Beckman, and J.R. Leaman "LOCK Track: Navigating Uncharted Space," Proc. 1989
ScheU, R.R. "Future of Trusted Computer Systems," Proc. IFIP/Sec. '84 Toronto, 1984, (2: FIN-85),
IEEE Symp. on
pp. 55-67.
Privacy
,
(5:
Sec.
&
Applications Experience," Proc. 11th Nad. ,
(5:
Comp.
Sec. Conf.
245.
Key Words: MLS, OS,
IEE-89b), pp.
Key Words:
167-175.
Key Words: TCB,
trusted, general.
SCH-83
M.
ScheU, R.R., T.F. Tao, and
Schaefer,
M. Heckman
"Symbol Security Condition
"Designing the
ScheU, R.R. "Evaluating Security Properties of Computer Systems," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: IEE-83a), pp. 89-95.
kernel,
methods, design, case.
SCH-89
SCH-85
artchitecture, case.
,
NCS-88), 1988, pp. 238-
GEMSOS
Security Kernel for Security
and Performance," Proc. 8th Nad. Comp. Sec. Conf. (5: NCS-85), 1985. pp. 108-120. ,
Considered Harmful," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b). pp. 20,
46.
Key Words: model,
,
Key Words:
kernel, design,
requirement, case.
case.
Key Words: methods,
SCH-89a
design,
SCH-86
general.
Schultz, A.C.
SCH-83a Schell. R.R.
"A
Security Kernel for
"Using Software Tools Analyze the Security
A
Characteristics of
Multi-Processing Micro-
Computer," IEEE Computer July 1983, pp. 47-53.
,
to
HOL
Programs," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS86), 1986, pp. 108-112.
SchallenmuUer, E., et al. "Development of a MultUevel Data Generation AppUcation for
GEMSOS,"
case.
kernel, design,
,
(4:
IEE-89C), 1989, pp. 86-90.
,
Key Words: MLS, case.
Key Words:
Proc. 5th
Security Applicat. Conf.
Key Words: methods, techniques, design.
5-16
design,
SOL-81
SHI-81
and R.R. Schell
Shirley, LJ.,
"Mechanism Sufficiency Validation by Assignment," Proc. 1981 IEEE Symp. on
&
Privacy. (5: IEE-81), pp. 26-32. Sec.
VAR-89
Solomon. D.J.
Varadharajan. V.. and
"Processing Multilevel Secure Objects," Proc. 1981
&
IEEE
Symp. on Sec. Privacy IEE-81), pp. 56-61.
,
(5:
.
Key Words: MLS, methods,
Key Words:
requirements,
Black "Formal Specifiaction of a Secure Distributed Messaging System," Proc. 12th Natl. Comp. Sec. Conf. (5: NCSS.
89). 1989, pp. 146-171.
design.
Key Words:
methods.
specification, case.
STA-86 SID-84
Stauffer, B.C.,
and R.U.
Fujii
"Informal Verification
"Executable Logic
Analysis." Proc. 9th Natl.
Specifications:
Comp.
Approach
A New
Computer
to
Security," Proc. 1984
&
NCS-
(5:
specification,
Sffi-87
W.O.. et al. "Unix and B2: Are They
Siebert,
Compatible?," Proc. 10th Nad. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 142,
criteria,
case.
verification,
Key Words:
SWA-85
Sec.
&
Privacy
.
IEE-86),
(5:
Key Words:
control, methods.
Symp. on Operating
Syst.
Principles . 1983. pp. 143-154.
Key Words: OS.
Walker. S.T.
'The Advent of Trusted Systems." Proceedings, 1980 ,
1980. pp. 655-666.
Key Words:
trusted, plicy,
"FTLS-Based Security Testing
LOCK,"
Proc. 12th Nati.
Sec. Conf. , (5:
Key Words:
ACM
WAL-80
methods.
NCS-
verification, case.
WAL-80a B.J.. R.A. Kemmerer. and G.J. Popek "Specification and Verification of the UCLA Unix Security
Walker,
Kernel." Communications of
Verification of the Security
Kernel." Proc., 9th
verification, case.
Nati.
J.
of an Operating System
Sec.
Comp. Conference AFIPS Press, Reston, VA,
pp. 190-196.
89), 1989, pp. 136-145.
"Reflections on the
Overview,"
Comp.
methods.
Comp. Silverman,
An
Key Words:
for
SIL-83
Environment: ,
Taylor, T.
Key Words: MLS,
all.
Conf. (5: NCS-88). 1988, pp. 147-155.
TAY-89
149.
et
Verification
Proc. 11th Nati.
Swaminathan, K. "Negotiated Access Control," Proc. 1986 IEEE Symp. on
methods.
"EHDM
86), 1986, pp. 126-129.
IEEE
Privacy . Symp. on Sec. IEE-84), pp. 142-153.
Key Words:
Sec. Conf. , (5:
VON-88 von Henke. F.W.,
Sidhu, D.P.
TUR-81 Tum,
the
Advances Security
.
in
ACM
,
February 1980, pp.
118-131.
R. (Ed.)
Computer System
Key Words:
Artech House,
Dedham, MA, 1981.
specification,
methods, verification, case.
verification,
Key Words: book,
case.
general.
WEI-82 Weissman. C.
SMI-86 Smith, T.A. "User-Definable Domains as a
Mechanism
TUR-84 Tum,
Advances Security
for
.
in
Computer System
Vol. 2. Artech
House. Dedham.
Implementing the Least
An Approach Technology
"Bizarre Bazaar: to Security
R. (Ed.)
MA,
1984.
Transfer." Proc. 5th Seminar,
DoD Comp.
Sec. Progr.
,
(5:
DOD-82), 1982, pp. 233-240.
Privilege PrirKiple," Proc. 9th
Nad. Comp. Sec. Conf. (5: NCS-86). 1986, pp. 143-155. .
Key Words: techniques.
design,
Key Words: book,
general.
Key Words: MLS, methods, techniques.
TUR-88 Tum.
R. (Ed.)
Advances Security
,
in
Computer System
Vol. 3, Artech
House, Norwood,
Key Words: book,
5-17
MA.
1988.
general.
WHI-87 "ABYSS:
WOO-87
WIS-88 Wiseman,
White. S.R.
A
Trusted Architecture for Software Protection," Proc. 1987
Symp. on Sec.
&
IEEE
Privacy ffiE-87a), pp. 38-51.
,
(5:
Woodward, J.P.L
S., et al.
"The Trusted Path Between SMITE and the User," Proc. 1988 IEEE Symp. on Sec. &
IEEE Symp. on
Privacy
Privacy (5: IEE-87a), pp. 23-
(5:
.
IEE-88a), pp.
Key Words: TCB,
architecture, case.
case.
technique,
YOU-85
WIT-80 Withington, P.T.
G.W.
'The Trusted Function
Processing," Proc. 1980
IEEE Symp. on
Symp. on Sec.
&
Secure Decentralized
&
IEE-80), pp. 67-79.
Key Words: model,
design.
Key Words: truatsed,
IEEE
Privacy
Privacy (5: IEE-89b), pp. 157-166. ,
Young, W.D., W.E. Boebert. and R.Y. Kain "Proving a Computer System
in
"Formal Model of a Trusted 1989 Sec.
Key Words: MLS, methods, techniques.
Williams. J.C.. and
File Server." Proc.
&
30
Key Words: TCB,
Dinolt
Sec.
.
147-155.
WIL-89
"Exploiting the Dual Nature of Sensitivity Labels," Proc. 1987
,
(5:
Secure." Scientific
Honeyweller, July 1985, pp. 18-27.
methods,
trusted,
Key Words:
verification,
general.
case.
WON-89 WIN-86 Wing. J.M.. and M.R. Nixon "Extending Ina-Jo with
Temporal Logic." Proc. 1986 IEEE Symp. on Sec. & Privacy
YOU-86
Wong,
.
(5:
IEE-86), pp. 2-
R., et al.
System: A Secure Distributed Operating System
'The
SDOS
Prototype," Proc. 12th Nad.
Comp.
NCS-
Sec. Conf. , (5:
89), 1989, pp. 172-183.
Young, W.D.. ?A. Telga, and W.E. Boebert
"A
Verified Labeler for the
Secure Natl.
Ada
Target," Proc. 9th
Comp.
Sec. Conf. , (5:
NCS-86), 1986, pp. 55-61.
13.
Key Words: OS.
Key Words:
trusted, case.
WOO-83
methods, techniques, case.
WIN-89 Wing, J.M., and M.R. Nixon "Extending InaJo with
Temporal Logic," IEEE Trans, on Software Engr.
Woodie. P.E. "Security Enhancement Through Product Evaluation," Proc. 1983 IEEE Symp. on Sec.
&
Privacy
,
IEE-83a).
(5:
(5:
Key Words: capability.
architecture,
IEEE Symp. on
Privacy. (5: IEE-87a),
Key Words: Woodie.
&
specification,
methods. P.
"Distributed Processing
IEE-86). pp. 86-
94
&
pp. 140-148.
WOO-86
.
Specification to
Implementation Mapping,"
techniques.
methods, techniques, case.
Privacy
Young, W.D. "Coding For A Believable
Sec.
Key Words: methods, specification,
WIS-86 Wiseman. S. "A Secure Capability Computer System." Proc. 1986 IEEE Symp. on Sec.
techniques,
YOU-87
Proc. 1987
pp. 96-101.
,
February 1989. pp. 181-197.
Key Words:
Key Words: MLS, case.
specification,
System Security: Communications. Computer or Both," Proc.
IEEE
Intemat.
Conf. on Data Engr. pp. 630-636.
Key Words:
,
1986.
requirements,
YOU-89 Young. W.D. "Comparing Specification Paradigms." Proc. 12th Nad.
Comp.
Key Words: general.
design.
5-18
Sec.
Conf
,
(5:
NCS-
89), 1989, pp. 83-97.
specification,
YUC-88 Yu, C.-F. and V.D. Gligor "A Formal Specification and Verification
Method
for the
Prevention of Denial of Service," Proc. 1988
Symp. on Sec.
&
IEEE
Privacy
,
(5:
IEE-88a), pp. 187-202.
Key Words:
specification,
methods, verification, denial.
6.
The
Database Security
on models of database security, specific implementations, database inference problem, and general aspects of database security.
statistical
section cites publications
ADA-89
BEC-80
Adam, B.R., and J.C. Wortmaim
BLA-85
Beck, L.L.
"A
"Security Control
Methods
for Statistical Databases:
A
ACM
Comparative Survey," Computing Surveys
Blakley, G.R., and
Mechanism
Security
ACM
Statistical Databases,"
Trans, on Database Systems
,
September 1980, pp. 316-338.
,
December 1989,
pp. 515-556.
Key Words:
statistical,
database,
BER-87
AHI-88
Berson, T.A., and T.F. Limt
Key Words:
"Multilevel Security for
encryption
Knowledge-Based Systems," Proc. 1987 IEEE Symp. on
Ahituv, N., Y. Lapid, S.
IEE-85), pp. 116-
(5:
,
122.
control.
and
Computation of Statistics Using Encrypted Data," Proc. 1985 IEEE Symp. on Sec. & Privacy
inference.
Key Words:
Meadows "A Database Encryption Scheme which Allows the
C.
for
Neumann
&
Privacy
"Protecting Statistical
Sec.
Databases Against Retrieval
pp. 235-242.
,
(5:
IEE-87a),
of Private Information,"
Computers
&
Security
,
February 1988, pp. 59-63.
Key Words:
statistical,
Key Words:
database, policy,
methods.
BOE-86 Boebert, W.E., B.B. Dillaway,
and J.T. Haigh "Mandatory Security and Database Management Systems," Proc.
NCSC
Workshop on Database Security (6: COA-86), pp. A1-A21.
BIS-87
.
Biskup, J. "Privacy Respecting
inference.
statistical,
Permissions and Rights," Proc.
Key Words: DBMS,
Akl, S.G., and D.E. Denning
inP
requirements.
"Checking Classification
LAN-88), 1987, pp. 173-185.
AKL-87
WG
11.3 Meeting , (6:
Privacy
(5:
,
-Key Words: database, policy, methods.
BIS-88 Biskup,
Key Words:
database,
methods.
J.,
and H. Graf
Model
pp. 34-37.
for the Information
11.3
Workshop
,
(6:
LAN-89b), 1988, pp. 123-140.
"Improving the Security Posture in Existing Installations," Proc.
NCSC
Key Words:
models, methods,
pp.
,
IEEE Symp. on
Privacy
.
(5:
Key Words: DBMS,
IEE-80),
relational,
kemel.
BON-84 Bonyun, D.A.
case.
Workshop on Database Security
&
Sec.
System DORIS," Proc. IFIP
Baxter, V.,
Proc. 1980
"Analysis of the Privacy
WG
BAX-86
Bonyun, D.A. "The Secure Relational Database Management System Kemel — Three Years Alter,"
IEE-87a), pp.
196-201.
policy,
BON-80
Constraints for Consistency
and Completeness," Proc. 1987 IEEE Symp. Sec. &
1986,
"Rules as the Basis of Accesss Control in Database Mangement Systems," Proc.
(6:COA-86), 1986,
Hl-Hll.
DoD Comp. Sec DOD-84), 1984, pp.
7th Seminar,
Key Words:
Progr.
database,
.
(5:
.
38-47.
methods.
Key Words: DBMS, methods.
6-1
control,
BUR-86
BON-86 "A New Look
at Integrity
Policy for Database
Management Systems," NCSC Workshop on Database Security 86), 1986, pp.
CAR-87
Bums, R.K.
Bonyun, D.
(6:
,
Proc.
COA-
B1-B18.
Carson, et
al.
'Towards Practical MLS Database Management Systems Using the Integrity
'Toward a Multilevel Document System," No. 873064, Proc. 3d Aerospace
Lock Technology,"
Comp.
Natl.
Comp.
Proc. 9th
Sec. Conf., (5:
Sec. Conf.
,
NCS-86), 1986, pp. 25-29.
Key Words: MLS,
Key Words: DBMS,
lEE-
(5:
87b), 1987, pp. 1-6.
database.
Key Words: MLS, DBMS,
polcy,
CHI-80
techniques.
integrity.
Chin. F.Y., and G. Ozsoyoglu
BON-87
Bonyun, DA. "Logging and Accountability Systems," Proc. IFIP 11.3 Meeting
,
WG
Bases," in Rullo. T.A. (Ed.).
"Operational Assurances for a
WG
LAN-88),
(6:
"Security of Statistical Data
Bums. R.K. Tmsted DBMS,"
Mangement
in Database
BUR-87
11.3
inP LAN-
Proc.
Meeting
,
(6:
88), 1987, pp. 241-251.
Advances in Computer Security Management. Vol. 1 Heyden & Son. Philadelphia, PA. 1980. pp. 57-76.
.
1987, pp. 223-227.
Key Words: DBMS,
auditing,
Key Words: neAods.
DBMS,
trusted,
Key Words:
statistical,
methods.
methods.
BUR-89
BON-89
CHI-81
Bums, R.K.
Bonyim, D.A. "Using
MAPLESS
as a
Framework for Secure Database Mangement,"
MP WG
Workshop
Proc.
11.3 (Data Base) ,
(6: IFI-89).
Chin, F.Y., and G. Ozsoyoglu
'The Homework Problem," in Lunt, T.F., Research Directions in Database Security (6: LUN-90), May ,
"Statistical
ACM
Data Base Design."
Trans, on Database
Systems March 1981. pp. 113.
139.
1989, pp. 84-86.
Key Words:
1989.
Key Words: DBMS, methods,
Key Words: MLS,
statistical,
design.
database,
CHI-82
design.
Chin. F.Y., and G. Ozsoyoglu
case.
BUS-83
BOU-84
"Auditing and Inference
BussoUati, U., and
Boukaert, A.
Control in Statistical Databases," IEEE Trans, on
G. Martella
A New
"Security of Transportable
'Toward
Computerized FUes," Proc.
Secure Data Base Design,"
Eurocrypt '84, Paris, 1984, (9: BET-85). pp. 416-425.
January 1983, pp. 49-62.
Computers
&
Approach
Security
to
Software Engr. November ,
1982, pp. 574-582
,
Key Words:
statistical,
auditing.
Key Words:
Key Words:
database,
database,
CHI-86
methods.
techniques.
Chin, F.Y.
BUC-89
CAR-85
Buczkowski, L.J. "Database Inference Controller," Proc.
11.3 (Data Base) (6:
MP WG
Workshop
in-89), 1989.
,
inference.
and
H. Jurgensen "Design of a Secure Relational Data Base," Proc.
mP/Sec. (2:
Key Words:
"Security Problems
Carroll, J.M.,
on
Inference Control for
MAX
SUM,
and MIN Queries," Journal of the July 1986, pp. 451-464.
ACM
,
'85. Dublin, 1985.
GRI-85). pp. 1-16.
control,
Key Words: inference.
Key Words:
database, design,
methods, relational.
6-2
statistical,
COX-88
CLA-83
DEN-80
Claybrook, B.G.
Cox, L.H.
"An Approach
"Inference Controls for
Developing Multilevel Secure Data Base Management Systems," Proc. 1983 IEEE Symp. on Sec. & Privacy
.
to
IEE-83a), pp. 4-
(5:
Frequency Count Tables:
An
Update," Proc. 4th Aerospace Comp. Sec. Conf. . (4: lEE88b), 1988. pp. 112-117.
17.
Key Words: DBMS,
Key Words: design,
M. Hale
DBMS:
Database Security National ,
Computer Security Center, Meade. MD, June 1986.
Key Words:
Ft.
proceedings,
database.
Under Random Sample
Identification of
Critical Problems." Proc. 5th
Security Applicat. Conf. (4: IEE-89c). 1989. pp. 148-165.
Key Words:
,
.
Key Words: DBMS, methods,
Davida,
"Suppression Methodology Statistical EHsclosure
and
Control," Journal of Statistical
Association
,
June 1980, pp.
Denning. D.E.
Might Compromise." Proc. 1981 IEEE Svmp. on Sec. &
"Restricting Queries that G.I..
D.L. Wells,
and J.B. Kam "A Database System with Subkeys." Trans, on Database Systems June 1981. pp. 312-328.
ACM
Lead
to
Privacy .
(5:
IEE-81), pp. 33-
40.
.
Key Words:
statistical,
inference, techniques.
Key Words: statistical,
database,
DEN-82
encryption.
methods.
Denning. D.E.. and E. Wehrle
DAV-88 COX-86
Frequency Count Tables," IEEE Cipher June 1986, pp.
Davidson. J.W. "Implementation Design for a Kemelized Trusted DBMS," Proc. 4th Aerosp. Comp. Sec. Conf.. (4: IEE-88b), 1988, pp.
4-14.
91-98.
Cox, L.H. "Inference Control for
,
Key Words:
statistical,
techniques.
DEN-81
377-385.
Key Words:
Trans, on
Database Systems September 1980, pp. 291-315.
DAV-81
Cox, L.H.
ACM
Queries."
software.
COX-80
American
Denning, D.E. "Secure Statistical Databases
"Software Methodology for Development of a Trusted
NCSC
Workshop on
Invitational
and
S.,
E. Siarkiewicz
(Eds.)
statistical,
DEN-80a
Crocker,
Proceedings of the
.
1980. pp. 88-102.
inference.
CRO-89 Coates, C. and
ACM
Key Words:
statistical,
inference.
methods.
COA-86
Denning, D.E., and J. Schlorer "A Fast Procedure for Finding a Tracker in a Statistical Database," Trans, on Database Systems March
statistical,
Key Words: DBMS,
Schlorer,
"Memoryless Inference Controls for Statistical Databases," Proc. 1982
Symp. on Sec.
&
IEEE
Privacy
,
(5:
IEE-82), pp. 38-43.
Key Words: kernel,
J.
statistical,
inference.
design.
inference.
DEN-83
COX-87
DEJ-83
Cox, L.H. "Modelling and Controlling User Inference," Proc. IhlP 11.3 Meeting (6: LAN-
WG
.
88), 1987, pp. 167-171.
inference.
W.
"Compromising Statistical Data Bases Responding to Queries About Means," ACM Trans, on Database Systems ,
March
Key Words:
Denning, D.E.
DeJonge,
'The Many-Time Pad: Theme and Variations," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: IEE-83a), pp. 23,
30.
1983, pp. 60-80.
Key Words:
database,
Key Words:
statistical,
inference.
6-3
encryption.
database,
DEN-83a
DEN-86a
Denning, D.E., and J.
"A Preliminary Note on
Schlorer
Data Bases," IEEE
Computer July 1983,
pp. 69-
,
Proc.
NCSC Workshop (6:
,
Denning, D.E. "Database Security," in Traub,
Annual Review of Computer Science Volume 3, Aimual Reviews, Inc., Palo Alto, CA, 1988, pp. J.F., et al., (Eds.),
Multilevel Database Systems,"
Database Security
82.
Key Words:
the
Inference Problem in
"Inference Controls for Statistical
DEN-88a
Denning, D.E.
on
COA-
,
86), 1986, pp. 11-114.
1-22.
Key Words: MLS,
Key Words:
statistical,
inference.
database,
database, general.
inference.
DEN-83b
DEN-88b
DEN-87
Denning, D.E. "Field Encryption and
Denning, D.E.
Denning, D.E.,
"An Evolution of Views,"
et al.
Authentication," Proc.
"Views
Crypto-83
Database Security," IEEE Trans, on Software Engr. February 1987, pp. 129-140.
,
Santa Barbara,
1983, (9: CHA-84b), pp. 231-247.
Key Words:
Key Words: MLS,
statistical,
database,
views.
DEN-84
Symp. on Sec.
&
Privacy IEE-84), pp. 52-61.
et al.
Multilevel Relational Data
Model," Proc. 1987 IEEE
Symp. on Sec. (5:
,
&
,
Workshop CA, May 1988
database,
Key Words: MLS,
database,
Denning, D.E. 'Toward a General Multi-Level Data Model," IEEE Cipher April 1989, pp. 34-40. database,
models.
models.
DI1^86
DEN-87b DEN-85 Denning, D.E.
"Commutative Filters for Reducing Inference Threats in Multilevel
Database
Systems," Proc. 1985
Symp. on Sec.
&
Key Words: MLS,
Dillaway, B.B., and
Denning, D.E. "Database System Lessons Learned from Modeling a Secure Multilevel Relational Database System," Proc. IHP 11.3 Meeting (6: LAN-
J.T.
Haigh
"A
Practical
88), 1987, pp. 35-43.
86a), 1986.
Key Words: MLS,
Key Words: MLS,
WG
IEEE
Privacy IEE-85), pp. 134-146.
,
database,
,
database,
models, relational, case.
Design for Multi-
Level Security in Secure Database Management Systems," Proc. 2nd Aerosp. Comp. Sec. Conf. , (5: lEE-
database,
design, case.
inference.
DEN-88
DEN-86 Denning, D.E.,
"Views for Multilevel Database Security," Proc. 1986 IEEE Symp. on Sec. Privacy ,
(5:
Drr-88
Denning, D.E., et al. "The SeaView Security Model," Proc. 1988 IEEE
et al.
&
Symp. on Sec. (5:
&
Privacy
Dittrich, K.R., et al.
"Analysis of the Privacy
Model ,
IEE-88a), pp. 218-233.
Key Words:
WG
11.3
Workshop
,
(6:
LAN-
stabase, model,
Key Words:
views.
Key Words: MLS,
for the Information
System DORIS," Proc. IFIP 89b), 1988, pp. 105-121.
IEE-86), pp.
156-172.
,
LUN-90), pp. 74-77.
(6:
Key Words: MLS, database,
encryption.
(5:
Park,
,
Privacy IEE-87a), pp. 220-234.
Key Words: MLS, Key Words: MLS,
Menlo
DEN-89
Denning, D.E.,
"A
Data Base
Security Invitational
views.
DEN-87a
Denning, D.E. "Cryptographic Checksums for Multilevel Database Security," Proc. 1984 IEEE
RADC
Proc.
,
encryption.
(5:
for Multilevel
database,
case.
views.
6-4
database, model,
DOB-87
DUC-85
Dobson,
J.
"Sec.
Databases:
&
A
11.3 Meeting . (6:
LAN-
Computers
Key Words:
database,
general.
&
Security .
pp. 317-323.
database, control,
DUN-86
Dobson,
and
J.E.,
"Security
Models and
Dissemination." Journal of the
American
Enterprise Models." Proc.
MP WG
11.3
Workshop
.
(6:
(U.K.), April 1986, pp. 85-94.
Key Words: DBMS,
Statistics
Association
.
LAN-89b). 1988, pp. 1-39.
pp. 10-18.
Key Words:
Key Words:
Fernandez, E.B.. R.C.
Summers, and C. Wood Database Sec. & Integrity Addison-Wesley. Reading,
.
Vol. 81, No. 393,
MA.
statistical,
general.
1981.
Key Words: book, databse, models,
FER-89
DWY-87
DOW-86 Downs, D.D.
TCSEC NCSC
"Applicability of the
DBMS,"
database,
methods.
general.
to
policy,
FER-81
Duncan, G., and D. Lambert "Disclosure-Limited Data
McDermid
"Security Issues and Features of Database Management Systems." Information Age .
methods.
case.
DOB-88 JJi.
12."
December 1985.
88), 1987. pp. 11-22.
Key Words:
Feeney, T.
A.J.
"Data Sharing and Access Protection in Business System
Personal View," Proc.
WG
FEE-86
du Croix.
Proc.
Workshop on Database (6: COA-86). 1986, pp.
Sec. , Jl-
Jll.
Fernandez. E.B.. E.Gudes.
Dwyer. P.A., G.D. Jelatis, and B.M. Thuraisingham "Multi-Level Security in
Database Management Systems," Computers & Security June 1987, pp. 252,
and H.Song
"A Security Model of ObjectOriented Databases." Proc. 1989 IEEE Symp. on Sec. Privacy
.
(5:
&
IEE-89b), pp. 110-
115.
260.
Key Words: MLS, DBMS,
Key Words: FRA-85
methods.
DOW-86a
Fraga,
DWY-88
Downs. D.D.
"A
Dwyer. P.. et al. "Query Processing
"Discretionary Security in
Database Management Systems." Proc. NCSC Workshop on Database Sec.
LDV:
in
A
COA-86). 1986. pp. KlKIO.
Secure Database System." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 118-124.
Key Words: DBMS,
Key Words:
.
(6:
policy,
,
database,
IFIP/Sec GRI-85). pp.
File System," Proc.
Key Words:
(2:
database, methods,
case.
FRI-80
Hoffman
Eriksson, R., and K.
Beckman
to
Secure Databases." Proc.
Greenburg, and T.F. Lunt
"Protecting of Data Bases
1980 IEEE Symp. on Sec.
'Issues in Distributed
Privacy
Database Security," Proc. 5th Security Applicat. Conf. (4:
Using File Encryption," Proc. IFIP/Sec. '83 Stockhohn, 1983. (2: FAK-83), pp. 217-
IEE-89c). 1989, pp. 196-203.
221.
,
.
.
Key Words:
database,
Key Words:
database,
encryption.
6-5
(5:
Key Words:
&
IEE-80), pp. 18-
21.
methods. network, general.
.
'Towards a Fail-Safe Approach
ERI-83 I.B.
and D. Powell
Dublin. 1985. 203-218.
L.J.
DOW-89
J.,
Fault and Intrusion-Tolerant
Friedman. A.D.. and
techniques.
discretionary.
Downing, A.R.,
database, models.
Key Words: MLS. DBMS,
criteria.
statistical,
GAR-89
GAL-85
FRO-88
W.E. McCarthy
Froscher, J.N., and
Gal. G.. and
C. Meadows "Achieving a Trusted
"Specification of Internal
Database Mangement System Using Prallelism," Proc.
WG
MP
Accounting Controls in a Database Environment." Computers & Security March ,
Workshop. (6: LAN-89b), 1988, pp. 151-
1985. pp. 23-32.
160.
Key Words:
11.3
WG
.
1989. database,
Key Words: DBMS,
auditing.
Key Words: DBMS,
Garvey, C, et al. "A Layered TCB Implementation Versus the Hinke-Schaefer Approach," Proc. IFIP 11.3 (Data Base) Workshop (6: IFI-89),
GAR-86
methods.
GIL-80
Garvey, C.
FUG-85
"Architecture Issues in Secure
Gilhooley. I.A.
"Design of a Relational Schema for Database
Database Mangement Systems," Proc. NCSC Workshop on Database Sec.,
(Ed.).
Dynamic Authorization
(6:
Fugini.
M.
Management." Proc. IhlP/Sec. GRI-
:85, Dublin. 1985. (2: 85), pp. 17-25.
COA-86), 1986, D19.
pp.
Key Words: DBMS,
Dl-
design,
methods.
Key Words:
Garvey, C, and A. Wu "ASD- Views," Proc. 1988
IEEE Symp. on
M.G.
"Secure Database Development Methodologies," (6:
Advances in Computer Management. Vol. 1 Heyden & Son. Philadelphia, PA. 1980. pp. 33-56. Security
Key Words:
.
database, methods,
general.
GAR-88
FUG-88
MP WG
Proc.
"Data Security, in RuUo, T.A.
database,
control, methods.
Fugini.
design,
case.
trusted,
11.3 Meeting .
LAN-88). 1987. pp. 103-
Privacy
,
(5:
Sec.
&
IEE-88a), pp. 85-
Glasgow, J., G. MacEwen, and P. Panangaden "Security by Permission in Databases." Proc. 11.3
95.
Key Words: MLS. DBMS,
Workshop
.
MP WG
(6:
LAN-89b).
1988, pp. 197-205.
Key Words:
views.
129.
GLA-88
database, control,
methods.
Key Words:
GAR-88a
database,
C. N. Jensen, and J. Wilson "The Advanced Secure DBMS: Making Secure
Garvey.
methods.
GAJ-88 Gajnak, G.E.
"Some
Results from Entity-
Relationship Multilevel
Secure DBMS Project," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, ,
pp. 66-71.
DBMSs
WG
Usable," Proc. IFIP
11.3
Workshop
,
(6:
LAN-89b), 1988, pp. 187-195.
GRA-82 Graubart, R.. and J.P.L.
Woodward
"A Preliminary Naval Surveillance
DBMS
Security
Model." Proc. 1982 IEEE Symp. on Sec. & Privacy (5:
Key Words: MLS, DBMS,
.
IEE-82), pp. 21-37.
Key Words: DBMS, models,
case.
case.
Key Words: MLS, DBMS,
GAJ-88a Gajnak, G.E.
"Some
Results from
Entity/Relationship Multilevel
Secure
RADC
DBMS
Park.
Workshop Menlo CA, May 1988, (6: ,
GRA-84 Graubart, R.
86a). 1986, pp. 58-64.
'The Integrity Lock Approach Secure Database Management," Proc. 1984 IEEE Symp. on Security
Key Words: MLS,
74.
to
Privacy
Project." Proc.
Data Base Security
Invitational
GAR-88b Garvey, C.E., and P.N. Papaccio "Multilevel Data Store Design." Proc. 2nd Aerosp. Comp. Sec. Conf. . (5: lEE-
case.
database,
.
(5:
IEE-84), pp. 62-
design.
Key Words: DBMS,
LUN-90), pp. 144-156.
methods.
Key Words: MLS, DBMS, case.
6-6
design,
GRA-84a S.
HEN-88
HAI-87
Graubart, R.D., and
Haigh, J.T.
Kramer
"The Integrity Lock Support Environment," Proc. IMP/Sec. J4. Toronto. 1984, (2: FIN85). pp. 249-268.
Key Words:
database, design,
mP WG
88), 1987, pp. 45-56.
LAN-89b). 1988. pp. 233-245.
Key Words:
Key Words:
WG
.
database,
Information," Proc. 11.3
Workshop
.
(6:
database, methods.
HEN-88a HAI-89
GRA-89
Haigh,
"Comparing DBMS and Operating System Security Requirements - The Need for Separate
DBMS
WG
Workshop
.
1989.
(6: IFI-89).
Security
WG
IFIP 11.3 (Data Base) Workshop (6: in-89). 1989.
Criteria," Proc.
J.T., et al.
'The LDV Approach to Database Security." Proc. IFIP 11.3 (Data Base)
Graubart. R.
.
database,
Key Words: DBMS,
methods.
requirements. Hale.
M.W.
HEN-89
"Status of Trusted Database
System
GRA-89a
IFIP
Interpretations." Proc.
WG
11.3 Meeting . (6:
LAN-88), 1987, pp. 263-268.
Graubart, R.
"A Comparison of Three
Secure DBMS Architectures," Proc. IFIP 11.3 (Data Base) Workshop. (6: IFI-89),
WG
Key Words:
database, criteria.
Key Words: DBMS,
"Data Base Security System Architectures." Information Systems Vol. 6. No. 1. 1981.
design,
.
pp. 1-22.
GUD-80 Gudes. E. "The Design of a Cryptography Based Secure File System," IEEE Trans, on Software Eng. September 1980. pp. 411-420. .
Key Words:
database, design.
Helming, R.R., and S.A. Walker "Computer Architectures and Natl.
cryptography.
GUY-89
,
Key Words: database, design.
Guynes. C.S.
A
Matter of
Privacy," Computers
March 1989,
&
pp. 15-
Key Words:
Henning. R.R.
statistical,
Hinke, T.H. "Secure Database Management
System Architectural Analysis," Proc. NCSC Workshop on Database Sec. (6: COA-86). 1986. pp. E1-E15.
Key Words: DBMS,
design,
methods.
HIN-87 Hinke, T.H.
"DBMS
Technology
Threats," Proc. IFIP
Meeting
.
(6:
vs.
WG
11.3
LAN-88). 1987.
'The Allocation of Database
Key Words: DBMS, general.
WG
,
HIN-86
Management System
Security
Responsibilities." Proc. IFIP
20.
Trusted
pp. 57-87.
HEN-87
"Protecting Statistical
in
.
HEN-86
Database Security," Proc. 9th Comp. Sec. Conf. (5: NCS-86), 1986. pp. 216-230.
database,
"DAC Mechanisms
Database Management Systems." Proc. 2nd RADC Data Base Security Workshop (6:RAD-90). May 1989.
discretionary.
Hartson. H.R.
case.
Henning. R.R.
Key Words: DBMS,
HAR-81
1989.
Databases:
.
HAL-87
requirements, critCTia.
Key Words:
Henning. R.R. "Industry and Government DBMS Security & Privacy Needs-A Comparison." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 99105.
Key Words: MLS.
Key Words: DBMS,
.
Schema
requirements.
methods.
Society
Henning. R.R.. R.P. Simonian "Security Analysis of Database
"Modeling Database Security Requirements," Proc. IFIP 11.3 Meeting (6: LAN-
11.3 Meeting . (6:
LAN-
88). 1987. pp. 131-148.
requirements.
Key Words: database, management.
6-7
threats,
HON-82
HIN-88
"A Mechanism
.
IEE-88a), pp. 96-
(5:
for Database
Protection in Cellular-Logic
Management Systems," Proc. 1988 IEEE Symp. on Sec. & Privacy
HUB-86
Hong, Y.-C., and S.Y.W. Su
Hinke. T.H. "Inference Aggregation Detection in Database
Devices,"
IEEE
Trans, on
Criteria:
Software Engr. November 1982, pp. 583-596.
Key Words: database,
Do They
Conf. 21-24. ,
Relate?,"
Comp.
Proc. 9th Natl.
,
106.
Key Words:
Hubbard, B.S., S.A. Walker, and R.R. Henning "Database Systems and The Sec.
NCS-86), 1986. pp.
(5:
database,
Key Words:
techniques.
database, criteria.
inference.
HOP-88 HIN-88a Hinke, T.H. "Database Inference Engine Design Approach," Proc. IFIP
WG
11.3
Workshop
.
(6:
LAN-89b), Oct. 1988. pp. 247-262.
IEO-88
Hoppenstand, G.S., and D.K. Hsiao "Secure Access Control with High Access Precision: An Efficient
Approach 11.3
"An Analysis of Database Security with Queries to
Higher Order
Statistical
WG
Information," Proc. IFIP
to
Multilevel Security," Proc.
MP WG
leong, I.T., and T.C. Ting
Workshop
.
11.3 (6:
Workshop
.
(6:
LAN-89b),
1988, pp. 207-223.
LAN-89b). 1988. pp. 167-176.
Key Words:
Key Words:
database,
Key Words: MLS.
inference, design.
database,
statistical,
methods.
control.
m-89
HIN-88b Hinke, T.H., et al. "A Secure DBMS Design," Postscript, 11th Natl. Comp. Sec. Conf.
(5:
,
NCS-88a),
Proceedings,
Hosmer. H.H.. and B.K. Bums "Designing Multilevel Secure
inP
database, design,
WG
11.3
Workshop
.
(6:
LAN-89b). 1988. pp. 161-165.
Key Words: proceedings, database, MLS, methods, general.
Key Words: MLS. HIN-89
database,
JAJ-89
design.
Hinke. T.H. "DBMS Trusted Computing Data Taxonony." Proc. IFIP 11.3 (Data Base)
Workshop
WG
,
methods.
WG
Workshop on
Database Security, IFIP 11.3 (Data Base) Monterey, CA, September 5-7, 1989.
Distributed Databases." Proc.
1988, pp. 1-13.
Key Words:
HOS-88
.
(6: IFI-89).
1989.
Jajodia, S., et
HOS-89 "Handling Integrity Lock Violations," Proc. IFIP
Workshop
Hosmer, H.H.
11.3 (Data Base)
Key Words: DBMS, methods,
al.
"Audit Trail Organization in Relational Databases." Proc. IFIP 11.3 (Data Base)
(6:
WG
WG
Workshop
.
(6: IFI-89),
1989.
,
Key Words:
in-89). 1989.
database, auditing.
design.
Key Words: HIN-89a Hinke, T.H. "Database Design with
MAC
Workshop
May
.
(6:
JAJ-89a Jajodia, S., et
Row
RAD-90),
1989.
Management Systems."
HSI-87
2nd
Hsiao. D.K.
"Database Security Course 11.3 Module." Proc. IFIP Meeting (6: LAN-88). 1987, pp. 269-301.
WG
RADC
design.
database,
Proc.
Data Base Security Workshop (6: RAD-90). May .
1989.
.
Key Words: DBMS, methods.
Key Words: MLS,
al.
"Auditing in Secure Database
and Table Level DAC," Proc. 2nd RADC Data Base Security Level
database,
techniques.
Key Words:
database,
awareness, general.
6-8
auditing,
KEE-89C
JEN-88 Jensen, N.R.
"System Security Officer Functions in the
DBMS,"
Proc.
Workshop Oct 1988.
.
(6:
A1
inP
Secure
WG
11.3
LAN-87a
Keefe, T.F., and W.T. Tsai "Prototyping the SODA
Landwehr, C.E. (Ed.) Database Security: Status and
Security Models," Proc. IFIP
Prospects, Proceedings, IFIP
WG
11.3 (Data Base)
Workshop
LAN-89b),
1989.
(6: IFI-89),
.
pp. 53-62.
Key Words:
Key Words: MSL. DBMS,
database,
WG
11.3 (Data Base) Initial Meeting Aimapolis, MD, October 1987, North-Holland, Amsterdam, 1988. ,
methods, case.
Key Words:
management.
KEM-87 JEN-88a
proceedings,
database, general, methods..
Kemmerer, R.A.
LAN-89
Jensen, N.R.
"Formal Specification and
"Implications of Multilevel
Verification Techniques for a
Security on the Data
Trusted
WG
Dictionary of a Secure Relational
DBMS,"
Proc. 4th
DBMS,"
Proc. IFIP
11.3 Meeting . (6:
LAN-
88), 1987, pp. 229-240.
Landwehr, C.E., (Ed.) Database Security, 11: Status and Prospects Proceedings. IFIP
WG
,
11.3 (Data Base)
Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 58-
Key Words: DBMS,
October 1988, North-Holland,
59.
verification.
Amsterdam, 1989.
Workshop, Kingston, Ontario,
,
Key Words: MLS, DBMS,
KNO-87
Key Words:
Knode, R.B.
design.
'Trudata:
KEE-89
The Road
DBMS,"
Trusted
Comp.
to a
Proc. 10th
Keefe, T.F.,
Natl.
M.B. Thuraisingham, and W.T. Tsai "Secure Query Processing Strategies," IEEE Computer March 1989, pp. 63-70.
NCS-87a), 1987, pp. 201-210.
Key Words:
Sec. Conf. , (5:
Key Words: DBMS, methods, ,
case.
KEE-89a
Conf. ,
et al.
"Multi-Party Update Conflict:
The Problem and
(4:
Sec.
Comp.
case.
lEE-
(4:
89c), 1989, pp. 222-231.
database, design,
Keefe, T.F., et al. "SODA: A Secure Object-
Leiss, E.L.
Plenum
Press,
LEI-86
A
'The Inaccessible
Publications, Wellesley Hills,
Classification by
MA.
of Security Risk in Statistical Databases," Information Processing Letters December 1986, pp. 275-279.
1983.
Set:
Query Type
,
Key Words: book,
databse,
controls.
Key Words:
New
database,
Leiss, F.L.
,
October 1989, pp. 517-533.
,
York, 1982.
Management Advisory
Oriented Database System," Security
LEI-82
J.J.
Line, Database Systems ,
KEE-89b
database,
general.
Controls for AdvancedA3n-
&
Key Words: requirements.
Key Words: book,
KUO-83 Kuong,
database,
techniques.
Computers
,
Security
Its
,
Decision Support Systems," Proc. IFIP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 239-
Principles of Database
82-90.
Key Words:
Key Words:
Comp.
IEE-88b), 1988, pp.
Solution," Proc. 5th Aerosp.
Sec. Conf.
Lavrence, D.I. "Some Security Aspects of
248.
Proc. 4th Aerosp.
Keefe, T.,
LAV-84
KNO-88 Knode, R.B. and R.A. Hunt "Making Databases Secure with Trudata Technology,"
database,
methods, general.
proceedings,
database.
Key Words:
database, case.
LAN-87
methods.
Landwehr, C.E. (Chm.) "Database Security: Where
WG
Are We," Proc. IFIP Meeting (6: LAN-88),
11.3
,
October 1987, pp.
Key Words:
1-9.
database, general.
6-9
statistical,
Lunt, T.F., et
Probability Distribution,"
ACM
Trans,
LUN-89
LUN-88
LIE-85 Liew. C.K., W.J. Choi, and C.J. Liew "A Data Distortion by
on Database
Systems September 1985, pp. ,
Lunt, T.F.
al.
"A Near-Term Design for the Sea View Multilevel Database System," Proc. 1988 IEEE Symp. on Sec. & Privacy (5:
"Aggregation and Inference: Facts and Fallacies," Proc.
IEE-88a), pp. 234-244.
109.
Key Words: MLS,
Key Words:
,
1989 IEEE Symp. on Sec.
&
Privacy . (5: IEE-89b), pp. 102-
395-411.
Key Words:
database,
design.
statistical,
database,
inference.
methods.
LUN-88a LIN-89 Lin, T.Y.
"Some Remarks on
2nd
Controllers," Proc.
RAEXr Data Base Workshop
May
(6:
,
Inference
Security
LUN-89a
Lunt, T.F.
Lunt, T.F.
"Access Control Policies for Database Systems," Proc. IFIP
RADC
WG
11.3
Workshop
(6:
.
LAN-89b). 1988, pp. 41-52.
RAD-89),
,
database, control,
Key Words:
policy.
Key Words:
Workshop," Proc. 5th Aerosp. Comp. Sec. Conf. (4: lEE89c). 1989. pp. 310-313.
Key Words:
1989.
"Report from the Second Database Security
database, general.
database,
LUN-88b
inference.
LUN-89b Lunt, T.F.
Lunt, T.F.
LIN-89a
"Multilevel Database Systems:
"Multilevel Security for
Lin, T.Y.
Meeting Al," Proc. IFIP
Object-Oriented Database
"Commutative Security Algebra and Aggregation," Proc. 2nd RADC Data Base
89b), 1988. pp. 177-186.
Security 89),
Workshop
May
,
(6:
RAD-
11.3
Workshop
.
WG
LAN-
(6:
11.3
(6:
IFI-89). 1989.
Key Words: MLS,
database,
Key Words: MLS.
methods.
1989.
WG
System," Proc. IFIP (Data Base) Workshop .
database,
methods.
Key Words:
LUN-88C
database,
methods, theory.
Lunt, T.F.
"A Summary of
LOC-87
the
RADC
Database Security Workshop,"
Urh
Comp.
Lochovsky, F.H., and C.C. Woo "Role-Based Security in Database Management
Conf. . (5: NCS-88), 1988, pp. 188-193.
Systems," Proc. IFIP
Key Words:
11.3 Meeting . (6:
WG
Proc.
Natl.
Sec.
database, general.
LUN-88d
Key Words: DBMS, methods.
LUN-87
Veriag,
,
New
York, 1990.
'Toward a Multilevel
Lunt, T.F., and T.A. Berson
Conf.
"An Expert System
72-79.
to
.
(4:
Comp.
Sec.
IEE-88b), 1988. pp.
Classify and Sanitize Text,"
3d Aerosp. Comp. Sec. IEE-87b), 1987,
proceedings,
general.
Proc. 4th Aerosp.
(5:
Workshop Menlo CA, May 1988, Springer
Invitational
Key Words:
Relational Data Language,"
,
Research Directions in Database Security, Proceedings, 1st RADC Data Base Security Park,
Lunt, T.F.
Conf.
Lunt. T.F.
LAN-88),
1987, pp. 209-222.
Proc.
LUN-90
MAC-87 MacEwen, G.H. "Effects of Distributed System Technology on Database Security:
Key Words: MLS.
relational,
MP WG
A
Survey," Proc.
11.3 Meeting , (6:
LAN-88), 1987. pp. 253-261.
design.
pp. 30-34.
Key Words:
LUN-88e
Key Words: techniques.
database,
Lunt, T.F.. et
networks.
al.
"Element-Level Classification with A-1 Assurance."
Computers
&
Security
,
February 1988, pp. 73-82.
Key Words: MLS. methods.
6-10
database,
database,
MAN-87
MCL-85
Manola, F.A.
"A Personal View of Security," Proc. IFIP
11.3 Meeting . (6:
Oct
DBMS
WG
MEA-88b
McLeish, M.
Meadows, C.
"Inference Controls for
"New Approaches
Intelligent Databases."
LAN-88).
1987, pp. 23-34.
Proceedings. 1985 Conference
Base Security
Press, Oakland,
May
MI, April
1985, pp. 71-75.
general.
MAT-86
Key Words:
Matloff. N.S.
database,
methods, control, inference.
"Another Look at the Use of Noise Addition for Database Security." Proc. 1986 IEEE
Symp. on Sec.
&
Privacy IEE-86), pp. 173-180.
,
(5:
MCL-89 the
Workshop Menlo
Park,
.
CA,
1988, (6: LUN-90). pp. 193-200.
Key Words:
database, design,
methods, general.
"Constructing Containers Using
Security of Partitioned
a Multilevel Relational Data
Statistical
ACM
Trans, on
Database Systems . March
techniques.
RADC Dau
Invitational
Meadows. C.
on
"Further Results
Databases,"
statistical,
Database
MEA-89
McLeish, M.
Dynamic
Key Words:
to
on
Discussion," Proc.
on InteUigent Systems and Machines Oakland University .
Key Words: MLS, DBMS,
Security: Report
WG
Model." Proc. IHP (Data Base) Workshop in-89), 1989.
.
11.3 (6:
1989, pp. 98-113.
MAT-87
Key Words:
Matloff, N.S.
Query
"Inference Control via
Key Words: statistical,
methods.
Restriction vs. Data
IMP Meeting (6: LAN-
Modification," Proc.
database, model,
design, relational.
MEA-89a
MEA-87
Meadows, C, and
88), 1987. pp. 159-166.
"Integrity vs. Security in
J. Forscher "Operating System Support of Multilevel Applications," Proc.
Key Words:
Multi-Level Secure Databases," Proc. IFIP
Workshop
WG
11.3
.
statistical,
Meadows, C, and
S. Jajodia
WG
11.3 Meeting . (6: LAN-88),
techniques.
2nd
RADC .
Data Base Security (6:
RAD-90),
May
1989.
1987, pp. 89-101
MAT-88 Matloff. N.S.. and P. Tendick
Key Words: MLS,
"The 'Curse of
methods,
Key Words: OS, databases,
integrity.
MIN-81
Dimensionality' in Database Security." Proc. IFIP
11.3
WG
Workshop (6:LAN-89b), .
MEA-88
Minsky, N.
Meadows, C, and
S. Jajodia
"Maintaining Correctness,
1988, pp. 225-232.
Availability, and Unabiguity
Key Words:
database, theory,
MCH-88 McHugh,
Data Base
in Trusted
Management Systems." Proc. 4th Aerosp. Comp. Sec.
methods.
Conf. (4: IEE-88b). 1988. pp. 106-110. .
and B.M. Thuraisingham J.,
database,
methods.
"Multilevel Security Issues in
Key Words:
Distributed Database
methods, techniques.
trusted.
DBMS,
"Synergistic Authorization in
Database Systems," Proc., 7th Intemat. Conference on Very Large Database Systems , September 1981.
Key Words:
databases, control,
methods, techniques.
MIR-80
Key Words: MLS, DBMS,
Application Using an Object-
Miranda, S. "Aspects of Data Security in GeneralPurpose Data Base Mangement Systems," Proc. 1980 IEEE Symp. on Sec. Privacy . (5: IEE-80), pp. 46-
network.
Oriented Data Model," Proc.
58.
Management Systems,"
Computers & Security August 1988. pp. 387-396. ,
MEA-88a Meadows, C.
&
"Designing a Trusted
RADC
Data Base Security
Workshop Menlo CA. May 1988 (6:
Invitational
Park,
,
LUN-90), pp. 157-163.
Key Words:
database, models,
design.
6-11
Key Words: DBMS, requirements, methods.
MOR-87 "Sec.
&
Notargiacomo,
Inference in
Knowledge-Base Systems,"
ACM
Intemat. Conf.
on Management of Data
(SIGMOD-87) May .
Key Words: MLS,
L.,
Omar. K.A., and D.L. WeUs
and
O'Connor "Report on Secure Distributed Data Management System
"Modified Structure for the Subkeys Model." Proc. 1983 IEEE Symp. on Sec. &
Research," Proc.
Privacy , (5: IEE-83a), pp. 79-
J.P.
Multilevel Database and
Proc,
OMA-83
NOT-86
Morgenstem, M.
NCSC
Workshop on Database Sec.,(6: COA-86), 1986, G1-G9.
1987.
86.
pp.
Key Words:
database,
Key Words:
inference.
database,
OZS-82
methods, network.
MOR-88 Morgenstem, M.
NOT-88 Notargiacomo, L. "Secure Distributed
"Controlling Logical
Inference in Multilevel
Database Systems," Proc. 1988 IEEE Symp. on Sec. Privacy (5: IEE-88b), pp. 245-255.
&
.
DBMS
-
Architecture Definition," Proc.
RADC
Data Base Security
Workshop Menlo
Invitational
Park,
,
CA, May 1988
,
Key Words:
statistical,
methods, inference, design.
database,
Key Words: MLS, DBMS,
inference.
OZS-85
design.
MOR-88a Morgenstem, M. "Inference and Aggregation," Proc. RADC Data Base Security Invitational
Workshop Menlo ,
May
1988, 118-133.
(6:
Notargiacomo, L. "Metadata and View Classification," Proc.
Park,
CA,
LUN-90), pp.
Ozsoyoglu, G., and T.A. Su "Rounding and Inference Control in Conceptual Models
NOT-88a
RADC
Data Base Security
for Statistical Databases," Proc.
1985 IEEE Symp. on Sec.
&
Privacy (5: IEE-85), pp. 160,
Workshop Menlo CA. May 1988 (6:
Invitational
Park.
,
173.
Key Words:
LUN-90). pp. 201-205.
Key Words:
database,
statistical,
inference, techniques.
Key Words:
inference.
database,
PAA-86
methods, views.
NAS-83
Paass, G.
Management Report on 1982 Air
Multilevel Data Security,
Ozsoyoglu, G., and F.Y. Chin "Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design," IEEE Trans, on Software Engr. May 1982, pp. 223-234.
(6:
LUN-90), pp. 23-48.
Key Words: MLS,
database,
encryption.
Force Summer Study Air Force Studies Board, National Academy of Sciences, Washington, DC. 1983. ,
OCO-88 "A
Microdata," Proc. IFIP/Sec.
Distributed Architecture
for Multilevel
Database
Sec. Conf.
,
NCS-
(5:
88), 1988, pp. 179-187.
proceedings,
'86
,
Monte
Carlo, 1986, (2:
GRI-89).
Security," Proc. 11th Natl.
Comp.
Key Words:
"Disclosure Risk and
Disclosure Avoidance for
O'Connor, J.P. and J.W. Gray HI
Key Words:
statistical, threats,
techniques.
general.
Key Words: MLS, NBS-81
database,
Palley,
Guidelines on Integrity
Assurance Data Base FTPS PUB Bureau of
J.S.
OLD-84
and Control in Administration
.
88, National
Standards,
Gaithersburg,
MD,
PAL-87 M.A., and Simonoff "The Use of Regression Methodology for Compromise
network.
August
Oldehoeft, A.E., and
McDonald "A Software Scheme
R.
User
Controlled File Encryption,"
&
Computers
1981.
for
Security ,
of Confidential Information in Statistical Database," Trans, on Database Systems , December 1987, pp. 593-608.
ACM
February 1984, pp. 35-42.
Key Words:
Key Words:
database,
guidelines integrity, methods.
Key Words:
database,
encryption.
6-12
statistical, threats.
PAT-85
SAD-89
REI-84
Patkau. B.H., and
Reiss, S.P.
D.L. Tennenhouse "The Implementation of Secure Entity-Relationship Databases," Proc. 1986 IEEE Privacy (5: Symp. on Sec. IEE-86). pp. 230-236.
"Practical
&
Sadhu, R.
Data Swapping: The
1984. pp. 20-37.
"Mandatory Controls for Database Integrity," Proc. IFIP 11.3 (Data Base) Workshop (6: in-89), 1989.
Key Words:
Key Words:
ACM
First Steps,"
Trans, on
Database Systems March ,
WG
,
,
database,
database, integrity.
techniques.
Key Words:
SCH-80
databse, design,
ROD-80
methods.
PET-89 M.L., E. Gudes, and E£. Fernandez "Security Policies in ObjectPetrie,
Oriented Databases," Proc. JFIP 11.3 (Data Base) Workshop (6: in-89), 1989.
WG
.
and L.A. Cox "A Secure Archival Storage
Schell, R.R.,
Rodriguez,
and
J.J.,
P.S. Fisher
System," Conference Record,
"Security Problems in a Data
1980 IEEE Fall Comcon Washington, DC, 1980.
Base Enviroiunent," in Rullo, T.A. (Ed.), Advances inComputer Security
Management
&
Vol.
,
1,
Son, Philadelphia, PA,
database, threats.
ROU-87
Pluimakers, G.M.J.
"Some Notes on Authorization and Transaction Management in Distributed
A
Dataserver:
DBMS
Multilevel Secure
Problem." Proc. 10th Natl. Comp. Sec, Conf. . (5: NCS87a), 1987. pp. 211-215.
1988, pp. 287-298.
Key Words:
statistical,
inference.
SCH-81 Schlorer,
J.
"Security in Statistical
Databases: Multidimensional
databse, control,
network.
ACM
Key Words:
Solution to the
Computers
Security , June
Databases: Quantitative Aspects of Trackers." Trans, on Database Systems December 1980, pp. 467-492. .
Rougeau, P.A. and E.D. Sturms "The Sybase Secure
Database Systems,"
&
J.
"Disclosure from Statistical
Key Words:
PLU-88
SCH-80a Schlorer,
database, policy,
methods.
database, case.
Heyden
1980, pp. 122-139.
Key Words:
Key Words:
,
ACM
Key Words: MLS, DBMS,
Transformations,"
case.
on Database Systems March
Trans.
,
RAD-89
1981, pp. 95-112.
RUD-85
"Research Directions in Database Security, 11," Proceedings. 2nd
RADC
Base Security Workshop
Data ,
Rudell, M.E.
Key Words:
"Labeling Screen Output,"
techniques.
IEEE Symp. on
Proc. 1986
&
NH, May 1989, SRI International. Menlo Park. CA, December 22,
pp. 237-240.
1989.
Key Words:
Bethlehem.
Sec.
Privacy
,
(5:
IEE-86),
and
J.,
D.E. Denning "Protecting
database,
Query Based
Statistical Output," Proc.
proceedings,
general, policy, methods.
SCH-83 Schloerer,
techniques.
Key Words:
statistical,
RUS-89
mP/Sec.
'83 , Stockholm,
1983,
FAK-83), pp. 37-46.
(2:
Russell, L.
"Semantic Overloading of the
REI-80
Relational
Reiss. S.P. "Practical
Data Swapping," IEEE Symp. on
Proc. 1980 Sec.
&
Privacy
.
(5:
IEE-80),
pp. 38-45.
Model
Key Words:
statistical,
techniques.
for
Multilevel Security," Proc.
2nd
RADC
Security 89),
May
SCH-83a
Data Base
Workshop
,
(6:
RAD-
Schloerer,
J.
"Information Loss in
1989.
Partitioned Statistical
Key Words: techniques.
database,
Key Words: MLS,
database,
Databases," Computer Joumal 3, 1983, pp. 218-223.
No.
methods.
Key Words: inference.
6-13
statistical,
,
SCH-85 "On
SMI-89b
SIC-83
Schaefer,
M.
the Logical Extension of
the Criteria Principles to
ACM
Design of Multi-level Database Management
March 1983.
Systems," Proc. 8th Natl. Sec. Conf. (5: NCS85) . 1985. pp. 28-30.
Comp.
Sicherman, G.L., W. deJonge and R. van de Ried "Answering Questions Without Revealing Secrets." Trans, on Database Systems.
G.W.
Smith,
"Solving Multilevel Database Security Problems: Technology Is
Not Enough,"
WG
Workshop
pp. 41-59.
Proc. IFIP
11.3 (Data Base) .
(6: IFI-89),
1989.
.
Key Words:
Key Words: MLS,
database,
methods.
database,
methods.
Key Words: MLS, DBMS, SMI-89C
SMI-88
criteria, design.
G.W.
Smith,
SCH-86
the Security Semantics of an
and
Schell, R.R..
D.E. Denning "Integrity in Trusted Database Systems," Proc. 9th Natl.
Comp.
Application," Proc. 4th
Comp.
Aerosp.
"MAC, DAC and Proc.
IEE-88b). 1988, pp. 125-130.
Key Words: MLS, Key Words:
86) , 1986, pp. 30-36.
the Need-to-
2nd RADC Data Base Security Workshop (6: RAD-89), May 1989.
Know,"
.
Sec. Conf. , (4:
NCS-
Sec. Conf. , (5:
G.W.
Smith,
"Identifying and Representing
database, models,
database,
policy.
methods.
Key Words:
SMI-89d
database,
SMI-88a
integrity.
SCH-86a
G.W. "Homework Problem
Smith,
G.W.
Smidi.
"Classifying and
and
Schell, R.R.,
D.E. Denning "Integrity in Trusted Database Systems," Proc.
NCSC
Human
Downgrading:
Is
Needed
Loop?." Proc.
in the
a
#2:
MLS
Database Design," Proc. 2nd RADC Data Base Security
Workshop
.
(6:
RAD-89).
RAIX: Data Base Security Invitational Workshop Menlo Park, CA, May 1988. (6:
Key Words: MLS.
LUN-90). pp. 164-185.
design.
May
1989.
.
Workshop on Database Sec., (6: COA-86), 1986, pp. Cl-
database,
C14.
Key Words: MLS,
Key Words:
SMI-89e
database,
methods.
database,
Smith.
SMI-89
SCH-88 M.
"Dynamic Classification and Automatic Sanitization," Proc. RADC Data Base Security
Workshop Menlo CA, May 1988 (6:
Invitational
Park.
G.W.
Smidi,
Schaeffer,
,
"Going Beyond Technology Meet the Challenge of
to
Multilevel Deitabase Security," Proc. 12th Natl.
Conf.
,
(5:
Comp.
Sec.
database,
SMI-89a Smith,
G.W.
Shockley. W.R. and D.F. Warren
Design:
"Description of Multilevel
Applications," Proc. 5th
Key Words: MLS,
,
1989. database,
design.
Spooner. D.L.. and E. Gudes "A Unifying Approach to the
"Multilevel Secure Database
Secure Entity-Relationship DBMS Demonstration." Proc. 11th Natl. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 171-
A
Key Words: MLS, database, OS, design.
Practical
Security Applicat. Conf.
.
(4:
IEE-89C), 1989. pp. 314-321.
.
178.
May
Design of Secure Database Operating Systems," IEEE Trans, on Software Engr., May 1984. pp. 310-319.
methods.
techniques.
SHO-88
RAD-89).
SPO-84
Key Words: MLS, database,
(6:
NCS-89). 1989, pp.
1-10.
LUN-90), pp. 134-139.
Key Words:
W.G.
"Report on the Homework Problem." Proc. 2nd RADC Data Base Security Workshop
integrity.
Key Words: MLS, design.
Key Words: MLS, DBMS, design, case.
6-14
database,
STA-88a
SPO-86 Spooner,
A^.,
"Framework
DBMS,"
"LOCK
for the Seciirity
Component of an
THO-88
Stachour, P.
et al.
ADA
RADC
Proceedings. 12th
International Conference
Very Large Data Bases
Data Views," Proc. Data Base Security
Invitational
on
Park,
Workshop Menlo ,
CA, May 1988
(6:
Tsai. and
"Prototyping as a Research
Tool for
MP WG
MLS/DBMS," 11.3
Proc.
Workshop,
(6:
LAN-89b), Oct 1988, pp. 63-
LUN-90), pp. 65-73.
.
Thompsen, D., W.T. M.B. Thuraisingham
1986, pp. 347-354.
84.
Key Words: DBMS, methods,
Key Words: MLS.
database,
Key Words: MLS, DBMS,
views.
design.
case.
SUM-81 SPO-86a
Summers. R.C..
Spooner, A.M., et
E.B. Fernandez, and C.
al.
"Framework for the Security Component of an ADA
Database Environment,"
DBMS,"
Computer Security
Proc.
"Auditing and Control in a
NCSC
Workshop on Database Sec. (6: COA-86), 1986. pp. Fl-
Wood
Thomsen. D.. W.T. Tsai, and M.B. Thuraisingham "Prototyping to Explore
MLS/DBMS
Journal.
Computers
Spring 1981, pp. 99-121.
,
THO-89
&
Design," Security
.
May
1989, pp. 229-245.
Key Words:
F15.
database,
Key Words: MLS, DBMS,
auditing, case.
Key Words: DBMS, methods,
design.
SUT-87
case.
Su, T.-A, and G. Ozsoyoglu
SPO-87
THU-87 Thuraisingham, M.B.
"Data Dependencies and
Spooner, D.L.
Inference Control in
"Security Checking in
Between Database System and Operating System Security,"
Multilevel Relational Database
Relational Database
Systems," Proc. 1987 IEEE Symp. on Sec. & Privacy (5: IEE-87a), pp. 202-211.
Management Systems Augmented with Inference
"Relationaships
WG
11.3 Meeting LAN-88), Oct. 1987, pp.
Proc. IFIP (6:
,
.
149-158.
Security
Key Words: MLS, DBMS,
Spooner, D.L. "The Impact of Inheritance on Security in ObjectOriented Database System." Proc. IFIP
WG
Workshop
(6:
Oct
.
Su, T.-A., J. Chung, and G. Ozsoyoglu "On the Cell Suppression by Merging Technique in the Lattice Model of Sununary Tables," Proc. 1989 IEEE
Symp. on
11.3
LAN-89b).
Sec.
&
Privacy
,
(5:
database, model,
Key Words: statistical, model, method, techniques.
"Multivalued Dependency P.
Dwyer LDV:
"Update Processing in Secure Database System,"
A
Postscript, 11th Natl.
Comp.
Inferences Relational Database
WG
Systems," Proc. fflP (Data Base) Workshop ,
Proceedings, 21st Hawaii
on
1988.
Key Words:
database,
(6:
11.3
THU-88a Thuraisingham, M.B. "Foundations of Multilevel Databases," Proc.
Base Security
Key Words:
May
RADC
Workshop Menlo 1988
(6:
theory.
method, case.
6-15
Park,
CA,
LUN-90).
Key Words: MLS,
database,
Data
Invitational
,
database,
inference.
Key Words: MLS.
and T.F. Keefe
DFI-89), 1989.
Sec. Conf. , (5: NCS-88a).
1988, pp. 96-115.
Tsai,
"Secure Query processing Using Al Techniques,"
techniques.
Su. T.-A. and G. Ozsoyoglu
B. Thuraisingham, and P.,
W.T.
,
SUT-89a Stachour,
Thuraisingham, M.B.,
Systems Sciences January
methods.
STA-88
THU-88
Intemat. Conference
IEE-89b), pp. 126-135.
1988, pp. 141-150.
Key Words:
inference,
methods.
SUT-89
SPO-88
December 1987, pp.
Key Words: DBMS,
OS,
database,
design.
,
479-492.
inference, control, design.
Key Words:
&
Engines," Computers
database,
VAN-80
THU-89e
THU-89 Thuraisingham. M.B. "A Multilevel Secure Data Model," Proc. 12th Natl. Comp. Sec. Conf. , (5: NCS89). 1989, pp. 579-590.
Thuraisingham, M.B. "Secure Query Processing in Intelligent Database Management Systems," Proc. 5th Security Applicat. Conf. (4: IEE-89C), 1989, pp. 204-
Key Words: MLS,
214.
,
database,
models.
Key Words: DBMS, methods,
THU-89a
Definition Facility
Access Control in Distributed Data Base Systems." Proc. 1980 IEEE
Symp. on Sec. & Privacy IEE-80). pp. 59-66.
.
(5:
database, network,
control.
TIN-87
ACM
VAN-86
Ting, T.C.
"A User-Role Based Data
van der Lans. R.F.
Security Approach," Proc.
"Data Security in a Relational Database Enviromnent." Computers «fe Security June 1986, pp. 128-134.
mP WG
,
11.3 Meeting . (6:
LAN-88). Oct. 1987. pp. 187208.
Key Words: MLS,
"A Module for
Key Words:
techniques.
Thuraisingham, M.B. "Mandatory Security in Object-Oriented Database Systems," Proceedings, Conference on ObjectOriented Progarmming October 1989.
van de Riet, R.P., and A. Wasserman
,
database,
Key Words:
policy.
Key Words:
database,
methods.
database,
relational.
THU-89b TRA-84
Thiffaisingham, M.B.
"Recent Developments in Database Security," Proc, IEEE Comp. Applicat. Conf.
VET-89
Traub.
J.F..
Y. Yemeni, and
,
September 1988.
'TCB
'The
Statistical Security
Statistical
Database."
of a
ACM
Trans, on Database Systems
Key Words:
Vetter, L.,
H. Wozniakowski
Key Words:
THU-89C
Proceedings, 2nd RADC Data Base Security Invitational
Workshop Franconia, NH, May 1989 (6: RAD-90). ,
THU-89d
Troxell, P.J.
'Trusted Database Design," Proc. 9th Natl.
Conf.
,
(5:
Comp.
Sec.
NCS-86), 1986. pp.
37-40 database, trusted,
"A Functional View of
"Security Issues in
Multilevel Databases,"
Systems," Proceedings, 1st
Key Words: MLS,
.
(5:
IEE-82). pp. 104-
Key Words:
database,
WAG-83
Trueblood, R.P.
methods.
Privacy
encryption, control.
TRU-84
pp. 721-729.
"Shared Database Access Using Composed Encryption Functions." Proc. 1982 IEEE Symp. on Security and 110.
Thuraisingham, M.B.
,
database, design.
Wagner. N.R.
design.
December 1989,
IEE-89c),
WAG-82
TRO-86
Key Words:
database,
techniques.
Security
(4:
statistical,
methods.
Thuraisingham, M.B. "Security Checking with Prolog Extensions,"
&
,
1989. pp. 216-221.
December 1984. pp. 672-679.
database,
Key Words:
Computers
The Next
Step," Proc. 5th Security
Applicat. Conf. ,
general, methods.
Key Words:
and G. Smith
Subsets:
International
Wagner, N.R.
Knowledge
Workshop on
Expert Database Systems October 1984, pp. 834-840. ,
"Fingerprinting," Proc. 1983
IEEE Symp. on Privacy .
(5:
22.
Key Words:
database,
Key Words:
database, general,
methods.
database,
techniques, control, authentication.
6-16
Sec.
&
IEE-83a), pp. 18-
WAG-86
WOO-80
WIL-89
Wagner, N.R., P.S. Putter and M.R. Cain
Wilson,
"A
Security Policy for an
"Encrypted Database Design:
AIDBMS
Specialized Approaches,"
Subject)," Proc. 1989
Proc. 1986
Sec.
&
IEEE Symp. on
Privacy
,
(5:
IEE-86),
pp. 148-153.
Key Words:
Wood, C, E.B. Fernandez, and R.C. Summers
J.
(a Trusted
IEEE
Symp. on Sec. & Privacy . IEE-89b). pp. 116-125.
(5:
.
Key Words: MLS. DBMS, database, design,
"Data Base Security: Requirements. Policies, and Models." IBM Systems Journal Vol. 19. No. 2. 2980. pp. 229-252.
Key Words:
policy, case.
encryption, techniques.
database,
requirements.
WIN-88
WHI-89 Whitehurst, RA., and
Winkler, H. "Sybase Secure
T.F. Lunt
Proc.
"The SeaView Verification," Proc.
Comp.
Security Invitational ,
.
May
1988. 65-73.
(6:
Park,
CA,
LUN-90). pp.
,
database, kernel,
design.
WUA-88
WIS -89
WHI-89a
Kernel for Nonproprietary Hardware," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-
Key Words:
database,
methods, case.
views, case.
Wood, T. "A Trusted Database Machine
89), 1989, pp. 11-17.
Key Words:
verification,
WOO-89 Server,"
Data Base
Workshop Menlo
Sec.
Foundations Workshop 1989 (3: IEE-89a), pp. 125-132.
Key Words:
RADC
SQL
Wu. A.
T.F. Lunt
Wiseman. S. "On the Problem of Security
"The Seaview Verification
in Databases." Proc. IFIP
Architecture." Proc.
Effort," Proc. 12th Natl.
11.3 (Data Base)
Whitehurst, R.A., and
Comp.
NCS-
Sec. Conf. , (5:
(6: IFI-89).
Workshop
1989.
,
"Al Secure
Key Words:
database,
DBMS
Workshop Menlo .
1988. 15-22.
(6:
WIL-88 Wilson,
J.
"Views
as the Security
Objects in a Multilevel Secure Relational Database
Management System," 1988 IEEE Symp. on (5:
CA.
Key Words: MLS. DBMS, design, case.
.
Park.
LUN-90). pp.
requirements.
verificatio,
views, case.
Privacy
RADC
Data Base Security Invitational
May
89), 1989, pp. 18-27.
Key Words:
WG
Proc. Sec.
&
IEE-88a). pp. 70-
84.
Key Words: MLS, DBMS, views.
6-17
Communication and Network Security
7.
This section cites publications on physical security in networks, applied cryptographic techniques, secure communications protocols, and trusted network development.
ABR-88
ABB-84 Abbruscato, C.R.
"Data Encryption Equipment", IEEE
Communications Magazine September 1984, pp. 15-21. ,
ALB-84
Abrams, M.D., S.I. Schaen, and M.W. Schwartz "Strawman Trusted Network
Albert, D.J., et
Interpretation Guideline,"
Management," IEEE Computer
Uth
Proc.
Natl.
Comp.
al.
"Combatting Software Piracy by Encryption and Key ,
April 1984, pp. 68-72.
Sec.
Conf. (5: NCS-88), 1988, pp. 194-200. ,
Key Words:
crypto,
Key Words:
ABB -86
trusted,
"Choosing a Key Style That Suits
the Application," Data Communications April 1986, ,
pp. 146-160.
Key Words:
threats, crypto,
guidelines,
network,
ALV-89
criteria.
Abbruscato, C.R.
Management
Key Words:
keys, management.
hardware.
crypto, keys.
Alvarez, D.L.
ADD-88
"Site Preparedness for the
Addison, K.P. "Secure Networking at Sim Microsystems, Inc.," Proc. 11th Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 212-
Network Emergency," 11th Natl. (5: ,
Comp.
Sec. Conf. ,
NCS-89), 1989, pp. 601-
604.
Key Words:
218.
Next
Proc.
contingency,
network.
Key Words: methods,
ABR-85 Abrams, M.D. "Observations on Local Area Network Security," Proc. 5th Sec. AppUcat. Conf. , (5: lEE-
AMS-88
network, case.
Amsel, E. "Network Security and Access Control," Computers &
AGN-84 Agnew, G.B.
89c), 1989, pp. 77-82.
"Secrecy and Privacy in a
Security
53-57.
Key Words: LAN, methods,
Local Area Network Environment," Proc. Eurocrypt
general.
J4,
Paris, 1984, (8:
BET-85),
,
February 1988, pp.
Key Words:
control, network.
pp. 349-363.
AND-85
ABR-87 Abrams, M.D.
Key Words: LAN, methods,
Anderson,
"Evaluating Security Services
general.
Computer and Network Security Concepts," Proc. 1985 IEEE Symp. on
Under Part 11 of the Trusted Network Interpretation," Proc. 3d Aerosp. Comp. Sec.
J.P.
"Unification of
AGN-85
&
Agnew, G.B.
Sec.
Conf. (5: IEE-87b), 1987, pp. 44-51.
"Modeling of Encryption Techniques for Secrecy and
pp. 77-87.
Privacy in Multi-User Networks," Proc. Eurocrypt
Key Words:
Key Words:
,
criteria.
trusted, network,
:85, Linz, 1985, (8: PIC-86),
Privacy
,
(5:
IEE-85).
models, network.
AND-87 Anderson, D.P., and
pp. 221-230.
Ragan "A Basis for Secure
P.V.
Key Words:
crypto,
techniques, models, network.
Commimication
in Large
Distributed Systems," Proc.
1987 IEEE Symp. on Sec. Privacy .
(5:
&
IEE-87a), pp. 167-
172.
Key Words:
policy, distributed,
models, network.
7-1
AND-87a
ARS-87
BAL-85
A.W.
Anderson, D.P., and
Arsenault,
P.V. Ragan
"High-Performance Interface
"Develoiwnent in Guidance for Trusted Networks," Proc. 10th
Architectures for
Natl.
Cryptographic Hardware," Proc. Crypto '87 Santa
NCS-87a). 1987, pp.
Comp.
Sec. Conf.. (5: 1-8.
,
Barbara,
CA, 1987.
POM-
(8:
88), pp. 301-309.
Key Words:
Key Words:
"Developments in Guidance for Trusted Networks: The
American National Standard for PIN Management and Security, X9.8-1988 American Bankers
Trusted Network Interpretation."
,
Association, Washington,
AIAA
No. 87-
3074, Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 52-59. .
DC,
January 1982.
Key Words:
Key Words:
Key IEEE
Standard,"
Communications Magazine September 1985. pp. 4146. crypto, keys,
standards.
A.W.
Aresnault,
ANS-82
Financial Institution
Management
Key Words:
ARS-87a
hardware.
"Automated Distribution of Cryptographic Keys Using the
.
guidelines,
trusted, network, criteria.
crypto,
Balenson, D.M.
BAN-82 Banerjee, S.K.
"High-Speed Implementation of DES." Computers &
the
Security .
November 1982,
Key Words: guidelines,
pp.
261-267. crypto,
DES,
hardware.
trusted, network, criteria.
control,
BAR-83
standards.
BAC-89
Barnes, D.
Bacon, M.
ANS-82a
"Assessing Public Network
American National Standard
Security,"
for Financial Institution
Message Authentication X9.9-1982 American Bankers .
Association. Washington.
Telecommunications
December 1989.
.
pp. 19-20.
DC,
Key Words:
April 1982.
requirments,
"The Provision of Security for User Data on Packet Switched Networks," Proc. 1983 IEEE
&
Symp. on Sec. Privacy , IEE-83a), pp. 121-126.
(5:
Key Words: methods, network.
network, general.
Key Words:
BAR-86
control,
BAK-84
standards.
Barrett, P.
Baker, P.C.
ARB-89
"Communications System
Arbo, R.S., E.M. Johnson, and R.L. Sharp "Extending Mandatory Access Controls to a Networked MLS Environment," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89). 1989, pp. 286,
Security Evaluation Criteria," Proc. 7th Seminar,
Comp.
DoD DOD-
Sec. Progr. , (5:
84), 1984, pp. 58-71.
Key Words:
Key Words: MLS, network, control.
Key Words: RSA, hardware, al.
"Al Assiu'ance System: Doing
the Job," Proc.
(5:
Arsenault, A.
case.
Baker, P.C, et
9th Natl.
ARS-84
for an Internet
Comp.
Sec. Conf. .
NCS-86). 1986. pp. 130-
Seminar,
DoD Comp.
Progr. . (5:
Key Words:
•The SILS Model
for
LAN
Security," Proc. 12th Natl.
Sec. Conf. , (5:
NCS-
verification,
network, methods, case. Sec.
Key Words: LAN, models, case.
DOD-84), 1984,
policy,
Barker, L.K.
89), 1989, pp. 267-276.
pp. 72-78.
Key Words:
BAR-89
Comp.
137.
"Security Issues Involved in
Networking Personal Computers," Proc. 7th
,
criteria, general.
BAK-85
295.
"Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor," Proc. Crypto '86 Santa Barbara, CA. 1986. (8: ODL-87). pp. 311-323.
PC.
network, requirements.
7-2
BEK-84
BAR-89a
BER-82a
M. Walker
Barrett, P.
Beker, H., and
"The Smart Diskette--A
"Key Management
Universal Cryptoengine,"
Electronic Transfer in Retail
Architecture," Proceedings,
Proc. Crypto '89. Santa
Environment". Proc. Crypto •84 , Santa Barbara, CA. 1984. (8: BLA-84a). pp. 401-410.
IEEE Comcon
Key Words:
methods.
Barbara,
CA,
(8:
BRA-89)
1989. crypto,
techniques.
,
Spring, 1982,
pp. 138-143.
crypto, keys,
crypto,
case.
BER-83
BAR-89b
BEK-85
W.
"Security for Packet-Switched
Berman, A. Security," Data
Communications July 1983,
.
Press,
New
,
York, 1985.
Key Words: book,
Key Words:
"Evaluating On-Line Computer
Beker. H. and F. Piper Secure Speech
Communications Academic
Networks," Telecommunications , September 1989, pp. 47^9.
pp. 145-152.
techniques.
networks,
Key Words: management, nethods.
BEK-87
general.
BON-89
Beker, H.J., and G.M. Cole
BAU-83
"Message Authentication and
Bauer, R.K., T.A. Berson,
Dynamic Passwords,"
and R.J. Feiertag
Eurocrypt '87 Amsterdam, 1987, (8: CHA-88a), pp. 171-
"A Key
Berson,T.A, and R.K. Bauer "Local Network Cryptosystem
Key Words: LAN,
Key Words:
Bartlett,
for Secure
,
Distribution Protocol
Using Event Markers,"
ACM
Trans, on Computer Systems
August 1983, pp. 249-255.
Key Words: crypto, keys, method.
Open System
Networks: A Tutorial Survey," Information Age
,
General Purpose
Key Words: network, methods, authentication.
&
A
Network Interpretation," Proc. 2nd Aerosp. Comp. Sec.
BOS-88 Bosen. R. "Seciu-ing the Micro-
2-4.
Mainframe Link." Proc.
MP/Sec.
Key Words:
trusted,
network,
(2:
'88 , Austraha, 1989.
CAE-89), pp. 351-355.
methods.
Key Words:
networks,
BEL-89
general.
PC.
Conf.. (5: IEE-86a). 1986, pp.
criteria,
Key Words:
,
Key Words: RSA, methods,
(U.K.), July 1988, pp. 131-
145.
Implementations of the
Modular Exponentiation on Microprocessors," Computers Security December 1989, pp. 621-630.
BeU, D.E. "Secure Computer Systems:
Bayle, A.J.
Bong, D., and C. Ruland "Optimized Software
175.
,
BEL-86
BAY-88 "Security in
Proc.
control,
techniques, PC.
Bellovin, C.
BEC-80
TCP/IP
"Security Problems in
ACM
BOY-88
Becker. H.B.
Protocol Suite,"
"Data Network Security: Everyone'a Problem," Data
Computer Communications
Boyd, C. "Some Apphcations of
Rev. . April 1989. pp. 32-48.
Multiple
Key Words:
Eurocrypt '88 Davos, 1988 GUN-89), pp. 455-467.
Communications September 1980, pp. 72-90.
Key
Ciphers," Proc. ,
,
threats, protocols,
(9:
requirements, case.
Key Words:
Key Words: networks, general.
BER-82
case.
Berson, T.A. "Local Network Cryptosystem Architecture: Access Control,"
Proc. Crvpto-82
Barbara,
,
Santa
CA, 1982,
(9:
CHA-
83b). pp. 251-258.
Key Words: LAN. methods.
7-3
crypto,
crypto, methods,
BRA-82
BRA-87b
BRO-84
Branstad, D.K., and
Branstad, D., et
M.E. Smid "Integrity and Security Standards Based on Cryptography," Computers
"SP4: Transport Encapsulation Security
Security ,
November
A
&
1982, pp.
al.
Protocol," Proc. 10th
Comp.
NCS-
Manage
to
Security Joumal
Key Words:
protocols, case.
BUR-87
BRA-87C Branstad, M., et
Brand, S.
"A Status Report on the Development of Network Criteria," Proc. 8th Natl.
Sec. Conf. , (5:
Burger.
al.
A
BRA-85
"SP4: Transport Encapsulation Security protocol," AIAA No. 87-3060,
Comp.
Proc. 3d Aerosp.
Sec.
Conf. (5: IEE-87b), 1987, pp. 143-145.
Computer Sec. Conf.
Key Words:
BRA-85a
BUS-83 Branstad, M., et
Busse, J.G. "Developing a Cryptographic
al.
Bradey, R.L., and
"Key Management and Access
System
Graham
Control for an Electronic Mail System," Proc. 12th Natl.
The
"Full Encryption in a
Comp.
Proc. Eurocrypt '85
89), 1989, pp. 230-231.
Linz,
Sec. Conf. , (5:
for Electronic Mail,"
Office
November
,
1983,
pp. 122-128.
NCS-
Personal Computer System," (8:
network, methods,
protocols, case.
criteria.
BRA-89
,
(5:
,
NCS-87a), 1987, pp. 254-256.
case.
Key Words: network,
W.
"Networking of Secure Xenix Systems," Proc. 10th Nad.
,
BCS-
85), 1985, pp. 145-151.
Key Words:
network.
crypto, methods,
standards.
1985, 240.
Summer
1984, pp. 75-88.
Key Words: management, Key Words:
I.G.
,
Network Computer
the
87a), 1987, pp. 158-161.
255-260.
Comp.
P.S.
"How
Security Problem,"
Nad.
Sec. Conf. , (5:
Browne,
PIC-86), pp. 231-
Key Words:
crypto, methods,
case.
Key Words: EM,
crypto, keys.
CAC-84 Key Words:
crypto, methods,
PC.
BRA-87 Branstad, D.K.
"Considerations for Security in the
OSI
Conf.
,
(5:
Comp.
Sec.
Caccetta, L.
Britton, D.E.
"Vulnerability of
"Formal Verification of a Secure Network with End-to-
Communications Networks," Networks Vol. 14, No. 1,
End Encryption," Proc. 1984 IEEE Symp. on Sec. &
1984, pp. 117-140.
Privacy
Architecture,"
Proc. 10th Natl.
BRI-84
,
(5:
IEE-84), pp. 154-
Key Words:
crypto, network,
vulnerabiUties,
"A Survey of Hardware
"Securing the Distributed Word Processing Network," Security January Computers 1983, pp. 78-81.
Implementations of RSA" Proc. Crypto '89 Santa
Key Words: methods, network.
Key Words: OSI, network, BRI-89
methods.
&
Brickell, E.F.
BRA-87a Branstad, D.K.
"Considerations for Security
OSI
IEEE Network Magazine
,
Barbara,
Architecture," ,
CA,
(8:
,
BRA-90),
1989.
CAP-88 Capel, A.C., C. Laterriere,
April 1987.
Key Words: OSI, network,
CAL-83 Callaghan, D.R.
methods.
methods.
Key Words: network.
166.
NCS-87a), 1987,
pp. 9-14.
in the
,
Key Words: RSA, hardware,
and K.C. Toth
general.
"Protecting the Security of X.25 Communications," Data Communications November ,
1988, pp. 123-139.
Key Words: methods, protocols.
CAR-86
CHI-89a JM., and
Martin "Cryptographic Requirements for Secure Data Communications," Proc.
Carroll,
IFIP/Sec. '86 ,
1986,
(2:
S.
Monte
Carlo,
COH-87a
Chiou, G.-H., and W.-T. Chen "Secure Broadcasting Using
IEEE
the Secure Lock,"
Trans,
on Software Engr.
,
August 1989, pp. 929-934.
GRI-89).
,
Key Words: network,
Key Words:
Cohen, F. "Design and Administration of E)istributed and Hierarchical Information Networks Under Partial Ordering," Computers & Sectirity June 1987, pp. 219-228.
techniques, case.
crypto,
Key Words: network, management, methods,
requirements.
CHR-88
CAR-87
control.
Christoffersson, P.
J^.
"Strategies for Extending the
"Message Authentication and Encryption Combined,"
Useful Lifetime of DES,"
Computers
Carroll
Computers & Security August 1987, pp. 300-313. ,
&
Security ,
February 1988, pp. 65-71.
Key Words:
crypto, control.
Key Words: DES,
COH-87b Cohen, F. "Design and Protection of Information Networks Under a Partial Ordering," Computers & Security August 1987, pp. ,
332-338.
CIM-85
management.
Cimimiera,
CAS-88
L.,
Key Words: network,
and
A. Valenzano
Casey, T.J., and S.R. Wilbur "Privacy Enhanced Electronic Mail," Proc. 4th Aerosp. Comp. Sec. Conf. , (4: lEE-
design,
methods.
"Authentication
Mechanisms
88b), 1988, pp. 16-21.
Microprocessor-Based Local Area Networks," IEEE Trans, on Software Engr., May 1989, pp. 654-958.
Key Words: EM,
Key Words: LAN,
in
COH-87C Cohen,
F.
"A Cryptographic Checksum for Integrity Protection,"
Computers & Security December 1987, pp. 505-510. ,
policy,
methods.
au^entication.
Key Words:
crypto, technique.
CLA-87
CER-83
COH-88
Cerullo, M.J.
Clark, A.J.
"Data Communication
"Physical Protection of
Controls," Computers
Security
,
&
January 1983, pp.
Cryptographic Devices," Proc. Eurocrypt '87 Amsterdam, ,
1987, (8: CHA-88a), pp. 83-
67-72.
Cohen F. 'Two Secure Computers
&
File Servers,"
Security August 1988, pp. 409-414. ,
93
Key Words:
Key Words:
controls, general.
Key Words:
CHE-89
crypto, physical,
hardware, techniques.
COO-89
Chess, D.M.
"Computer Viruses and Related Threats to Computer and Network Integrity," Computer Networks and ISDN Systems July 1989, .
Key Words:
COH-85
Cooper, J.A.
Cohen, F. "A Secure Computer Network Design," Computers & Security September 1985, pp. ,
threats,
network.
Key Words: network,
design.
Chick, G.C., and F.E. Tavares
Cohen,
"Flexible Access Control with Master Keys" Proc. Crypto
of Information Networks with
Santa Barbara, CA, BRA-90), 1989.
Key Words: keys.
Security: Strategies for the
1990s McGraw-Hill, York, 1989 .
New
F.
"Protection and Administration
(8:
crypto, control,
Partial Ordering,"
&
Key Words: book, techniques, methods, general.
CRA-88
COH-87
CHI-89
,
Computer and Communications
189-206.
pp. 141-148.
•89
network, methods,
case.
Security
,
Computers
April 1987, pp.
118-128.
Cramer, R., B. Ridridge, and E. SchallenmuUer "Design and Implementation of a Secure Terminal Gateway," Proc. 4th Aerosp. Comp. Sec. Conf. (5: IEE-88b), 1988, pp. 262-268. .
Key Words: network, management, methods,
Key Words: network,
control.
case.
7-5
design,
DAV-84
CSC-87 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria,
NCSC-TG-005,
Version
1,
Davida,
W.L.
"Passports and Visas Versus IDs," Proc. Eurocrypt '88
Price
Security for
Networks
National Computer
New
,
J.
Computer Wiley & Sons,
book, networks,
,
Davos, 1988
(9:
GUN-89),
pp.
Key Words:
authentication,
crypto, methods.
general. trusted, network,
DAV-89
DAV-84a
criteria, guidelines.
Davio, M., et
DAN-89
"Efficient
Danner, B.P. "Initial Approach for a Secure Communications
TRW
Processor," Proc. 12th Natl.
Comp.
and Y. Desmedt
183-188.
York, 1984.
Key Words:
31 July 1987.
Key Words:
G.I.,
Meade,
Security Center, Ft.
MD,
DAV-88
Davies, D.W., and
Sec. Conf.
,
(5:
Davis, R.
al.
"Network Authentication
Hardware and
Software Implementations for the DES," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: ,
.
BLA-84a), pp. 144-173.
Key Words:
NCSKey Words: DES,
89). 1989. pp. 197-214.
Tokens," Proc. 5th Security AppUcat. Conf. (5: IEE-89c), 1989, pp. 234-238. authentication,
methods.
crypto,
hardware.
Key Words:
DAV-89a
design, policy,
DAV-84b
case, hardware.
Davies,
DAV-80
Davies. D.W.. and
D.W.
"A Message Authentication Algorithm Suitable for a Mainframe Computer," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 393-400.
Privacy (5: IEE-80). pp. 100-102.
Key Words:
G.I.,
Price
.
R.A. DeMillo. and R.J. Lipton "Protecting Shared Cryptographic Keys," Proc. 1980 IEEE Symp. on Sec. & Davida,
W. L
Computer Networks 2nd Edition. J. Wiley & Sons. New York, Security for
1989
,
Key Words: book, network, crypto, techniques, general.
.
DAV-89b
crypto,
Davids. R.
authentication, signatures,
Key Words:
crypto, keys,
DAV-84C
DAV-81 Davies.
D.W. The
^88, Austiaha, 1989, (2:
Davies,
89), pp. 357-365.
Signatures in Banks," Proc. '84 , Toronto, 1984,
Key Words:
D.W. 'The Use of Digital
Security of .
Press.
Los
(2:
Key Words:
Del Re, E., R. Fantacci, and D. Maffucci
crypto,
Key Words: book, network,
authentication, signatures,
general, methods, techniques.
methods.
DAV-83 Davies,
"A New Speech
"Applying the
Davies,
RSA
Digital
Signature to Electronic Mail,"
IEEE Computer February ,
1983, pp. 55-62.
Key Words: RSA. crypto, EM, authentication.
Signal
Scrambling Method for Secure Communications." IEEE Journal on Selected Areas
DAV-85 D.W.
standards, case.
DEL-89
FIN-85), pp. 13-21
CA, 1981.
Angeles,
CAE-
mP/Sec.
Data in Networks IEEE
Computer Society
Security
Standards," Proc. IHP/Sec.
methods, management.
Tutorial:
EFTPOS
"Australian
methods.
Communication
D.W.
"Engineering Secure Infromation Systems," Proc.
Eurocrvpt '85 . Linz, 1985, PIC-86). pp. 191-199.
Key Words:
(9:
design, methods.
methods.
.
May
1989.
pp. 474-480.
Key Words: methods, techniques.
DEN-80 Denning, D.E., and F.B. Schneider "The Master Key Problem," Proc. 1980
IEEE Symp. on
Security
Privacy ,
&
(5:
IEE-
80), pp. 103-107.
Key Words: crypto, keys, management.
7-6
DON-84
DEN-83 Denning, D.E. Signanires,"
,
February 1983, pp. 27-35.
"A
Multilevel Secure Local
Area Network," Proc. 7th Seminar,
DoD Comp.
Progr. . (5:
Key Words:
EST-87
Donaldson, A.
Keys and IEEE Computer
"Protecting Public
Sec
.
DOD-84), 1984,
and G. Tsudik
"Visa Scheme for InterOrganization Network Security," Proc. 1987
Symp. on Sec.
pp. 341-350.
crypto, keys,
Estrin, D.,
methods.
&
IEEE
Privacy ,
(5:
IEE-87a), pp. 174-183.
Key Words: MLS. LAN, DES-83 Desmedt, Y., J. P. Vandewalle, and R.J.M.
case.
DON-88
Govaerts,
"Does Public-Key Cryptography Provide a Practical and Secure Protection of Data Storage and Transmission?," Proc, Intemat. Camahan Conf. on Sec. Technology 1983, pp. ,
133-139.
Donaldson, A.L., J. McHugh, and KA. Nyberg "Covert Channels in Trusted
Key Words:
threats, crypto,
Flow,"
Key Words:
Communication
LAN,
DUF-86
'85, Linz, Austria, 1985, PIC-86). pp. 108-127.
Datagram on
Journal,
,
May
1989.
Key Words: network, Lock MP/Sec.
Key Words:
Transmission Control Protocol," Proc. Eurocrypt
IEEE
pp. 486-498.
SulUvan
J.
Prototype," '86 Monte ,
protocols, control, methods.
FAI-84 A. Matusevich, and J.Plany "An LSI Digital Encryption Processor (DEP)," Proc. Crypto •84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 115-143.
Carlo, 1986, (2: GRI-89).
DoD
"Visa Protocols for Controlling
Selected Areas trusted,
"Integrity
"Security for the
Mogul, and
88), 1988, pp. 226-232.
Proc.
W.
Estrin, D., J.
G. Tsudik Interorganizational
,
Duffy, K.J., and
DIF-85
EST-89
LANs," Proc. 11th Natl. Comp. Sec.Conf. (5: NCS-
threats.
methods.
Diffie.
Key Words: network, methods,
deasign, case.
Fairfield, R.C.,
techniques,
design, case.
(9:
,
EGG-88 Eggers, K.W., and
Key Words:
Key Words: network,
P.W. Mallett
protocols, case.
"Characterizing
DOD-85 Proceedings,
DoD
Computer
Security Center Invitational
Network
Covert Storage Channels," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 275-279. .
,
Ft.
Meade,
MD,
Key Words: network,
March 1985.
Key Words:
threat,
"How
to
Choose Good
Proc. IFIP/Sec. '86
Key Words:
ERD-86
proceedings,
,
Monte
crypto, guidelines.
Erdem, H.
DOL-82
"Host Cryptographic A Software Implementation," Computers Operations:
Dolev, D., and A. Wigderson "On the Security of Multi-
&
Security
December 1986,
,
Party Protocols in Distributed
pp. 344-346.
Systems," Proc. Crvpto-82 Sanu Barbara, CA, 1982, CHA-83b), pp. 167-175.
Key Words:
distributed,
FAK-87 Fak, V.
"Crypto Management Made Manageable: Demands on Crypto Equipment Design," Computers & Security February 1987, pp. 36-40. ,
,
(9:
crypto, design.
Key Words:
EST-85 protocols.
Fak, V.
Carlo, 1986, (2: GRI-89).
models.
network.
Key Words:
FAK-86
Cryptographic Protection,"
Workshop on Network Security
crypto, hardware,
case.
Estrin,
D.
"Non-Discretionary Controls for Inter-Organization
Networks," Proc. 1985 IEEE Symp. on Sec. & Privacy (5: IEE-85), pp. 56-61 ,
Key Words:
networks, control,
methods.
7-7
crypto, design.
FAM-83
GAI-80
FIC-84
Fam, B.W.. and J.K. MiUen "The Channel Asssignment Problem," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: ,
EE-83a), pp. 107-112.
Fick, G.P.
Gait,
"Implementation Issues for Master Key Distribution and
Maintenance Testing for the Data Encryption Standard SP 500-61, National Bureau of
Protected Keyload
Procedures," Proc. IFIP/Sec.
FIN-
•84, Toronto, 1984. (2:
Key Words: model, methods.
,
Key Words:
Faurer, L.
Key Words: DES, management.
crypto, keys,
design.
"Security Issues in
Open
GAL-87
System Context," Computer Security Joumal. Vol. 4, No.
FID-85
1986, pp. 55-62.
Galil, Z., S. Haber,
Key Words: OSI,
M. Yimg
"A Comprehensive Approach Network Security," Data
"Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model," Proc. Crypto '87 Santa
Communication April 1985.
design,
,
methods.
pp. 195-213.
,
Barbara,
Key Words:
FEL-89 Feldmeier, D.C, and
CA,
1987, (8: 88), pp. 135-155.
networks,
POM-
general.
Kam
Key Words:
"Cracking Passwords for Fun and Profit," Proc. Crypto '89 Santa Barbara, CA, (8: BRA-
,
90), 1989.
Fisher,
W.W.
GAS-82
"Cryptography for Computer
Making
the
Decision," Computers threats, control.
crypto, protocols.
ns-84
Security:
Key Words:
and
Fidlow, D. to
P.R.
MD,
Standards, Gaithersburg,
August 1980.
85), pp. 571-580.
FAU-86
1,
J.
Security
,
Gasser, M., and D.P. Sindhu
"A
&
October 1984, pp.
229-233.
Multilevel Secure Local
Area Network," Proc. 1982 IEEE Symp. on Sec. & Privacy , (5: EEE-82), pp. 137-
FEN-85
143.
Key Words:
Fenna, E. "Data Encryption Protocols for Electronic Mail,"
Key Words: EM,
Key Words: MLS, LAN.
ACM
Sec., Audit & Control Rev. Winter 1985, pp. 43-47.
crypto, design.
FIT-80 .
crypto,
design.
Fitzgerald,
J.
GIR-87
"Data Communications Conliol Matrix," Assets Protection
,
Girling,
Sept./Oct. 1980,
pp.24-31.
protocols.
C.G.
"Covert Channels in LANs," IEEE Trans, on Software Engr. February 1987. pp. 292,
Key Words:
FER-87 Fernandez,
C,
control, methods.
et al.
"Automating the Computation of Authenticators for Interbank Telex Messages," Computers & Security October 1987, pp. 396-402. ,
Key Words: LAN,
FIT-89
'The Quest for Intruder-Proof Computer Systems," IEEE Spectrum August 1989, pp. ,
GOY-88 Goyal, P.K., and E.B. Fernandez "Encryption Using Random Keys: Scheme for Secure
A
authentication,
Key Words:
case.
threats,
methods.
Communication," Proc. 4th
Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 410^12. Aerosp.
FRI-88
FIA-89 A. "Batch RSA," Proc. Crypto '89 , Santa Barbara, CA, (8:
Increase Telecommunications
BRA-90), 1989.
Security," Information
Fiat,
Friedberg, A.H., et
Key Words: RSA,
AprU 1988,
Key Words:
physical,
7-8
Age
,
pp. 73-78.
design,
methods.
,
al.
"Reliance on Optical Fibres to
(U.K.) case.
threats.
Fitzgerald, K.
22-26.
Key Words:
296.
Key Words:
crypto, techniques.
GSA-82
GRA-87 "DES Key Crunching Safer Cipher Keys,"
for
ACM
Audit & Control Rev. . Spring 1987, pp. 9-16.
Sec..
Key Words: DES.
GUI-88
Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard. Federal Standard 1027, U.S. General Services Administation Washington, DC, April 1982.
Grant, L.
keys,
Guinier, D.
"DSPP:
A
Data Security Pipe
Protocol for PCs, Large Scale
&
Fall 1988, pp. 4-9.
Key Words: PC,
techniques.
Key Words: DES,
GRA-88
ACM
Systems, or Networks," Control Rev. , Sec., Audit
network,
protocol.
crypto,
standards.
Graham, I., and S. Wieten "The PC as a Secure Network Woricstation," Proc.
GUI-88a
GSA-83
Guinier, D.
Teleconununications:
MP/Sec.
'88 . Australia,
Interoperability and Security
1989. 437.
CAE-89). pp. 425-
Key Words: PC. methods,
Requirements for Use of the Data Encryption Standard in the Physical and Data Link Layers of Data
case.
Commimication Federal
(2:
"SPKS: Sharing Partial Key Sec., Audit & System," Control Rev. Fall 1988, pp.
ACM ,
10-13.
Key Words:
crypto, key, case.
,
Greenlee, M.B.
Standard 1026, U.S. General Services Administration Washington, DC, January
"Requirements for Key
1983.
GRE-85
Management Industry,"
Key Words: DES,
IEEE
Scheme
Key
for a
Large Network," Proc. 1989 IEEE Symp. on Sec.& Privacy
crypto,
standards.
Communications Magazine September 1985, pp. 22-28.
L. and T. Keisler
"Authenticated Group Distribution
Protocols in the
Wholesale Financial Services
HAR-89 Ham,
(5:
IEE-89b), pp. 300-309.
,
Key Words:
GSA-85 Interoperability and Security
Key Words:
Requirements for Using the Data Encryption Standard with
requirements,
management,
crypto, keys,
CCi
Group 3 Facsimile Equipment Federal Standard
case.
l
1
.
GRI-89 Grimm,P. "Security
We
on Networks: Do
Need
It?,"
October 1989, pp. 315.
Key Words:
requirements,
,
DC, April
Multilevel Data Security,"
1985.
Key Words: DES,
Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989, pp. 254-262.
crypto,
,
standards.
Key Words:
GUI-82 GuUlou, L.C.. and B. Lorig "Cryptography and Teleinformatics," Computers
networks.
GRO-82
Chien, and
T. Keisler
"An Extended Cryptographic Key Generation Scheme for
Comp.
Networks and ISDN Systems
HAR-89a Ham, L., Y.
Administration Washington,
1027, U.S. General Services
Really
crypto, keys,
methods.
crypto, keys,
methods.
HAS-85
Grossman, G.
&
"A
27-33.
"On Using
Key Words:
Exponent in a Public Key Network," Proc. Crypto '85
Practical Executive for
Security
January 1982, pp.
,
Secure Communications," Proc. 1982
&
IEEE Symp. on
Privacy pp. 144-155. Sec.
,
(5:
crypto, general.
GUI-86
case.
networks,
J.
RSA
with
Low
Santa Barbara, CA, 1985, WIL-86), pp. 403-408.
IEE-82). Guillou, L.C.
Key Words: OS,
Hastad,
"Smart Card
- A
Key Words: RSA,
Highly
Reliable and Portable Security Device," Proc. Crypto '86 ,
Santa Barbara, CA, 1986. ODL-87). pp. 464-487.
Key Words:
authenication.
7-9
(8:
design.
crypto,
,
(8:
.
HOO-84
HER-85
JAC-89
Herzberger, A., and
Hoomaert,
S.S. Pinter
"Efficient
"Public Protection of Software," Proc. Crypto '85
.
Santa Barbara, CA, 1985, (8: WIL-86), pp. 159-179.
Key Words:
crypto, methods,
F., et al.
Implementation of the DES," Proc. Crypto '84 Santa .
Barbara,
CA, 1984,
BLA-
(8:
84a), pp. 147-173.
Key Words: DES,
crypto,
Herlihy, M.P., and J.D. Tygar
Make
Replicated
Data Secure," Proc. Crypto '87 Santa Barbara, CA, 1987, (9: POM-88), pp. 379,
Hoomaert, F., et al. "Fast RSA-Hardware: Dream or Reality," Proc. Eurocrypt
GUN-
'88 , Davos, 1988, (8: 89), pp. 455-467.
Key Words:
Key Words: RSA, Key Words:
crypto, methods.
on an
Confidentiality, and Integrity
Conf., (5: NCS-88), 1988,
Extensions to the Protocol Suite,"
Audit
Key Words: LAN, methods,
a Local Area
Network
Operations," Proc. IFIP/Sec.
CAE-
auditing,
JAM-89
Comp.
pp. 219-225.
Security, Control and Audit of
Key Words: LAN,
"Authentication,
Sec.
for the
case.
Ethernet,"
Proc. 11th Natl.
"A Framework
crypto,
hardware.
Housley, R.
Herbison, B.J.
Low
Jamieson, R., and G.
89), pp. 439-469.
HOU-89
HER-88
crypto, methods.
^88, AustraUa, 1989, (2:
391.
"Security
Annual AFCEA Intelligence Symposium. September 1987.
JAM-88
HOO-88
HER-87 to
Suj^rt Using Embedded Cryptography," Proc., 2nd
hardware.
software.
"How
J. and T. Kibalo "Secure Data Network System
Jacobs,
Hardware
XNS
ACM
&
Sec.,
Control Rev.. Fall 1989. pp. 17-24.
&
Computers
Security
authentication,
.
June
1989. pp. 305-316.
Key Words: LAN,
case.
Key Words:
Jamieson, R., and G. Low "Security and Control Issues in Local Area Network Design,"
design,
control.
case, methods, protocols.
fflG-88
JAN-86
Highland, H.J.
"How
Secure Are Fiber Optics Communications,"
HUM-80
Jansen,
C.JA.
Humprey, T., and F.L. Toth 'Two-Chip Data Encryption
"On
February 1988, pp. 25-26.
Unit Supports Multi-Key
Termiiuils,"
Security
Key Words:
Systems," Electronics January 17, 1980, pp. 136-139.
Key Words:
Key Words: PC,
Computers
&
Security ,
,
threats,
Key Storage
the
Requirements for Secure ,
Computers
&
June 1986, pp. 145-
149.
hardware, techniques. crypto, hardware.
crypto, keys.
HIG-88a Highland, H.J. "Secret Disk
II
—
ING-83 Transparent
Automatic Encryption," Computers & Security ,
February 1988, pp. 27-34.
Key Words: PC,
crypto,
methods.
JAY-82
Ingemarsson,
Jay ant, N.S.
I.
"A Comparison Between Public-Key and Conventional Encryption Methods," Proc. IFIP/Sec. '83. Stockholm, 1983, (2: FAK-83). pp. 229-
"Analog Scramblers for Speech Privacy," Computers & Security ,
November 1982,
pp.
275-289.
Key Words: methods,
232.
hardware.
Key Words:
HIN-83 Hinke, T., J. Althouse, and R.A. Kemmerer "SDC Secure Release Terminal Project," Proc. 1983
IEEE Symp. on
Sec.
&
Privacy (5: IEE-83a), pp. 113-119. .
crypto,
JEN-87
techniques.
M.D. Abrams "On Network Covert Channel
Jeng, A.B., and
ING-84 Ingemarsson,
Analysis,"
I.
No. 87-3081,
Comp.
Proc. 3d Aerosp.
Protection," Information
Conf. (5: IEE-87b), 1987, pp. 95-103.
Resource Management (UK), ,
March
Sec.
.
1984, pp. 29-32.
Key Words: hardware, design, case.
ADA
"Encryption for Data
Key Words:
Key Words:
crypto, general.
7-10
threats,
network.
Johnson, H.L., and J.D.
"A to
Mission-Critical
Network
Approach
Sec. Conf.
"Implementing the RSA Cryptosystem." Computers
&
Security . August 1987. pp.
Security," Proc.
Comp.
Kemmerer, R.A.
Jung. A.
Layne
10th Natl. (5:
KEM-87a
JUN-87
JOH-87
,
Verification Techniques," Proc. Crypto '87 Santa Barbara,
342-350.
.
NCS-87a), 1987. pp. 15-
CA. 1987.
Key Words: RSA.
24.
"Analyzing Encryption Protocols Using Formal
(9:
POM-88). pp.
289-305.
crypto,
methods.
Key Words:
KAK-83
network.
JOH-87a Johnson, RJ. in
EFT-
Kak. S.C. "Data Security in Computer Networks." IEEE Computer February 1983. pp. 8-10.
&
Security
.
June
Key Words: network,
general.
1987. pp. 245-251. crypto, keys,
"Analyzing Encryption Verification Techniques."
IEEE
Communication
PA.
Karger.
May
.
1989,
pp. 448-457.
"Authentication and Access
case.
Control in Computer
JON-84 Jones,
Kemmerer. R.A.
Journal on Selected Areas
KAR-86 Key Words:
KEM-89 Protocols Using Formal
Security Systems,"
Computers
verification,
crypto, protocols, techniques.
.
"Key Updating Flags
POS
Key Words:
requirements,
Networks." Computers
R.W.
Security
"User Functions for the Generation and Distribution of Encipherment Keys," Proc. Eurocrypt '84 . Paris. 1984. (8: BET-85). pp. 317-334.
.
Key Words:
&
December 1986.
pp.
KEN-81
314-324.
Kent, S.T.
Key Words: network,
control.
crypto, keys,
methods.
KAR-88
Scenario."
IEEE
Trans, on
Conununications June 1981. pp. 778-786. .
and L.D. Nelson "The Secure Data Network." AT&T Technical Journal .
JON-89
"Security Requirements and
Protocols for Broadcast
Karp. B.C.. L.C. Baker,
Key Words:
verification,
crypto, protocols, techniques.
May/June 1988.
Key Words:
requirements,
network, protocols.
Jonckheer. K.. and
Key Words: network,
M. Scarbrough of Data Transmitted Via Telephone, Fibre Optics, and Microwaves." Information Age (U.K.). March 1989. pp. 99-105.
general.
.
KAT-88
physical,
"Comments on Security Problems in the TCP/IP
M.A.
Katzer.
"Secured Communications for Workstations." Proc. 11th
PC
Natl.
Key Words:
KEN-89 Kent, S.T.
"Sectjrity
Comp.
Sec. Conf. . (5:
Protocol Suite."
ACM
Computer Communications Review July 1989. pp. 10-19. .
NCS-88). 1988. pp. 233-237.
Key Words:
techniques.
threats, protocols.
Key Words: PC. methods, JUE-85
.
pp. 29-40.
Key Words: methods.
KHA-89
design.
Jueneman. R.R.. C.H. Meyer, and S.M. Matyas "Message Authentication." IEEE Communications Magazine September 1985,
KEM-87 Kemmerer. R.A. "Using Formal Verification Techniques To Analyze Encryption Protocols" Proc. 1987 IEEE Svmp. Sec. Privacy (5:IEE-87a). pp. 134-
&
authentication,
.
verification,
crypto, protocols, techniques.
7-11
on Selected Areas
May
Comm.
J.
,
1989, pp. 4590-594.
.
139.
Key Words:
Khashnabish. B. "A Bound of Deception Capability in Multiuser Computer Networks," IEEE
Key Words:
threats,
network.
KOC-85
KIL-88
KRU-89
88), 1988. pp. 201-211.
Kochanski, M. "Developing an RSA Chip," Proc. Crypto '85 Santa Barbara, CA, 1985. (8: WIL86). pp. 350-357.
Key Words: network,
Key Words: RSA,
standards.
hardware.
Kilpatrick, K.E.
"Standards for Network Security," Proc.
Comp.
Uth
Sec. Conf.
.
Natl.
(5:
NCS-
.
Kruys.
J.P.
"Security in
Computers
Open Systems,"
&
Security . April
1989. pp. 139-147.
Key Words: OSI. network, crypto,
general.
LAM-88 KOC-87
KIN-89 King, G.
"A Survey of Commercially Available Secure
LAN
Products," Proc. 5th Security
Lambert, P.A.
Kochanski. M.. "A Survey of Data Insecurity Packages." Cryptologia January 1987, pp. 1-15. ,
Applicat. Conf.. (5: IEE-89c),
1989, pp. 239-247.
Key Words:
the
Protocol." Proc. 11th Natl.
Comp.
Sec. Conf. . (5:
NCS-
crypto, software,
Key Words:
Key Words: LAN. hardware,
crypto, protocol,
keys.
KOC-88
software.
Kochanski,
KNA-88 S.J.
—
LEM-86
M.
"Another Data Insecurity Package," Cryptologia July 1988, pp. 165-173. ,
"Privacy Protected
Payments
Model of
88). 1988. pp. 126-128.
case.
Knapskog.
"Architectural
SDNS Key Management
Realization of a
Protocol that Guarantees
Key Words:
Payer Anonymity," Proc. Eurocrypt '88 Davos, 1988 (8: GUN-89). pp. 107-122.
case.
crypto, software,
Lemire, J.R.
"A New Key Management Approach for Open Communication Environments," Proc. IFIP/Sec. '86
,
Monte
Carlo, 1986, (2: GRI-89).
.
Key Words:
protocols, case.
KNO-88
KOH-89 Kohl. J.T. "Cryptographic Protocols in Cerberus," Proc. Crypto '89 ,
Santa Barbara, CA,
Knobloch, H.-J. "A Smart Card Implementation of the FiatShamir Identification Scheme," Proc. Eurocrypt '88, Davos, 1988 (8: GUN-
(8:
BRA-
Key Words:
crypto, protocols,
,
1984, 26-28.
KRA-84 Key Words:
Key Words:
Organization," Computers Security
,
&
October 1984. pp.
234-236.
Knowles, T. "Security,
OSI and
Distributed Systems,"
Information
Age
Key Words: OSI, network, methods.
Key Words:
crypto, standards,
control, network.
LIN-83 Linden, C.
"The Transaction-Seal ~ The Comer-Stone in Secured Terminal Systems," Proc.
New
IFIP/Sec. '83 , Stockholm.
1983.
case.
(2:
FAK-83), pp. 223-
227.
(U.K.),
April 1988, pp. 79-84.
Information Resource
Management (UK), March
case.
"Data Encryption in ISO, the International Standards
KNO-88a
Le Roux, Y.
Computer Networks,"
Krauss, L.
authentication,
LER-84 "Controlling Access to
90), 1989.
89), pp. 87-95.
case.
Key Words: crypto, keys, management.
KRI-85 Krivachy, T. "The Ciphercard
Key Words:
—
an Identification Card with Cryptographic Protection," Proc. Eurocrypt '85 Linz, 1985, (8: PIC-86), pp. 200,
207.
authenticatiorL
LIN-87 Linn,
J.
"SDNS
Products in the Type Environment," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 162-164.
n
,
Key Words:
crypto, control,
Key Words: network,
case.
techniques.
7-12
MAC-84
LON-86
LIN-88 Linn,
Longley. D.. and S. Rigby "Use of Expert Systems in the Analysis of Key Management
J.
"COMSEC
Integration
Alternatives," Proc. 11th Natl.
Comp.
Sec. Conf. , (5:
NCS-88), 1988, pp. 122-125.
MacEwen, G.H.,
et al.
"Multi-Level Secudty Based on Physical Distribution" Proc.
&
Systems." Proc. IFIP/Sec. '86 ,
1984 IEEE Symp. Sec.
Monte
Privacy (5:IEE-84). pp. 167-
Carlo, 1986. (2:
GRI-
.
179.
89).
Key Words: methods, Key Words:
techniques.
crypto, keys,
methods.
Key Words: MLS,
physical,
methods.
LIN-89 Linn,
DARPA-Intemet
Mail." Proc. 12th Natl.
Comp.
Sec. Conf.
.
(5:
MAR-89
LON-87
and S.T. Kent
J.
"Privacy for
NCS-
Marino,
"Expert Systems Applied to
"An INFOSEC
the Analysis of
&
Computers
Key Words: EM.
Key
network,
Security.
Key Words:
Marella, A.,
Loscocco, P.
Analysis." Proc. 4th Aerosp.
"A Dynamic Network Labeling Scheme for a MLS LAN," Proc. 12th Natl. Comp.
Comp.
Sec. Conf. . (5: NCS-89).
.
(5:
lEE-
Jr.
'Telecommunications: A Control Strategy," EDPACS
LOS-89
Message Switch with Minimal TCB: Architectural Outline and Security Sec. Conf.
hardware, case.
MAR-89a
al.
Multilevel Secure
Sec.
crypto, keys,
methods.
Lipper. E.H.. et
Comp.
Conf. (5: NCS-89). 1989. pp. 571-578.
February 1987, pp. 54-67.
Key Words: LIP-88
Platform,"
.
methods.
"A
J.
Proc. 12th Natl.
Mangement Schemes,"
89). 1989. pp. 215-229.
and P. Lambert
Longley, D.
May
.
1989. pp. 1-5.
Key Words:
control, methods.
MAS-84
88b), 1988, pp. 242-249.
1989. pp. 277-285.
Key Words: MLS, methods,
Key Words: MLS. LAN.
design.
methods.
Masrani, R.. and T.P. Keenan "Security and Privacy in Cellular Telephone System." Proc. IFIP/Sec. '84 Toronto. .
LUB-89
LOC-87 Loscocco.
P.
"A Security Model and PoUcy for a MLS LAN." Proc. 10th Nad. Comp. Sec. Conf.
.
(5:
NCS-87a). 1987.
Luby. M.. and C. Rackoff "A Study of Password Security," Journal of Cryptology Vol. 1. No. 3, 1989, pp. 151-158.
Key Words:
control, methods.
Key Words: MLS. LAN.
LOM-89 Lomas. T.. et al. "Reducing Risks from Poorly Chosen Keys." ACM Operating System Review Vol. 23. No. 5. 1989. pp. 14.
18.
Key Words: methods,
case.
MAS-86 Massey, J.L. "Cryptography-A Selective
Communications January .
MacMillan. D. "Single Chip Encrypts Data at 14 MB/S." Electronics June .
16, 1981, pp. 161-166.
Key Words: DES,
methods,
hardware.
MAC-83
LON-83
"New Key
and S.G. Akl
Generation
Symp. Sec.
Longo, G. (Ed.) Secure Digital Systems Springer- Verlag, Wien, 1983.
Key Words:
&
Privacy
Matsumoto, the
to the
general,
methods.
7-13
A
and H. Imai
Predistribution
Practical Solution
Key
Distribution
Problem," Proc. Crypto '87 , Santa Barbara, CA, 1987, (8: POM-88), pp. 185-193.
Key Words: methods.
,
Key Words: MLS,
T.,
Key
.
(5:IEE-83a). pp. 72-78.
keys.
crypto, general.
MAT-87 System:
S.,
Algorithms for Multilevel Security," Proc. 1983 IEEE
keys.
1986. pp. 3-21.
"On MacKinnon,
Key Words: book,
FIN-85). pp. 457-
Survey," EHgital
MAC-81
models.
threats,
(2:
,
pp. 25-37.
Key Words:
1984. 470.
crypto,
crypto, keys,
MAT-87a
MER-81
Madas, Y., and A. Shamir "A Video Scrambling Technique Based On Space FilUng Curves," Proc. Crypto '87
.
Santa Barbara, CA,
1987, 417.
(8:
POM-88),
pp. 398-
MIL-84
Merkle, R.C., and
M.E. Hellman
MiUen, J.K. "The Interrogator
"On
Cryptographic Protocol
the Security of Multiple
Encryption," Communications
Security," Proc. 1984
of the 465-467.
Symp. Sec.
ACM
IEEE
Privacy
.
(5:IEE-
84). pp. 134-141.
crypto, methods.
MER-82
Key Words:
crypto, protocols.
MIL-87
Merritt,
MAY-89
M.
"Key Reconstruction,"
Proc.
Crypto-82, Santa Barbara,
F. et al.
"Evaluation Issues for an Integrated
&
Tool for
techniques,
physical.
Mayer,
July 1981, pp.
.
Key Words: Key Words:
A
'INFOSEC
1982, 375.
CA,
CHA-83b), pp. 321-
(8:
IEE-89c),
(4:
.
1989, pp. 271-275. case.
MCC-89 McCullough. D. "Security Analysis of a
Token Ring Using Ulysses," Proc. COMPASS '89: Comp.
IEEE
February 1987, pp. 274-288.
Key Words:
crypto, keys,
Key Words:
methods.
Key Words: methods,
Security Analysis,"
Trans, of Software Engr. ,
Product," Proc. 5th Security Applicat. Conf.
MiUen, J.K., S.C. Clark, and S.B. Freedman "The Interrogator Protocol
MEY-81
protocol, design.
MIL-87a
Meyer, C.H., S.M. Matyas, and R.E. Lennon "Required Cryptogr^hic
MiUen, J.K.
Authentication Criteria for Electronic Fxmds Transfer
Comp.
Systems," Proc. 1981 IEEE Symp. on Sec. & Privacy , (5:
Assurance, (2: IEE-89), 1989, pp. 113-118.
IEE-81), pp. 89-98.
Key Words: LAN,
Key Words:
"Interconnection of Accredited
Systems," Proc. 3d Aerosp. Sec. Conf. , (5:IEE-87b),
1987, pp. 60-65.
Key Words: network,
design.
MIL-88 threat,
methods.
MiUen, J.K., and Schwartz "The Cascading Problem for
crypto,
M.W.
athentication.
MEA-89
Interconnected Networks."
MIG-89
Meadows, C. "Using Narrowing in the Analysis of Key Management Protocols," Proc.
Symp. Sec.
&
1989 IEEE
Privacy ,
Migues, S., and R. Housely "Designin a Trusted ClientServer Distributed Network," Proc. 5th Sec. AppHcat. Conf., IEE-89C), 1989, pp. 91-94.
(5:
(5:IEE-89b), pp. 138-147.
Key Words: Key Words:
trusted,
network.
MIL-81
protocols, keys.
Miller. J.S., and
MEN-83
R.G. Resnick
Message Systems:
Menkus, B. "Long-Haul Data Security:
Applying a Security Model."
Whose
Proc. 1981
It
"Military
Today?," Data
&
Communications March 1983, pp. 137+
101-111.
.
Privacy
.
IEEE Symp.
Sec.
.
Key Words: network,
design.
MIT-87
C, and F. Piper "The Cost of Reducing KeyStorage Requirements in Secure Networks," Computers & Security August 1987. pp. .
339-341.
Sec.
(5:IEE-81), pp.
Key Words:
crypto, keys,
network.
Key Words: EM, Key Words: network,
Comp.
Conf. (4: IEE-88b). 1988. pp. 269-274.
Mitchell,
crypto,
Responsibility Is
Proc. 4th Aerosp.
models,
MIT-88
C, and M. Walker
Mitchell,
methods.
"Solutions to the
management.
Multidestinational Secure Electronic
Computers
MaU
&
Problem,"
Security
.
October
1988. pp. 483-488.
Key Words: EM. methods.
7-14
design,
MUE-82
MIT-89
C, D. Rush,
MUR-87
55-58.
MueUer-Schloer, C, and N.R. Wagner "Cryptogrqjhic Protection of Personal Data Cards," Proc. Crypto-82 Santa Barbara, CA. 1982, (8: CHA-83b), pp. 219229.
Key Words: EM,
Key Words:
Mitchell,
M. Walker "A Remark on Hash and
Functions for Message Authentication," Computers
Security
,
&
February 1989, pp.
.
White
and D. Rush
Mechanisms for Computer Networks ElUsHorwood, Chichester, U.K.,
Key Words:
network, methods
guidelines.
K.,
and K. Suzuki
Application Layer," IEEE Journal on Selected Areas
Secure Message Handling," J. on Selected Areas Comm. May 1989, pp. 517-
Key Words: book, network,
524.
methods.
Communication
1988.
IEEE
.
1987.
Communications Service Element (SCSE) in the OSI
S., et al.
Security
,
standards for
NY,
"Proposal on a Secure
Muftic,
C, M. Walker,
Corporation,
Plains,
Nakao,
MIT-89a
IBM
9279-2.
NAK-89
crypto, methods.
MUF-88
"CCnr/ISO
Security Practices for
Information Networks G320-
.
authenticatioiL
Mitchell,
Good
May
.
1989,
pp. 505-516.
Key Words: OSI, network, methods.
Key Words: EM,
standards,
MUF-89 NBS-80
Muftic, S.
case.
Mechanisms for Computer Networks J. Wiley Security
MOO-88
&
Moore, J.H.
,
Guidelines on the User Authentication for Computer
Network Access Control FIPS PUB 83. National Bureau of
Sons, Somerset, NJ, 1989.
,
"Protocol Failures in Crypto-
systems," Proceedings of the
Key Words: book, network,
Standards, Gaithersburg,
IEEE May
methods.
September 1980.
1988, pp. 594-
,
MD.
602.
MUF-89a Key Words:
Key Words:
"Extended OSI Security
protocols.
Computer Networks and ISDN Systems September 1989. pp. 223-227. Architecture."
MOO-88a
.
Moore, A. "Investigating
Formal
Specification and Verification for
COMSEC
Software
Key Words: OSI, network,
Sec. Conf. , (5:
NCS-
81, National
of Standards, Gaithersburg, September 1980.
MD,
NBS-81
Key Words:
"A Microprocessor-Based Cryptoprocessor," IEEE Micro October 1983. pp. 5,
15.
MOU-83
Guidelines for Implementing
and Using the NBS Data Encryption Standard, FIPSPUB 74, National Bureau of Standards, Gaithersburg,
Moulton, R.T.
Key Words: PC.
'T^etwork Security,"
hardware.
Datamation July 1983. pp. ,
121+
Key Words:
network, general.
,
Bureau
Key Words: DES, methods. Muller-Scloer. C.
software.
HPS PUB
MUL-83
88), 1988. pp. 129-138. verification,
NBS-80a DES Modes of Operation
methods.
Security," Proc. 11th Natl.
Comp.
guidelines,
network.
Muftic. S.
crypto,
Key Words: DES.
MUN-87
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria,
Security Architecture,"
MILCOM
'87 ,
case.
NCSC-TG-005,
MD.
July 1987.
design,
Key Words:
trusted,
criteria, guidelines.
7-15
Computer Meade.
Natl.
Security Center, Ft.
October 1987.
Key Words: network,
guidelines.
NCS-87
Mundy, G.R.. and R.W. Shirey "Defense Data Network Proceedings.
MD.
April 1981.
crypto,
network,
NYE-82
NES-89
NEL-87
Nesset,
Nelson, R. "SDNS Services and Architecture," Proc. 10th Natl.
Comp.
Sec. Conf.
,
(5:
D.M.
"Layering Central Authentication on Existing Distributed System Terminal
NCS-87a). 1987, pp. 153-
Services," Proc. 1989
157.
Symp. Sec.
&
IEEE
Assets Protection Jan./Feb. 1982, pp. 21-24. ,
Privacy ,
Key Words:
(5:IEE-89b), pp. 290-299.
Key Words: network,
crypto, hardware,
case.
Key Words:
methods, case.
authentication,
NYE-82a
design.
NEL-89
Nye, J.M.
Nelson, R. "SDNS Architecture and End-
to-End Encryption," Proc. Crypto '89 Santa Barbara, ,
CA,
Nye, J.M. "The CryptogrE^hic Equipment Market Trends and Issues,"
(8:
BRA-90), 1989.
NES-89a Nesset,
"Satellite
D.M.
"Issues in Secure Distributed
May
Operating System Design," Digest of Papers, IEEE Compcon '89 1989, pp. 342-
case.
,
Key Words:
crypto, network.
Communications and Computerworld
Vulnerability," 3,
.
1982, pp. ID7-ID13.
Key Words:
vulnerabilities,
347.
NYE-83 Key Words: OS, methods,
NES-83 Nesset,
D.M.
design.
"A Systematic Methodology for
Analyzing Security
NEW-86
.
Threats to Interprocessor
Newman,
Communications
R.L. Pickholtz
in a
Distributed System,"
IEEE
D.B., and
"Cryptography in the Private
IEEE
Key Words:
Trans, on Communications ,
Sector,"
September 1983.
Communications Magzine August 1986, pp. 7-10.
Key Words:
threats,
OBE-83 Oberman. M.R.
Key Words: Nestman, C.H., J. Windsor, and M.C. Hinson 'Tutorial on Telecommunications and Security," Computers & Security October 1984, pp. ,
vulnerabilities.
,
network.
NES-84
Nye. J.M. "Network Security and Vulnerability." Proc. 1983 Nad. Computer Conf. AFIPS Press. Reston VA. May 1983, pp. 647-653.
crypto, general.
NEW-87 Newman,
D.B.,
IFIP/Sec. '83
J.K.
Jr.,
"Some Security Aspects of a Computer Communications Network Environment." Proc.
Omura, and R.L. Pickholz
1983,
"Public Key Management for Network Security," IEEE Networks Magazine April
238.
,
(2:
.
Stockholm.
FAK-83), pp. 233-
Key Words: network, methods.
1987, pp. 11-16.
215-224.
ODE-85 Key Words:
Key Words:
techniques,
"An Approach to Multi-Level Secure Networks, Revision 1,"
network.
general.
NES-87 Nesset,
O'Dell, L.L.
crypto, keys,
NIE-89
D.M.
"Factors Affecting Distributed
System Security," IEEE Trans, on Software Engr.
,
February 1987, pp. 233-248.
Proc. 8th Natl.
Niemeyer, R. "Applying the TNI Certification and
Comp.
Sec.
Conf. (5: NCS-85). 1985, pp. 152-155. ,
to
System
Key Words: MLS, network,
Accreditation," Proc. 5th
Security Applicat. Conf.
,
(5:
design.
IEE-89c), 1989, pp. 248-252.
Key Words:
OKA-89
design, network.
Key Words: network, case.
criteria,
Okamoto. E.. and K. Tanaka "Key Distribution System Based on Identification Information." IEEE Journal on Selected Areas
Communication
.
May
1989,
pp. 481-485.
Key Words: design.
7-16
crypto, keys,
OMA-83
PRE-89
PIE-85
Omar, K.A.. and D.L. Wells, "Modified Architecture for the Sub-Key Model," Proc. 1983 IEEE Svmp. Sec. Privacy (5:IEE-83a), pp. 79-
&
.
86.
and DA. Rutkowski "Modular Design of Information Encipherment for
Press,
Computer Systems," Computers & Security
Systems September 1989, pp.
Pieprzyk,
J.P.,
I.
"Software Dase Encryption for Local Area Networks,"
Computer Networks and ISDN ,
187-192.
.
September 1985. pp. 211-218.
Key Words:
architecture,
Key Words:
keys.
crypto, design,
Key Words: Local Area Networks.
methods.
ORT-86
PRI-83
Orton, G.A., et
POL-84
al.
"VLSI Implementation of Public-Key Algorithms," Proc. Crypto '86 , Santa Barbara,
CA, 1986,
ODL-
(8:
87), pp. 277-301.
W.L. "Key Management
Price,
PoUak, R. "Micro-Mainframe
Communications Security in Distributed Network
ACM
Environment," Sec., & Control Rev. . October 1984, pp. A1-A6.
Audit.
Key Words:
public-key,
hardware.
Key Words: PC, network,
OZA-84
methods.
Ozarow, L.H., and A.D. Wyner "Wire-Tap Channel
11,"
Proc.
Eurocrypt '84 Paris, 1984, ,
BET-85), pp. 33-50.
(8:
Key Words:
threats,
methods.
RAM-89 Ramaswamy, R. "A Scheme for Providing Layer
in
on Transport
Open System
Power, J.M., and S.R. Wilbur "Authentication in an Heterogenous Environment,"
Intercormection Architectures,"
Proc. IFIP/Sec. '85
1989.
1985,
(2:
Dublin, GRI-85), pp. 117.
on Comp. ICCr89 May
Proc. Intemat. Conf.
&
Information.
,
Key Words: OSI, methods,
127.
PAI-86
design.
and M. Girault "The Security Processor CRIPT," Proc. inP/Sec. '86. Monte Carlo. 1986. (2: GRIPailles. J.-C.,
89), pp. 127-139.
Key Words:
authentication.
RAM-89a
POW-88
Ramaswamy,
Key Words:
techniques,
hardware.
Security Services in
System Using the TNI," Proc. 4th Aerosp.
Conf.
PAR-87 Parker,
.
(4:
Comp.
Sec.
Open
Systems Interconnection Architecture," Computers & Security October 1989, pp. ,
IEE-88b), 1988, pp.
507-516.
256-261.
TA.
"Seoirity in
Key Words: OSI, methods,
Open Systems:
Report on the Standards of ECMA's
Key Words:
trusted,
network,
TC32/rG9,"
Proc. 10th Natl.
Sec. Conf.
.
(5:
NCS-
87a), 1987, pp. 38-50.
Key Words: OSI, standards.
network,
design.
criteria.
RAM-89b
Work
Comp.
R.
"Placement of Data Integrity
Powanda, E.J.. and J.W. Genovese "Configuring a Trusted
A
Data
Key Words:
Security Ser/ices
POW-85
for
Encipherment," Proc. IFIP/Sec. _;83, Stockholm, 1983, (2: FAK-83), pp. 205-215.
Ramaswamy,
PRE-87
R.
"Security Architecture for Data
Presttun, K.
"Integrating Cryptography in
Transfer Through
ISDN," Proc. Crypto '87
Protocols,"
Santa Barbara, 1987,
POM-88).
,
(8:
pp. 9-18, 1988
Key Words:
crypto, network.
Security
,
&
December 1989, pp.
709-719.
Key Words:
network,
protocols, case.
7-17
TCPAP
Computers
RUT-86
RAS-85 Rasmussen, O.S. "Communications and
Network
SCH-82b
Rutiedge, L.S., and L.J.
"A Survey of
Protection: Practical
Issues in
Computer Network Security," Computers & Security December 1986, pp. 296-308.
Experience," Proc. IFIP/Sec.
GRI-
;85, Dublin. 1985. (2:
Schwartz,
Hoffman
pp. ID1-ID16.
.
85), pp. 107-115.
Key Words: network, methods, case.
Key Words:
RIH-83
SCH-84 Schaumueller-Bichl.
and E.
"Secure Computer Network Requirements," Information Age (U.K.), October 1988. pp. 211-222.
Republic of Germany." Information Age (UK). April
Key Words:
1983. pp. 91-96.
crypto,
network, general.
Satya, V.
Rihaczek. H.. and L. Krause "Data Encipherment Requirements Federal
Key Words: DES, methods.
SAT-88
I.,
Filler
"A Method of Software on the Use
Protection Based
of Smart Cards and Cryptographic Techniques." Proc. Eurocrypt '84 Paris. 1984. (8: BET-85). pp. 446.
requirements,
network.
Key Words:
M.
"DES: Putting It to Work," Computerworld. June 21, 1982,
454.
requirements,
SCA-87
crypto.
Key Words:
Schaumuller-Bici.
RIH-87 Rihaczek, K.
'IC-Cards in High-Security AppUcations." Proc. Eurocrypt
'TeleTrusT-OSIS and
'87 .
Amsterdam. 1987, (8: CHA-88a). pp. 177-189.
Communication Security," Computers & Security Jime
Key Words:
SCH-85 Schaefer. M.. and D.E. Bell
"Network Security Assurance," Nad. Comp. Sec. Conf. (5: NCS-85). 1985, pp. Proc. 8th
,
1987, pp. 206-218.
crypto, software,
methods, techniques.
I.
crypto, hardware.
,
64-69.
SCH-80
Key Words: OSI, methods, case.
RrV-80
Scharf. J.D., C.V. Wallentine.
Key Words:
and P.S. Fisher "Department of Defense
network.
Rivest, R.L.
Network Security
"A
Considerations," in Rullo,
Description of Single-
SCH-85a
Chip Implementation of RSA Cipher." Lambda, Fourth
T.A. (Ed.), Advances in
Quarter, 1980, pp. 14-18.
Vol.
Key Words: RSA,
Computer Sec. Management. 1 Heyden, Philadelphia, PA. 1980, pp. 202-230. ,
crypto,
Key Words: network,
hardware.
verification,
Schnackenberg. D.D. "Development of a Multilevel Secure Local Area Network,"
Nad. Comp. Sec.
Proc. 8th
Conf. . (5: NCS-85), 1985, pp. 97-104.
design,
Key Words: MLS, LAN.
case.
RIV-84
design, case.
SCH-82
Rivest, R.L.
"RSA Chips
Schanning, B.P.
(Past/Present/Future)," Proc.
"Applying PubUc Key Distribution to Local Area Networks," Computers &
Eurocrypt '84, Paris, 1984, (8: BET-85). pp. 159-165.
Security
Key Words: ESA.
,
SCH-87
November
1982, pp.
268-274.
crypto,
Schnackenberg. D. "Applying the Orange Book to an MLS LAN," Proc. 10th
Nad. Comp. Sec. Conf.. (5: NCS-87a), 1987, pp. 51-55.
hardware.
Key Words: LAN,
ROG-87
crypto,
keys.
Key Words: MLS, LAN, criteria.
Rogers, H.L.
SCH-82a
"An Overview of the Caneware Program," Proc. 10th Natl. (5:
Comp.
Sec. Conf.
Schwartz. .
NCS-87a), 1987, pp. 172-
174.
Key Words: case.
crypto, design,
SCH-87a
M.
Schweitzer, J.A.
"Making Sense of DES," Computerworld, June 7. 1982,
"Securing Information on a Network of Computers,"
pp. ID15-ID34.
EDPACS
Key Words: DES, general.
7-18
crypto,
.
July 1987, pp. 1-8.
Key Words: network, methods.
"
SCH-87b
SER-84
SHA-89
Schockley. W.R.. R.R.
Serpell, S.C., C.B.
and M.F. Thompson "A Network of Trusted Systems," AIAA No. 873100, Proc. 3d Aerosp.
and B.L. Clark "A Prototype System Using Public Key," Proc. Crypto '84, Santa Barbara, CA, 1984. (8: BLA-84a), pp. 3-9.
Schell,
Comp.
Sec. Conf.
,
(5:IEE-
Brookson,
Key Words: trusted,
crypto, public-
Computers
Transfer,"
Security
May
,
&
1989, pp. 209-
221.
network,
case.
key, case.
SHE-87
case.
SER-84a
SCH-89
Sheehan, E.R. "Access Control within
and C.B. Brookson "Encryption and Key Serpell, S.C.,
SchnoiT,
CP.
"Efficient Identification and
Signatures for Smart Cards," Proc. Crypto '89 Santa ,
Barbara,
CA,
(8:
BRA-90),
1989.
Key Words:
authentication,
Management
SDNS," Proc. 10th Comp. Sec. Conf. .
ECS
for the
SCO-85
,
Key Words:
(8:
crypto, network,
"Wide-Open Encryption
"Cryptographic Equipment
Design Offers Flexible Implementations
Security:
Cryptologia, January 1985, pp. 75-90.
A
Computers
Code of
&
March
crypto, hardware.
SHA-86
SEA-85 Seaman,
.
encryption,
design.
J.
Network Intruders," Computer Decisions January "Halting
,
Sharma, R.S. "Data Communications and Security," ACM Sec.. Audit & Control Rev. Winter 1986.
G.J. (Ed.)
Secure Communications and Asymmetric Cryptosystems Westview Press, Boulder, CO, 1982.
Key Words: book, crypto, methods, public-key. SIM-83 Simmons,
G.J.
Using the
Protocol
RSA
Cryptoalgorithm." Cryptologia, 1983, pp. 180-182.
.
Key Words: RSA,
pp. 28-38.
crypto,
protocol.
Key Words: methods, threats,
general.
SIM-84 Simmons, G.J. "A System for Verifying User
network,
SHA-88
techniques.
Shain,
SED-87
M.
"Security in Electronic Funds Transfer." Proc. mP/Sec. '88 .
Sedlak, H.
RSA
SIM-82 Simmons,
"A 'Weak' Privacy
29, 1985, pp. 82ff.
Key Words:
control,
Practice."
Security
1985, pp. 47-64.
Key Words: Key Words:
Key Words: network, case.
,
Serpell, S,C,
,
NCS-
Satellite Service," Proc.
Eurocrypt '84 Paris, 1984, BET-85), pp. 426-436.
SER-85
Scott, R.
Natl. (5:
87a). 1987, pp. 165-171.
keys.
case.
"The
M.
"Security in Electronic Funds
Key Words: methods,
87b), 1987. pp. 140-142.
Key Words: network,
Shain,
Cryptography
Processor," Proc. Eurocrypt '87 Amsterdam, 1987, (8:
AustraUa, 1989,
(2:
CAE-89),
pp. 367-380.
Identity
and Authorization
at
the Point-of-Sale or Access,"
Cryptologia January 1984, pp. ,
1-21.
,
CHA-88a), pp. 95-105.
Key Words: RSA,
Key Words: methods,
Key Words:
network, case.
case.
authentication,
crypto,
SIM-85 Simmons,
hardware.
G.J.
"The Practice of Authentication," Proc. Eurocrypt '85 Linz. 1985. (8: .
PIC-86). pp. 261-272.
Key Words: methods.
7-19
authentication,
SIM-87 Simmons, G.J. "Message Authentication with
SOR-84
SMI-88a Smid, M., et
Message Authentication Code
Buchanan "Measurment of Cryptographic
(MAC)
Capability Protection
Sorkin.A., and J.C.
al.
Receiver Disputes," Proc. EurocTVpt '87 Amsterdam, 1987. (8: CHA-88a), pp. 151-
Validation System: Requirements and Procedures SP 500-156, National Institute of Standards and Technology,
165.
Gaithersburg,
Arbitration of Transmitter/
,
.
MD, May
116.
1988.
Key Words: Key Words:
authentication.
Key Words:
&
Algorithms," Computers Security . May 1984. pp. 101-
authentication,
crypto, design,
methods.
design, methods, requirements.
SIM -88
STO-89 SMI-89
Simmons, G.J.
"A Survey of Information Authentication," Proceedings
of the IEEE 603-620.
Key Words:
,
May
1988, pp.
authentication.
Smid, M., J. Dray, and R. Wamar "A Token Based Access Control System for Computer Networks," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS89) 1989. pp. 232-253. .
Stonebumer, G.R., and D.A. Snow "The Boeing MLS LAN: Headed Towards an INFOSEC Security Solution," Proc. 12th Natl.
Comp.
Sec. Conf.. (5:
NCS-89), 1989. pp. 254-266.
,
SIM-88a Simmons,
Key Words: MLS, LAN, Key Words: network,
G.J.
"How to Insure that Data Acquired to Verify Treaty Compliance Are IEEE May ,
TAT-87 SMI-89a
1988, pp.
Tater, G.L.
Smith, J.M. "Practical
Problems with a
Cryptographic Protection
621-627.
Santa Barbara,
verification,
90)
crypto.
,
CA,
,
BRA-
(8:
'The Secure Data Network System: An Overview:, Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 150,
Scheme," Proc. Crypto '89
Key Words:
design, case.
case.
Trustworthy," Proceedings of the
control,
152.
1989.
Key Words: Key Words:
SMI-81 Smid, M.E.
crypto, design,
methods.
TAT-89
"Integrating the Data
Encryption Standard into Computer Networks," IEEE Trans, on Communications
,
SNA-88
Tatebayashi, M., N.Matsuzaki.
Snare,
and D.B.
J.
"Secure Electronic Data
Exchange," Proc. iHF/Sec.
June 1981, pp. 762-772.
Key Words: DES, network,
J8,
Australia, 1989, (2:
CAE-
Newman
"Key Distribution Protocol for Digital Mobile Communication System," Proc. Crypto '89 , Santa Barbara, CA,
89), pp. 331-342.
(8:
BRA-
90). 1989.
design.
Key Words: network,
case.
Key Words:
SMI-87 Smidi, M.K. "A Verified Encrypted Packet Interface,"
network, design,
case.
ACM
Software
Engr. Notes , July 1987.
Key Words:
SOR-83 Sorkin, A.
"Requirements for A Secure Terminal Switch," Computers
&
crypto, design,
Security ,
November
1983,
pp. 268-274.
Key Words:
requirements,
Tener, w.T.
An Expert System Communications Data
"Discovery:
Security Environment," Proc. '86 Monte Carlo,
mP/Sec. 1986,
case.
Smid, M.E., and D.K. Branstad "The Data Encryption Standard: Past and Future," Proceedings of the IEEE May 1988, pp. 550-559.
(2:
.
GRI-89).
Key Words: case.
,
Key Words: DES,
TEN-86
in the
case.
SMI-88
crypto, protocols,
key.
crypto,
general.
7-20
general, network,
TUR-80 Tum,
TOP-84 Toppen, R.
The
"IrLBnite Confidence:
"AppUcations of Cryptography," in Rullo, T.A.
Audit of Communication Networks," Computers & Security .
November
VOY-83 R.
(Ed.),
1984, pp.
Advances in Computer Management, Vol. 1
Security
&
Heyden
303-313.
.
,
June 1983. pp. 135-171.
Son, Philadelphia,
Key Words: methods,
PA, 1980, pp. 170-200.
Key Words:
Voydock, V.. and S.T. Kent "Security for Computer Communication Networks," ACM Computing Surveys
general.
auditing,
Key Words:
network.
crypto, general.
Voydock, V.L.. and S.T. Kent
VAN-85
TOR-85 Torrieri, D.J.
Vandewalle,
Principles of Sectire
"Implemerttation Study of
J.
et
"Security
al.
Public
MA,
Electronic Mail and
&
Computers
in a
Security
.
December 1985. pp. 325-341.
Protection in an Existing
1985.
Mechanisms
Transport Layer Protocol,"
Key Cryptographic
Communication Systems Artech House, Norwood,
,
VOY-85
Document
Key Words: book, methods,
Handling System," Proc. EurocTVpt '85 Linz. 1985,
general.
PIC-86), pp. 4349.
.
Key Words: methods, (8:
protocols.
VOY-85a Key Words: EM.
TRO-85 Troy, E.F. "Dial-Up Security Update," Proc.
8lJi
Natl.
Comp.
cerypto,
public key.
VAN-87
Sec.
Conf. (5: NCS-85), 1985, pp. 124-132.
van Heurck,
Key Words: PC, methods,
Transfers,"
hardware.
Security , June 1987, pp. 261268.
,
P.
'TRASEC: Belgian System
Security
&
Computers
Key Words: network, protocols.
WAL-85 Key Words: network,
Troy, E.F. Security for Dial-Up Lines
Walker, S.T.
"Network Security Overview," IEEE Symp. Sec. 6. Privacy (5:IEE-85), pp. 62-
methods, case.
,
Proc. 1985
National Bureau
VAN-88
of Standards, Gaithersburg, 1986.
MD, May
.
van der Bank. D.. and E. Anderssen
76.
Key Words: PC, methods,
"Cryptographic Figiire of
Key Words: network,
hardware.
Merit," Computers
&
June 1988. pp. 299-303.
WAL-89 Walker, S.T.
Key Words:
Tsudik, G.
"Datagaram Authentication Internet Gateways:
in
Implications of Fragmentation
and Dynamic Routing," IEEE Journal on Selected Areas
Communication
,
May
1989,
crypto, design,
"Network Security: The
Parts
of the Sum," Proc. 1989 IEEE Symp. Sec. & Privacy (5:IEE-
methods.
,
VAR-89
89b), pp. 2-9.
Varadharajan, V. "Verification of
Network
Key Words: network,
general.
Security Protocols."
Computers
pp. 499-504.
&
Security
December 1989. case.
general.
Security ,
TSU-89
Key Words:
,
July 1985, pp. 12-24.
Funds
for Electronic
TRO-86 SP 500-137,
Voydock, V.L.. and 5. T. Kent "Security in Kigh-Level Network Protocols." IEEE Communications Magazine
.
pp. 693-708.
WIL-80 WiUiams, H.C.
"A Modification of
authentication,
Key Words:
verification,
the
RSA
Public -Key Cryptosystem,"
IEEE Trans, on Inform. Theory November 1980, pp.
protocols.
,
726-729.
Key Words: RSA, design.
7-21
crypto,
WOO-89
WOO-81
WIT-88 Witten. I.H. and J.G. Cleary
Wood, C.C.
"On the Privacy Afforded by Ad^tive Text Compression,"
"Future Applications of
"Planning:
Cryptography," Proc. 1981
Achieve Data Communications Security." Computers &
Computers & Security August 1988, pp. 397-408.
Wood, C.C.
IEEE Symp.
,
Sec.
&
Privacy.
(5:IEE-81), pp. 70-74.
Security .
A
Means
May
to
1989. pp. 189-
199.
Key Words: methods,
case,
Key Words:
crypto, general.
Key Words: methods,
techniques.
WOO-82
WON-85
WOO-89a
Wood, C.C.
Wong, R.M., T.A.Berson,
"Future Applications of
and R.J. Feiertag
Cryptography." Computers Security . January 1982, pp. 65-71.
"Polonius:
An
Identity
Authentication System," Proc.
1985 IEEE Svmp. Sec.
&
&
Woodfield, N.K.
"An Approach
for Evaluating
the Security of an Air Force
Type Network."
Proc. 5th Sec.
Applicat Conf.. (5:IEE-89c).
.
Privacy . (5:IEE-85). pp. 101-
design.
Key Words:
crypto, general.
1989. pp. 53-62.
107.
WOO-83 Key Words:
authentication,
Key Words: network, methods,
Wood, H.M., and
case.
I.W. Cotton
case.
"Security in
WON-89
Computer
Commtmications," in
W. Chou
Wong, R.M.
(Ed.),
"Logon
Communications, Vol.
in Distributed
Computer 1,
Englewood
Systems," Digest of Papers,
Prentice-Hall,
IEEE Compcon
CUffs, NJ. 1983, pp. 369-409.
'89
.
1989,
pp. 338-341.
Key Words: methods,
Key Words: methods, network.
7-22
general.
8.
Cryptography
This section cites publications on the theoretical and practical aspects of cryptography, cryptanalysis, and cryptographic protocols. ADL-83
ACE-81 "American Council of Education Report on the Public Cryptography Study Group," Communications of
ACM
the
.
July 1981, pp,
435-450.
AKL-82
Adleman, L.M.
Akl. S.G.
"On Breaking Generalized
"Digital Signatures with
Knap-sack Public-key
Blindfolded Arbitrators
Cryptosystems," Proceedings.
Cannot Form Alliances." Proc. 1982 IEEE Svmp. Sec, and
15th ACM Symposium on Theory of Computing 1983, ,
pp. 402-412.
Key Words:
Adams,
CM. Comments
Regarding McEUece's Public Key Cryptosystem," Proc. Crypto '87 Santa ,
CA, 1987.
(8:
POM-
88), pp. 224-228.
Key Words:
analysis,
Key Words:
signatures.
methods.
kiiapsack.
"Seairity-Related
Barbara,
IEE-82). pp. 129-
(5:
135.
policy, research.
Key Words:
ADA-87
Privacy .
Who
AGN-87
AKL-83
Agnew, G.B. "Random Sources
Akl, S.G. for
"On
the Security of
Cryptographic Systems," Proc.
Compressed Encodings," Proc.
Etirocrypt '87 ,
Crypto '83 Santa Barbara.
1987.
CA, 1983.
(8:
Amsterdam, CHA-88a), pp. 77-
.
(8:
81.
209-230.
Key Words: random,
Key Words:
CHA-84b). pp.
evaluation,
public-key.
analysis, codes.
techniques.
AKL-83a
ADL-82
AGN-88
Adleman, L.M.,
"On Breaking
the Iterated
Merkle-Hellman Pubhc-Key Cryptosystem," Proc. Crypto '82
.
Santa Barbara, CA,
Akl, S.G.
Agnew. G.B.. R.C. Mullin,
"Digital Signatures: Tutorial
and S.A. Vanstone "An Interacrtive Data
Survey,"
Discrete Exponentionation." Proc. Eurocrypt '88 . Davos,
Key Words:
1988. 176.
(8:
GUN-89).
pp. 159-
Key Words: methods,
ADL-82a
protocols.
Adleman, L.M. "Implementing an Electronic Notary Public," Proc. Crypto ,
Santa Barbara,
CA,
1982, (8: CHA-83b), pp. 259-265.
Key Words: design.
Key Words:
signatures.
general.
AKL-84 Akl, S.G., and H. Meijer
knapsack.
'82
,
Exchange Protocol Based on
1982, (8: CHA-83b), pp. 303-313. analysis,
IEEE Computer
February 1983, pp. 14-24.
Fast Pseudo Random Permu-tation Generator with
"A
Applica-tions to
AHI-87 Ahituv, N., Y. Lapid,
and
S.
Neumann
Cryptography," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 269-275. ,
"Processing Encrypted Data,"
Communications of the ACM. September 1987. pp. 777-780.
Key Words: random, techniques.
signatures,
Key Words:
techniques.
ALP-83 Alpem, B., and B. Schneider "Key Exchange Using 'Keyless Cryptography'," Information Processing Letters
,
1983, pp.
79-81.
Key Words:
8-1
keys, techniques.
BEN-84
BAL-85
AMI-81 Amirazizi, H.R., E.D. Kamin,
and J.M. Reyneri
"Compact Knapsacks
are
Polyno-mially Solvable," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER82). pp. 17-24.
Baldwin, R.W.. and W.C. Gramlich "Cryptographic Protocol for Trustable Match Making," Proc. 1985 IEEE Symp. Sec, and Privacy (5: IEE-85), pp. 92-100.
Bennet, C.H., and G. Brassard
"Update on Quantum Cryptography," Proc. Crypto '84 Santa Barbara, CA, 1984. (8: BLA-84a). pp. 475-480. ,
,
Key Words:
techniques,
methods.
Key Words:
Key Words:
analysis,
AND-82
BEN-85 Bennet, C.H.. G. Brassard, and J.-M. Robert
BAN-83
Andelman,
"On
protocols,
methods.
knapsack.
D.,
and
Reeds
J.
the Cryptanalysis of
Rotor Machines and Substitution-Permutation
"How to Reduce Your Enemy's Information,"
Banary, I., and Z. Furedi "Mental Poker with Three or More Players." Information and Control 1983. pp. 84-93.
Crypto '85
CA,
.
Networks," IEEE Trans, on Inform. Theory No. 4, 1982, pp. 578-584. ,
Key Words:
Key Words:
IEEE
J.
Wiley
theory.
BEN-86 Benaloh, J.C. "Cryptographic Capsules:
Protection of Communications
Safeguarding,"
WIL-86), pp.
Key Words: methods,
Cipher Systems: The
Asmuth, C, and J. Blum "A Modular Approach to Key
(8:
protocols,
methods.
Beker, H., and F. Piper
ASM-83
Proc.
Santa Barbara,
468-476.
BEK-82
analysis,
hardware.
1985,
,
&
New
Sons,
York,
1982.
,
Interactive Protocols," Proc. Crypto '86 , Santa Barbara,
CA.
Trans,
on Inform. Theory, March
Key Words:
1983. pp. 208-210.
methods, general.
book, techniques,
A
Disjunctive Primitive for
1986. 213-222.
(8:
ODL-87). pp.
Key Words: methods, Key Words: methods,
keys.
BEL-89
protocols.
Bellare, M., and
AVA-88
S.
Avame,
S.
"Cryptography — Combatting Data Compromise." Security Management October 1988.
Barbara,
pp. 38-43.
1989.
,
BEN-86a
Goldwasser
"New Paradigms
for Digital
Signatures for Smart Cards," Proc. Crypto '89 Santa ,
CA,
BRA-90),
(8:
Benaloh. J.C. "Secret Sharing
Homomorphisms: Keeping Shares of a Secret Secret," Proc. Crypto '86
Barbara.
Key Words:
threats,
methods.
Key Words:
.
Santa
CA, 1986.
(8:
ODL-
87). pp. 251-260.
signatures,
methods.
AYO-83
Key Words: methods,
Ayoub, F. 'The Design of Complete Encryption Packages Using
BEN-82
protocols.
Bennett, C.H., et
al.
Cryptographically Equivalent
"Quantum Cryptography, or Unforgeable Subway Tokens."
Permutations," Computers
Proc. Crypto '82
Security
,
November 1983,
&
pp.
261-267.
Key Words: methods,
design.
CA,
.
BEN-87 Bennett.
J.
"Analysis of the Encryption
Santa
CHA-
83b), pp. 267-275.
Algorithm Used in the WordPerfect Word Processing Program." Cryptologia, October
Key Words:
1987. pp. 206-210.
Barbara,
1982, (8:
authentication,
case.
Key Words: methods,
8-2
case.
BEN-89
BET-86
Bender, A., and G. Castagnoli "On the Implementation of
Curve
Elliptic
Cryptosystems," Proc. Crypto •89 .
SanU
CA,
Barbara,
(8:
BRA-90). 1989. theory.
al.
Blakely. G.R.. and
(Eds.)
Advances in Cryptology
D.L.
.
Chaum
(Eds.)
Proceedings. Eurocrypt '85 .
Advances
Linz, Austria, April 1985,
Crypto '84 Santa Barbara. CA. August 1984. Lect. Notes
New
Key Words:
in Cryptology: ,
Lecture Notes in Computer Science, Vol. 209 SpringerVeriag,
Key Words: methods,
BLA-84
Beth, T., et
York, 1986
in
Comp.
Sci.,
No. 196,
Springer- Veriag. Berlin, 1984.
Key Words:
proceedings,
general.
proceedings,
general.
BER-84 Berger, R., et
"A
BET-88
al.
Provjdjly Secure
Oblivious Transfer Protocol," Proc. Eurocrypt '84
1984.
Paris,
,
BET-85). pp. 379-
(8:
BLA-84a
Beth, T.
Blakely, G.R., and
Zero-Knowledge Identication Scheme for Smart
C.
Cards," Proc. Eurocrypt '88 .
Proc. Crypto '84
"Efficient
Davos. 1988.
386.
(8:
GUN-89).
Barbara,
Ramp
CA,
,
Schemes," Santa
1984, (8:
BLA-
84a), pp. 242-268.
pp. 77-84.
Key Words:
Meadows
"Security of
oblivious,
Key Words:
protocols.
authentication,
Key Words:
analysis, methods.
zeto.
BLA-84b
BER-85 Berger, R.. et
BEU-87
al.
"A Framework
for the
Study
of Cryptographic Protocols." Proc. Crypto '85 Santa ,
Barbara,
CA,
1985,
(8:
WIL-
"Information Theory Without
"Perfect and Essentially
the Finiteness Assumption,
Perfect Authentication
Cryptosystems as Group-
Schemes." Proc. Eurocrypt
Theoretic Objects," Proc. Crypto '84 Santa Barbara,
'87 .
Amsterdam. 1987. (8: CHA-88a). pp. 167-170.
86), pp. 87-103.
Key Words: model,
Blakely, G.R.
Beutelspacher. A.
,
CA, 1984,
(8:
BLA-84a), pp.
314-338.
protocols.
Key Words: BET-82
I:
authentication,
Key Words:
methods.
analysis, theory.
Beth, T., and T. loth
"Algorithm Engineering for Key Algorithms," Proc. 1982 IEEE Symp. Sec. Public
&
Priv.
.
(5:
IEE-82), pp.
458-466.
BLA-85
BLA-80
Blakely. G.R.
Blakely, G.R.
"One Time Pads Are Key Safeguarding Schemes. Not Cryptosystems." Proc. 1980 IEEE Symp. Sec. & Priv. (5: .
Key Words:
algorithms,
IEE-80). pp. 108-113.
design.
Key Words: methods,
"Information Theory Without the Finiteness Assumption.
,
keys.
Key Words: DES.
BET-83
BLA-80a
Beth, T. (Ed.)
Blakely, G.R.
1982 Lecture Notes
Keys," Proc. 1980
in
analysis,
theory.
Cryptography, Proceedings, Burg Feuerstein Conference ,
11:
Unfolding the DES." Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86). pp. 282-337.
"Safeguarding Cryptographic
&
IEEE
Computer Science, Springer
Symp. Sec.
Veriag, Berlin, 1983.
80), pp. 108-113.
Key Words:
Key Words: methods,
Priv. . (5:
BLA-85a Blakely. G.R.. C.
IEE-
Meadows,
and G.B. Purdy "Fingerprinting Long Forgiving Messages," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86). pp. 180-189. ,
proceedings,
general.
keys,
Key Words: methods,
8-3
theory.
BLU-83
BLA-86 R.D. Dixon
Blum. M. "How to Exchange
"Smallest Possible Message
Keys."
Expansion in Threshold Schemes," Proc. Crypto '86
Computer Systems
Blakely, G.R., and
Santa Barbara,
CA,
1986.
ACM
Trans, .
BRA-83 Brassard, G. (Secret)
on
May
1983.
pp. 175-193.
.
"A Note on
the Complexity of
Cryptography,"
IEEE Trans, on November
Informat. Theory
.
1983. pp. 232-233.
(8:
Key Words:
ODL-87), pp. 266-274.
protocols, keys.
Key Words:
complexity,
theory.
Key Words: methods,
BLU-84
theory.
Blum. M.. and S. Micali "How to Gen^ate
BLA-87
BRA-83a Brassard, G.
Blakely, G.R., and
Cryptographically Strong
"Relativized Cryptography,"
W.
Sequences of Pseudo-Random
IEEE
Rundell "Cryptosystems Based on an Analog of Heat Flow," Proc. Crypto '87 , Santa Barbara,
CA,
1987, (8:
Bits."
SIAM
Joumal of
.
Computation. November 1984.
Key Words: mathods. random.
POM-88), pp.
Trans, on Inform. Theory 1983, pp. 877-894.
Key Words: methods,
general.
BRA-86
306-329
BLU-84a
Brassard, G., and C. Crepeau
Key Words: models,
Blum. M.. and
methods.
"An
S.
Goldwasser
Efficient Probabiliastic
"Non-Transitive Transfer of
A
Confidence:
Perfect Zero-
Public-Key Encryption Scheme which Hides All
Knowledge
Blom, R.
Partial Infromation," Proc.
Proceedings, 27th
"Non-Public-key Distribution," Fhroc. Crypto '82 . Santa Barbara, CA,
Crypto '84 Santa Barbara, CA. 1984. (8: BLA-84a). pp. 289-299.
Annual Symposium on the Fotmdations of Computer
1982, (8: CHA-83b). pp. 231-236.
Key Words:
Key Words:
BLO-82
Key Words:
for
.
algorithm, zero.
BOO-85
keys,
BLO-84
Protocols," Proc. Eurocrypt
Blom. R. "An Upper Bound on the
J5,
Inform. Theory 82-84.
.
Linz, 1985. (8: PIC-86).
pp. 254-260.
Key Equivocation for Piffe Ciphers." IEEE Trans, on
Key Words:
Blom, R. "An Optimal Class of Symmetric Key Generation Paris. 1984. (8:
Joumal of Computer and System Science 1981, pp.
Registration in Databases." Proc. Eurocrypt '88 Davos.
280-311.
1988.
Key Words: methods,
P.
.
(8:
GUN-89).
Key Words:
pp. 167-
authentication,
methods, theory.
Brassard, G.
keys, theory.
"On Computationally Secure
Blum. M.
protocols, case.
and
design.
BRA-82
BLU-82
Key Words:
theory.
76.
BET-
"Coin Flipping by Telephone." Proc. IEEE Spring Computer Conference 1982. pp. 133-137.
,
Relativized Cryptography."
,
85). pp. 335-338.
Key Words:
and J.-M. Robert "All-Or-Nothing Disclosure of Secrets," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87). pp. 234-238.
J., I.B. Damgard, Landrock "Anonymous and Verifiable
in
Systems," Proc. Eurocrypt
J4.
Brassard. G., C. Crepeau,
Brandt,
"A Time-Luck Tradeoff
BLO-84a
protocols, zero.
BRA-88
Brassard. G.
theory.
Science . 1986. pp. 188-195.
Key Words: methods,
BRA-81
Key Words: methods,
IEEE
verification,
protocols.
1984, pp.
and Beyond,"
BRA-86a
Book. R.V., and F. Otto 'The Verifiability of Two-Part
management.
SAT
Interactive Protocol
Brassard, G.
Short Shared Keys," Proc. Crypto '82 Santa Barbara,
Tutorial . Lecture Notes in
CA,
Computer Science No. 325.
.
.
BRA-88a
Authentication Tags Requiring
1982, (8: CHA-83b), pp. 79-85.
Modem
Cryptology:
Springer- Verlag.
A
New
York.
NY. 1988 Key Words:
authentication,
Key Words: book,
keys.
8-4
general.
BRA-90
BRI-84
BRI-87b
Brassard, G.
Brickell, E.F.
BrickeU. E.F., P.J. Lee,
Advances
"A Few
and Y. Yacobi
in Cryptology.
Results in Message
Proceedings of Crypto-89 Santa Barbara, CA, August
Authentication" Congress
"Secure Audio
Numerantium December
Teleconference," Proc. Crypto
1989, Lecture Notes in
1984. pp. 141-154.
,
,
'87 . Santa Barbara,
Computer Science, Springer
(8:
Key Words:
Verlag, Berlin, 1990.
Key Words:
proceedings,
BRI-84a BRI-88
BrickeU, E.F. "Breaking Iterated
BRI-82 BrickeU, E.F. Fast Modular
Multiplication Algorithm with
Application to
BrickeU, E.F., and
Knapsacks," Proc. Crypto '84 , Santa Barbara, CA, 1984, (8: BLA-84a), pp. 342-358.
Two-Key Key Words:
Cryptography," Proc. Crypto '82 Santa Barbara, CA, 1982. (8: CHA-83b), pp. 51-
analysis,
A.M. Odlyzko
"Cryptanalysis: A Survey of Recent Results," Proceedings of the IEEE. May 1988, pp. 578-593.
knapsack.
.
Key Words:
analysis, methods.
BRI-85
60.
Brickell, E.F.,
Key Words: RSA,
techniques.
BRI-82a Brickell. E.F.. J.A. Davis,
and G.J. Simmons "A Preliminary Report on the Cryptanalysis of MerkleHellman Knapsack Cryptosystems," Proc. Crypto '82 Santa Barbara, CA,
BRI-88a
and
J.M. DeLaurentis
BrickeU, E.F., and
"An Attack on a Signature Scheme Proposed by Okamoto
D.R. Stinson
and Shiraishi," Proc. Crypto '85 Santa Barbara, CA, 1985. (8: WIL-86). pp. 28-32.
Multiple Arbitrers," Proc.
.
1982,
Key Words:
signatures.
analysis,
knapsack.
BRI-89 BrickeU, E.F., and
Purtill
"Structure in the S-Boxes of the DES," Proc. Crypto '86 ,
D.M. Davenport "On the Classification of
Santa Barbara, CA. 1986,
Secret Sharing Systems," Proc. Crypto '89 Santa Barbara,
(8:
ODL-87), pp. 3-32.
BRI-83
Low
Key Words: DES,
Density
Key Words: methods,
BUC-82
BrickeU, e.F.
Key Words:
"On Privacy Homomorphisms,"
and
Key Words: methods,
Simmons Status Report
theory.
on
Knapsack Based Public-key
BRI-87a
Cryptosystems," Congressus
BrickeU, E.F.. et
Numerantium Vol.
"Gradual and Verifiable Release of a Secret," Proc. Crypto '87 Santa Barbara,
.
37, 1983,
pp. 3-72.
al.
,
Key Words: knapsack.
analysis,
CA,
1987. 156-166.
Buck. R.C. 'The Public Cryptography Study Group," Computers Security
,
November
&
1982, pp.
249-254.
125.
Brickell, E.F.,
G.J.
Proc.
Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 117-
BRI-83a
theory.
BRI-87
CHA-84b), pp. 25-38.
knapsack.
BRA-90), 1989.
(8:
analysis.
,
analysis,
Ideal
,
CA,
Brickell.E.F.
Knapsacks" Proc. Crypto '83 Santa Barbara, CA, 1983. (8:
authentication,
codes.
and M.R.
"Solving
,
analysis,
BrickeU, E.F., J.H. Moore,
289-301.
Key Words:
Eurocrypt '87 Amsterdam. 1987. (8: CHA-88a), pp. 51-
BRI-86
CHA-83b), pp.
(8:
"Authentication Codes with
55.
Key Words:
.
"A
techniques,
design.
general.
"A
1987.
authentication,
methods, theory.
Key Words:
CA.
POM-88). pp. 418-426.
(8:
Key Words:
POM-88),
verification,
methods.
8-5
pp.
Key Words:
policy, research.
CAR-88
BUC-88 Buchmann, J., and H.C. WUliams "A Key-Exchange System Based on Imaginary Quadratic Fields," Journal of Cryptology Vol. 1, No. 2, 1988, pp. 107-118. .
CHA-85
DES
"Cryptanalysis of
"Using Binary Derivatives to Test an Enhancement of DES," Cryptologia, October 1988, pp. 193-208.
Reduced Number of Rounds
with a
Sequences of Linear Factors in Block Ciphers," Proc. Crypto '85 (8:
Santa Barbara, CA, 1985,
,
WIL-86), pp. 192-211.
evaluation.
Key Words: DES,
keys,
CHA-81
theory.
D., and J.-H. Evertse
L.E. Robbins
Key Words: DES, Key Words: methods,
Chaum,
and
Carroll, J.M.,
analysis,
design.
Chaum, D.L.
BUC-89 Buchmann, H.C.
J.A.,
and
WUUams
"A Key Exchange System Based on Real Quadratic Crypto '89
Fields," Proc.
Santa Barbara,
CA,
(8:
BRA-
keys,
Chaum, D. "Security Without Identification: Transaction
System
Make Big
to
Brother
ACM
Key Words: methods,
the
protocols.
1030-1044.
CHA-82
October 1985, pp.
,
Key Words:
techniques, theory.
Chaum, D.
theory.
CHA-86
"Blind Signatures for
CAD-86
Untraceable Payments," Proc.
Cade, J.J. Broken "A Modification of Public-Key Cipher," Proc. Crypto '86 , Santa Barbara,
Crypto '82 Santa Barbara,
CA,
Key Words:
A
1986, 64-83.
CHA-85a
Obsolete," Communications of
.
90), 1989.
Key Words: methods,
"Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, February 1981, pp. 84-88.
(8:
ODL-87), pp.
,
CA, 1982,
(8:
CHA-83b), pp.
199-203.
Chaum, D., and J.-H. Evertse "A Secure and PrivacyProtecting Protocol for Transmitting Personal
Infromation Between Organizations," Proc. Crypto '86 , Santa Barbara, CA, 1986,
signatures,
theory.
(8:
Key Words: methods,
design.
Chaum,
CAR-86 and "The Automated
Carroll, J.M.,
S.
Martin
D., R.L. Rivest,
and
A.T. Sheridan (Eds.), Advances in Cryptology: Proc. of Crvpto-82 Santa Barbara, ,
Cryptanalysis of Substitution
CA, August
Ciphers," Cryptologia,
Press,
New
1982, Plenum
York, 1983.
Can Be
and L. Robbins
Any
(8:
ODL-87), pp.
195-199.
Chaum, D. (Ed.), Advances in Cryptology: of Crypto-83
Cryptanalysis of
CA, August
Polyalphabetic Ciphers,"
Press,
New
.
Proc.
Sata Barbara,
Key Words:
CHA-86b Chaum,
Key Words:
protocol, theory,
zero.
1983, Plenum
York, 1984.
Cryptologia, October 1987, pp. 193-205.
Satisfied
,
CA, 1986,
"The Automated
proceedings,
general.
Key Words:
Chaimi, D. "Demonstrating the a Public
Crypto '86 Santa Barbara,
general.
CHA-84 Carroll, J.M.,
CHA-86a
Infromation About How," Proc.
proceedings,
methods.
CAR-87
protocols, design.
Without Revealing
Key Words: analysis,
Key Words:
Predicate
October 1986, pp. 193-209.
Key Words:
ODL-87), pp. 118-167.
CHA-83
analysis,
methods.
D., et
al.
"Demonstrating Possession of a Discrete Logarithm Without Revealing It," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87), pp. 200-212. .
Key Words: zero.
8-6
protocol, theory,
CHA-88b
CHA-87 Chaum,
LB. Damgard, and J. Van de Graaf "Multiparty Computations Ensuring of Each Party's Input and Correctness of the Result," Proc. Crypto '87 D.,
.
Santa Barbara,
CA,
1987.
(8:
CHO-88
Chaum, D. "Elections with
Unconditionally Secret Ballots
and Disruption Equivalent to Breaking RSA," Proc. Eurocrypt '88 . Davos, 1988, (8:
GUN-89).
Chor, B., and R.L. Rivest "A Knapsack-Type Public-key Cryptosystem Based on Arithmetic in Finite Fields," IEEE Trans, on Inform.
Theory September 1988, pp. ,
pp. 177-182.
901-909.
POM-88),
Key Words: RSA.
Key Words:
Key Words: methods, knapsack, theory, public-key.
protocols.
protocols,
CHA-89
theory.
CHO-89
Chaum. D.
CHA-87a Chaum, D.
"Undeniable Signatues" Proc. Crypto '89 Santa Barbara,
Chor, B.. and E. Kushilevitz "Secret Sharing over Infinite
"Blinding for Unaticipated
CA,
Domains." Proc. Crypto '89
,
(8:
BRA-90), 1989.
Santa Barbara, CA, 1989,
Signatures," Proc. Eurocrypt '87 Amsterdam. 1987.
Key Words:
(CHA-88a). pp. 227-233.
methods.
,
BRA-90).
signatures,
Key Words: methods,
CU-84
Chaum, D.
methods.
Demonstrating Posession of a Discrete Logarithm and Some
"The Spymaster's DoubleAgent Problem: Multiparty Computations Secure Unconditionally from All Minorities and Cryptographically from Majorities," Proc. Crypto '89
Generalizations." Proc. Eurocrypt '87 , Amsterdam,
90), 1989.
1987, (CHA-88a). pp. 127141.
Key Words:
CHA-87b D.. J.-H. Evertse.
van de Graaf "An Improved Protocol
and
J.
Key Words:
for
CHA-88
Key Words:
:
.
BRA-
Chor, B. and R.L. Rivest
"A Knapsack Type
1985, pp. 372-382.
protocols, theory.
Public -key
54-65.
Key Words: methods, knapsack.
York, 1988. Chor. B.. et
proceedings,
al.
"Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," Proceedings, 26th IEEE
general.
CHA-88a Chaum, D. "The Dining Cryptographers Problem: Unconditional Sender and Receiver
Annual Symposium on the Foundations of Comp. Sci. , 1985. pp. 383-395.
Untraceability," Journal of
Cryptology Vol. ,
1,
No.
1988, pp. 65-75.
1,
COH-85 Cohen, J., and M. Fischer "A Robust and Verifiable Cryptographically Secure Election System," Proceedings, 26th IEEE Symposium on Foimdations of Computing
CHO-85 Key Words:
policy, research.
,
,
Amsterdam. April 1987, Lecture Notes in Computer Science No. 304, Springer-
New
(8:
.
603.
Cryptosystem Based on Arith metic in Finite Fields," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp.
Eurocrypt '87 Proceedings
Verlag,
Santa Barbara, CA,
"Government and Cryptography," Computer/Law Journal Winter 1984. pp. 573-
CHO-84
protocols,
theory.
Chaum. D.. and W.L. Price (Eds.) Advances in Cryptology
theory.
CHA-89a
'Cey Words: signatures,
Chaum.
,
(8:
Key Words:
protocols,
methods.
,
Key Words: methods, protocols.
COO-80 Cooper, R.H. "Linear Transformations in Galois Fields and Their AppUcations to Cryptography," Cryptologia, Vol. 4, 1980, pp. 184-188.
Key Words:
algorithms, theory.
COO-84 Cooper, R.H., W. Hyslop, and W. Patterson "An Application of the Chinese Remainder Theorem to Multiple-Key Encryption in Data Base Systems," Proc. MP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 553-556. ,
Key Words:
protocols,
theory.
Key Words: methods,
8-7
theory.
DAV-80
COP-84 Coppersmith, D. "Another Birthday Attack," Proc. Crypto '85 Santa .
Barbara,
CA,
1985, (8:
WIL-
86), pp. 14-17.
Key Words:
DAV-83a
Davies. D.W.. W.L. Price,
Davis, J.A., and
and GJ. Parkin "Evaluation of Public-key Privacy (U.K.). March 1980,
D.B. Holdridge "Factorization Using the Quadratic Sieve Algorithm," Proc. Crypto '83. Santa
pp. 138-154.
Barbara,
Cryptosystems." Information
CA,
(8:
CHA-84b),
1983, pp. 103-113.
analysis,
Key Words:
methods.
evaluation,
Key Words:
public-key.
COP-85
analysis,
techniques.
Coppersmith, D. "Cheating at Mental Poker," Proc. Crypto '85. Santa Barbara, CA. 1985, (8: WIL86). pp. 104-107.
DAV-80a DAV-83b
Davies, D.W., and D.A. Bell "Protection of Data by
Davio, M., et
Cryptography," Information
"Analytical Characteristics of the DES," Proc. Crypto '83
Privacy , (U.K.),
May
1980,
.
Santa Barbara, CA, 1983. CHA-84b). pp. 171-202.
pp. 106-125.
Key Words:
threats,
Key Words:
protocols.
al.,
techniques, case.
Key Words: DES,
DAV-82
COP-87 Coppersmith. D. "Cryptography," IBM Journal of Research and Development, March 1987, pp. 244-248.
D.W. "Some Regular
Davies.
DAV-84
Properties of
Data Encryption Standard Algorithm." Proc. Crypto '82 Santa Barbara, CA, 1982,
Davio, M., Y. Desmedt, and ,
(8:
CHA-83b), pp. 89-96.
(Juisquater
J.-J.
"Propagation Characteristics of the DES" Proc. Eurocrypt '84 .
Paris, 1984. (8:
Key Words: DES,
BET-85). pp.
62-73.
analysis.
Key Words: DES,
DAV-82a
COS-81
analysis,
methods.
Key Words: methods, general.
(8:
Costas, IP.
Davies, D.W., and
"The Hand-Held Calculator
G.I.P. Parkin
as a Cryptographic
Terminal," Cryptologia, April 1981, pp. 94-117.
'The Average Cycle Size of the Key Stream in Output Feedback Encipherment,"
Key Words: methods,
Barbara,
hardware.
83b), pp. 97-98.
analysis.
DAV-84a
Proc. Crypto '82, Santa
CA, 1982,
(8:
CHA-
Davis. J A., D.B. Holdridge.
and G.J. Simmons "Status Report on Factoring (At the Sandia Laboratories)." Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 183215.
CRE-85
Key Words: DES,
Crepeau, C. "A Secure Poker Protocol that
analysis.
Key Words: RSA,
Minimizes the Effect of
analysis,
methods.
DAV-82b Davida,
and Y.Yeh
G.I.,
Player Coalitions," Proc.
"Cryptographic Relational
Crypto '85
Algebra," Proc. 1982 IEEE Privacy (5: Symp. Sec.
DAV-87
IEE-82). 1982, pp. 111-116
Davida, G.I.. and G.G. Walter "A Public -key Analog Cryptosystem," Proc. Eurocrypt
Key Words: methods,
Key Words:
88a), pp. 144-147.
protocols.
theory.
CA.
1985, 73-86.
Santa Barbara,
,
(8:
WIL-86), pp.
&
,
'87.
Crepeau, C. "Equivalence Between Flavors of ObUvious
Davies,
Two
Santa Barbara,
CA.
1987. POM-88). pp. 350-354.
theory.
oblivious,
.
(8:
key.
D.W.
"Use of the 'Signature Token' to
Transfer." Proc. Crypto '87
Amsterdam. 1987. (CHA-
Key Words: methods,
DAV-83
CRE-87
Key Words:
algorithms,
Create a Negotiable
Document, Proc. Crypto '83
,
Santa Barbara, CA, (8: CHA84b), 1983. pp. 377-382.
Key Words:
signatuers.
methods.
8-8
public-
DAV-87a
DEM-83a
DEJ-86
Davida, G.I, and BJ. Matt "Arbitration in Tamper Proof
de Jonge, W., and D. Chaimi
Systems," Proc. Crypto '87. Santa Barbara, CA, 1987, (8: POM-88), pp. 216-222.
Signatures
"Some
Variations
&
on
DeMillo, R.. and M. Merritt "Protocols for Data Security." IEEE Computer . February 1983. pp. 39-50.
RSA
Their Security," Proc. Crypto '86, Santa Barbara,
CA. 1986,
(8:
ODL-
Key Words:
87). pp. 49-59.
Key Words:
Key Words: RSA,
methods.
DAV-87b and F.B. Danes
G.I.,
"A Crypto-Engine,"
Denning. D.E. Cryptography and Data Security Addison-Wesley, Reading, MA, 1982.
DeLAurentis, J.M.
,
CA, 1987,
POM-88),
(8:
.
"A Further Weakness in the Common Modulus Protocol
Proc.
Crypto '87 Santa Barbara,
for the RSA Cryptoalgorithm," Cryptologia July 1984, pp. 253-259.
pp.
257-268.
,
Key Words: methods,
DAV-88
Denning. D.E.. 'The Many-Time Pad: Theme and Variations," Proc. 1983
analysis,
threats. j)rotocols.
JA, and
DB.
IEEE Symp.
DEL-84a
Holdridge "Factorization of Large Integers on a Massively Parallel Computer," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89), pp. 235-243.
Delsarte, P., et
Sec.
&
"Fast Cryptanalysis of
Key Words:
techniques, case.
,
DEN-84 Denning. D.E.
142-149.
RSA
"Digital Signatiffes with
analyis,
Key Words:
techniques.
analysis, public-
and Other PubUc-Key Cryptosystems."
key.
Communications of
DEA-87
DEM-82
Deavours, C.A., Cryptology Yesterday. Today and Tomorrow Artech House, Norwood, MA, 1987.
the
ACM.
April 1984. pp. 388-392.
DeMillo. R.. N. Lynch,
and M. Merritt "Cryptogr^hic Protocols." Symposium Proc. 14th on Theory of Computation
.
Key Words: book,
Priv. , (5:
IEE-83a), pp. 23-30.
al.
Matsumoto-Imai Public-key Scheme," Proc. Eurocrypt '84 Paris, 1984. (8: BET-85). pp.
.
Key Words:
Key Words: book, methods, models.
DEN-83
design.
Key Words: RSA. Davis,
DEN-82
signatures.
DEL-84
Davida,
protocols, general.
signatures,
ACM
general.
,
DEA-89
Key Words: RSA.
DEN-88 Den Boer,
signatures.
B.
1982, pp. 383-400.
"Cryptanalysis of F.E.A.L.," Proc. Crypto '88 Santa
Key Words:
Barbara.
,
Deavours, C.A., et al. (Eds.) Cryptology: Machines, History, and Methods Artech
protocols,
CA. 1988.
pp. 293-
299.
general.
.
House, Norwood,
MA,
Key Words: book,
general.
Cryptographic Protocols, and Computer Security Models,"
deJonge, W., and D.
Chaum
"Attacks on Some RSA Signatures," Proc. Crypto '85
Santa Barbara, CA. 1985,
(8:
WIL-86). pp. 18-27. analysis,
Proceedings, 29th
Symposium
on Applied Mathematics American Mathematical Soc, ,
,
1983.
analysis,
algorithm.
DeMillo, R.A., et al. "AppUed Cryptology,
DEJ-85
Key Words: RSA.
Key Words:
DEM-83
1989.
DES-84 Desmedt, Y.G..
"A
et al.
Critical Analysis of
Security of
Knapsack Public-
key Algorithms," IEEE Trans, on Inform. Theory July 1984, ,
pp. 601-611.
Key Words:
models.
protocols.
Key Words: knapsack.
signatures.
8-9
analysis,
DES-87
DES-84a
De
Desmedt, Y., et al. "Dependence of Output on Input in DES: Small Avalanche Characteristics," Proc. Crypto '84 Santa .
Barbara,
CA,
1984. (8: 84a), pp. 359-376.
BLA-
DIF-81 Santis. A., S. Micali,
Diffie,
W.
and G. Persiano
"Cryptographic Technology:
"Non-Interactive Zero-
Knowledge Proof Systems,"
Fifteen Year Forecast," Proc. Crypto '81 Santa Barbara,
Proc. Crypto '87
CA.
,
,
Santa
Barbara,
CA, 1987.
88), pp.
52-72
(8:
POM-
1981. 84-108.
(8:
GER-82). pp.
Key Words: methods, Key Words: DES,
Key Words:
design,
DIF-88
analysis.
DES-87a
DES -85
Diffie.
Desmedt, Y.G.. et al. "Special Uses and Abuses of
Desmedt, Y. "Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences." Proc. Crypto '85 Santa Barbara, CA. 1985, (8: WIL-86), pp. 42-
the Fiat-Shamir Passport Protocol" Proc. Crypto '86 .
Santa Barbara. CA, 1986.
W.
Ten Years of Public-Key Cryptography." Proceedings of the IEEE. May 1988. pp. 560-577. "The
First
(8:
Key Words:
ODL-87), pp. 21-39
public-key,
methods.
,
Key Words:
thretas, protocols.
DOL-81
55.
DES-87b
Key Words:
authentication,
theory.
DES-85a
Dolev. D., A.C.
Desmedt, Y.G. "Society and Group Oriented Cryptography: A New Concept," Proc. Crypto '87 Santa Barbara, CA, 1987, (8: ,
Desmedt, Y., and A.M. Odlyzko "A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes," Proc. Crypto '85 Santa Barbara, CA. 1985, (8: WIL-86), pp. 516-522. ,
Key Words: RSA,
analysis,
POM-88),
Desmedt, Y., and J.-I.
policy, methods.
"Subliminal-Free Authentication and Signature," Proc. Crypto '88 Santa ,
CA,
1988, pp. 23-33.
.
analysis, public-
key.
Party Protocols in Distributed Systems." Proc. Crypto '82 ,
Santa Barbara,
CA,
1982, CHA-83b), pp. 167-175.
(8:
authentication,
Key Words:
analysis,
DES-88a
DOL-82a
De
Tampering," Proc. Crypto '86 Santa Barbara, CA, ,
ODL-87), pp. Hi-
ll?.
Soete, M. "Some Constructions
Dolev, D., S. Even,
for
and R.M. Karp
Authentication-Secrecy
Codes," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89), pp. 57-75.
,
public-key,
Key Words:
design.
"On
the Security of Ping-Pong
Algorithms," Proc. Crypto '82
Santa Barbara,
CA,
1982, CHA-83b), pp. 177-186.
,
(8:
authentication,
Key Words:
codes.
DES-86a
analysis,
algorithms.
Desmedt, Y. "Is There A Ultimate Use of Cryptography?," Proc. Crypto '86 , Santa Barbara,
1986,
Foundations of Comp. Sci. 1981.
protocols.
the Difficulty of
Key Words:
22nd
the
Dolev. D.. and A. Wigderson "On the Security of Multi-
Desmedt, Y.G.
methods.
"Public-Key Systems Based
(8:
Protocols," Proc,
Annual Symp. on
DOL-82
DES-88
Quisquater
1986,
Yao
the Security of Public
Key Words:
Key Words:
DES-86
"On Key
pp. 120-127.
Key Words:
Barbara,
threats.
on
gneral.
theory, zero.
(8:
CA,
ODL-87). pp. 459-
463.
Key Words:
DES-89
DOL-83
Desmedt, Y.G.
"Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context." Proc. Crypto '89 Santa Barbara, CA, (8: BRA,
policy, general.
Dolev, D., and A.C. Yao "On the Security of Public-key Protocols,"
IEEE
Inform. Theory,
Trans, on
March
pp. 198-208.
90), 1989.
Key Words: Key Words: methods,
8-10
design.
protocols.
analysis,
1983,
EVE-87
EST-85
EIE-83 and H. Lagger 'Tr^oors in Knapsack Cryptosystems," Proc. Burg
Estes, D., et
Feuerstein Conf.
Quadratic
Eier, R.,
,
1982,
(8:
BET-83), pp. 316-322.
Shamir Signature Scheme for
"Linear Structures in Block Ciphers," Proc. Eurocrypt '87
Number
Amsterdam, 1987, (CHA-88a),
"Breaking the Ong-Schorr-
analysis,
Fields,"
Proc. Crypto '85 , Santa
Barbara,
Key Words:
Evertse, J.-H.
al.
CA,
1985. (8:
,
pp. 249-266.
WIL-
Key Words:
86). pp. 3-13.
analysis, methods.
knapsack.
Key Words:
ELG-82
EVE-89
analysis,
S., O. Goldreich, and A. Lempel
Even, S., O. Goldreich, and S. Micali "On Line/Off Line Digital Signatures," Proc. Crypto '89 Santa Barbara, CA, (8: BRA-
"A Randomized
90). 1989.
signatures.
ElGamal, T.
"A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Proc. Crypto '84 Santa Barbara, CA, ,
1984.
(8:
BLA-84a). pp. 10-
18.
EVE-82 Even,
,
Protocol for
Signing Contracts" Proc. Crypto '82 Santa Barbara,
Key Words:
CA. 1982.
methods.
,
(8:
CHA-83b), pp.
signatures,
205-210.
FAM-83
Key Words: methods, Key Words:
signatures.
Fam, B.W.
signatures,
"Improving the Security of Key Exchange," Proc. Crypto '83 Santa
random, protocols.
ELG-85
Exponential
EVE-85
ElGamal, T.
"A
Public-key Cryptosystem
and Signature Scheme Based
on Discrete Logarithms," Trans, on Inform. Theory July 1985, pp. 469-
IEEE
,
472.
,
Barbara,
when Implemented Using the RSA," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 58-72.
Key Words: methods,
Protocols
,
Key Words: methods, Key Words: RSA,
signatures.
analysis,
ELK-83 Even,
"Public-key Cryptosystems,"
"On
Age (UK), October 1983, pp. 232-237.
S.,
FEI-85 Feigenbaum, J. "Encrypting Problem Instances," Proc. Crypto '85
Key Words: methods,
and O. Goldreich
Power of Cascade Ciphers," ACM Trans, on Computer Systems 1985, pp.
,
(8:
theory.
FEI-88 Feige, U., A. Fiat,
,
and A. Shamir "Zero-Knowledge Proofs of
publi-key,
Key Words:
general.
keys.
the
108-116.
Key Words:
84b), pp. 359-368.
EVE-85a
S. Al-Khayatt
Information
CHA-
1983, (8:
Santa Barbara, CA, 1985, WIL-86), pp. 477-488.
protocols.
El-Kateeb, A., and
CA,
Even, S., O. Goldreich, and A. Shamir "On the Security of Ping-Pong
Identity," Journal of
evaluation,
Cryptology Vol.
methods.
,
1,
No.
2.
1988, pp. 77-94.
ESC-84
EVE-85b
Escobar, C.B.
"Nongovenunental Cryptology and National Security: The Government Seeking to
Even, S., O. Goldreich, and A. Lempel
Restrict Research,"
Signing Contracts,"
Computer/Law
Communications of the
Journal.
June 1985. pp. 637-647.
Key Words:
Key Words:
for
ACM
siagnatures,
random.
authentication,
zero.
"A Randomized Protocol
Winter 1984. pp. 573-603. policy, research.
Key Words:
FEL-85 ,
Fell. H.,
and W.Diffie
"Analysis of a Public-key
Approach Based on Polynomial Substitution," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 340-349. ,
Key Words: key.
8-11
analysis, public-
GAL-85
FEL-87 Feldman, P.
"A
ftactical
GIR-88
Galil, Z.. S. Haber,
Scheme
and
Secret Sharing," Proc, 28th
"Symmetric I*ublic-Key Encryption," Proc. Crypto '85
IEEE Annual Symp. on Foundation of Comp.
Santa Barbara, CA. 1985, WIL-86), pp. 128-137.
Non-Interactive Verifiable
Science
.
M., R. Cohen, and M. Campana Girault,
M. Yung
for
the
"A Generalized Birthday .
Davos, 1988.
(8:
Key Words:
Key Words:
public-key,
FIA-86
GOD-85 Godlewski,
GaUl. Z., S. Haber, and
M. Yimg "A Private
and A. Shamir Prove Yourself:
a Boolean Predicate and
Minimum-Knowledge PublicKey Cryptosystems," Proc. 26th IEEE Symposium on
(8:
Key Words:
'85.
Foundations of Computing 1985. pp. 360-371
(8:
Key Words:
CA,
Barbara,
Key Words: methods,
1985,
codes.
GOL-82 Goldwasser, and A. Yao
evaluation,
"On
public-key.
ns-81
S., S.
Micali,
Signatures and
Authentication," Proc. Crypto
GEO-89
Fischer, E.
Sanu
WIL-86), pp. 458-467.
.
signatures,
methods.
and
"Some Cryptographic Aspects of Womcodes," Proc. Crypto
Interactive Test of
and Signature Problems," Proc. Crypto '86,
ODL-87). pp. 186-194.
P.,
G.D. Cohen
Practical Solutions to Identification
Santa Barbara, CA, 1986,
analysis, threat
methods.
GAL-85a
to
.
GUN-89), pp.
129-156.
protocols.
"How
(8:
1987, pp. 427-437.
Key Words: methods,
Fiat, A.,
Attack," Proc. Eurocrypt '88
Sanu
'82,
CA, 1982,
Barbara,
"Measuring Cryptographic Performance with Production
Georgia, G.
Processes," Cryptologia, July
Ciphers," Cryptologia, April
1981, pp. 158-162.
1989, pp. 151.
Key Words:
Key Words: methods,
Goldwasser,
techniques.
"ProbabiUstic Encryption and
"A Method
(8:
to
CHA-83b), pp. 211-215.
Strengthen
Key Words:
signatures,
GOL-82a evaluation,
methods.
Gersho. A. (Ed.) Advances in Cryptology: Report on Crypto 81 August
CA.
1981.
1984, 454-464.
(8:
BLA-84a), pp.
Information," Proceedings, 14th
A
Annual ACM Symp. on Theory of Computing May
.
ECE RepL
,
No. 82-02.
1982, pp. 365-377.
University of California, Santa
Barbara,
Key Words:
protocols, case.
CA, August
Key Words: methods,
20,
1982.
protocols.
Key Words:
FOS-82
GOL-82b
proceedings,
methods.
Foster, C.C.
Goldwasser,
Cryptanalysis for
Microcomputers Hayden .
Book
S. Micali
to Play Mental Poker Keeping Secret All Partial
"Poker Protocols," Proc. Crypto '84 , Santa Barbara,
Fortune, S.
and
How
GER-82
FOR-84
S.,
Co., Rochelle Park, NJ,
1982.
P.
"How
GIF-82
S., S.
Micali, and
Tong to Establish
a Private
Gifford, D.K.
Code on
"Cryptographic Sealing for
Proceedings. 23d Annual
IEEE Symposium on Foimdations of
Information Security and
Key Words: book, PC,
Authentication,"
methods.
Communications of the
ACM
April 1982. pp. 274-286.
Key Words:
authentication,
methods.
8-12
a Public Network,"
Computing 1982, pp. 134-144. ,
.
Key Words: methods,
codes.
GOL-85
GOL-83
GOL-87a
Goldreich, O.
Goldwasser.
"A Simple
and R.L. Rivest
Protocol for
"A
Goldreich, O., and R. Vainish
Micali.
S.. S.
Signing Protocols," Proc. Crypto '83 Santa Barbara,
the Signature Problem," Proc,
CA, 1983.
25d Annual IEEE Symp.on
,
(8:
CHA-84b), pp.
'Paradoxical' Solution to
Found, of Comp. 441-448.
133-135.
Key Words:
,
1984, pp.
"How to Solve a Protocol Problem: An Efficiency Improvement," Proc Crypto '87 Santa Barbara, CA, 1987, (8: POM-88), pp. 73-86 ,
Key Words: methods,
signatures,
Key Words:
protocols.
signatures,
protocols.
theory.
GOL-89
GOL-83a Goldwasser, S., S. Micali, and A. Yao "Strong Signature Schems," Proc. 15th Annual Symp. on Theory of Comp. 1983. pp. 431-439.
GOL-86
Goldwasser,
Goldreich, O.
ACM
.
S., et al.
"Efficient Identification
Two
'Two Remarks Concerning
Schemes Using
the Goldwasser-Micali-Rivest
Signature Scheme" Proc
Interactive Proofs." Proc. Crypto '89 . Santa Barbara,
Crypto '86 Santa Barbara,
CA,
,
Prover
BRA-90). 1989.
(8:
CA,
1986, (8: ODL-87), pp. 104-110.
Key Words: methods,
Key Words:
GOL-84
GOO-84 Goodman, R.M.F., and McAuley "A New Trapdoor Knapsack
GOL-86a
Micali fhe Cryptographic
S.
"On
Apphcations of
A.J.
Goldreich. O., S. Micali,
Random
Fimctions," Proc. Crypto '84
Santa Barbara, CA, 1984, BLA-84a). pp. 276-288.
,
(8:
and A. Wigderson "How to Prove All
Public-key Cryptosystem,"
NP
Proc. Eurocrypt '84
Statements in Zero-Knowledge and Methodology of
Cryptographic Protocol Design," Proc. Crypto '86 Santa Barbara, CA, 1986, ODL-87), pp. 171-185.
Key Words: methods, random.
Key Words:
Goldreich. O.
"On Concunent
(8:
protocols, zero.
Identification
Protocols." Proc. Eurocrypt ;84. Paris, 1984, (8:
BET-
387-396.
1984,
(8:
GOL-86b
Paris,
,
BET-85), pp. 150-
158.
Key Words:
,
GOL-84a
85). pp.
authentication,
analysis,
signatures.
Goldreich, O., S. Goldwasser,
and
Key Words: methods.
signatures.
public-key,
knapsack.
GOR-81 Gordon, J.A. 'Towards a Design for Cryptosecure Susbstitution Boxes," Proc. Crypto '81.
Goldreich. O.
CA,
'Toward a Theory of
Santa Barbara,
Software Protection." Proc.
GER-82), pp. 53-63.
Key Words: methods,
Crypto '86 Santa Barbara.
protocols.
CA.
1981,
(8:
.
1986. (8: ODL-87). pp.
Key Words: methods,
design.
426-439.
GRO-84
GOL-84b Goldwasser.
S..
and
S. Micali
Key Words:
software, theory.
Journal of
Comp. and System
Groscot, H.
"Estimation of Some Encryption Functions
"Probabilistic Encryption,"
GOL-87
Science April 1984, pp. 270-
Goldreich, O.
Implemented
299.
'Towards a Theory of Software Protection and Simulation by ObUvious
Cards," Proc. Eurocrypt '84
,
Key Words: methods,
theory.
RAMs," Proceedings, 19th ACM Symposium on Theory of Computing
,
1987, pp. 182-
194.
Paris, 1984, (8:
theory, software.
Smart
Key Words:
analysis, methods.
GUA-87 P.
"Cellular
Automaton Public
Key Cryptosystem," Complex Systems
,
1987, pp. 51-56.
Key Words: methods,
8-13
,
BET-85), pp.
470-479.
Guam,
Key Words:
into
case.
HAR-84
GUI-88 Guillou, L.C., and J.
Quisquater
"A
Practical
Zero-Knowledge
Protocol Fitted to Security
Microprocessor Minimizing Both Transmission and
Memory,"
HEN-81
Harari, S.
"Non-Linear NonConunutative Functions for Data Integrity," Proc. Eurocrypt '84 Paris, 1984, BET-85), pp. 25-32. .
(8:
Henry, P.S. "Fast Encryption Algorithm for the Knapsack Cryptographic System," Bell System Technical Journal May-June 1981, pp. 767-773. ,
Proc. Eurocrypt
^88. Davos, 1988, (8:
GUN-
Key Words:
integrity, theory.
89). pp. 123-128.
Key Words:
design protocols,
zero.
HAR-89 Ham, L., and T. Keisler 'Two New Efficient
al.
"Public-Key Techniques:
Proc. 5th Security Applicat.
Randomness and
Conf. (4: IEE-89c), 1989, pp. 254-262. .
Redundancy," Cryptologia
,
Key Words: methods, public-key,
public-
HEL-80
GUN-88
Proc.
Eurocrypt '88 , Davos, 1988, (8: GUN-89), pp. 405-414.
Plenum
Press,
New
Key Words: book,
general.
"A Cryptoanalytic TimeTradeoff." IEEE Trans, on Inform. Theory
308.
July 1980, pp.
,
40M06.
analysis, design.
Search." Proc. Crypto '81 ,
Eurocrypt '88 Proceedings, Davos, Switzerland, May 1988, Lecture Notes in Comp. Science No. 330, Springer- Verlag, New York,
GER-82). pp.
Santa Barbara,
Key Words:
CA,
1981, (8:
1-5.
HAR-83
One Checksum
,
vulnerabilities,
algorithms, check-sum.
IMP-87
Hellman, M.E., and J.M. Reyneri "Distribution of Drainage in DES," Proc. Crypto '82. Santa Barbara,
CA.
1982, (8:
CHA-
83b), pp. 129-131.
Harari, S.
Cohen
Algorithm and Its Improvement," Computers & Security October 1988, pp. 503-505.
Key Words:
analysis,
methods.
HEL-82
general.
F.
Points of
Fast Cryptographic
the Necessity of
Cryptoanalytic Exhaustive
proceedings,
and
Y.J.,
"Some Weak
Gunther, C.G. Advances in Cryptology:
1989.
complexity,
HUA-88 Huang.
HEL-81 "On
GUN-89
Key Words: methods.
algorithms,
coding.
Herlestam, T.
Memory
Key Words:
Key Words:
.
York. 1986.
.
Hellman. M.E.
Gunther, C.G. "A Universal Algorithm for
Key Words:
Protection
"On the Complexity of Certain Crypto Generators," Proc. IFIP/Sec. '83 Stockholm. 1983, (2: FAK-83), pp. 305-
key.
random
Homophonic Coding,"
Hepshey, J.E., R.K. Yarlanda Data Encryption and
HER-83
April 1989, pp. 167.
Key Words:
algorithm,
HEP-86
Cryptosystems Based on Rabin's Scheme: Alternatives to the RSA Cryptosystem,"
GUI-89 Guillou, L., et
Key Words: knapsack.
Impagliazzo, R.,
and M. Yimg "Direct
Minimum-Knowledge
Computations," Proc. Crypto '87 , Santa Barbara, CA, 1987, (8: POM-88). pp. 40-51
"Secret Sharing Systems in Digital Communications," in
Key Words: DES,
Longo, G. (Ed.), Secure Digital Systems Springer, Wien, 1983, pp. 105-110.
methods.
,
Key Words:
techniques,
design.
8-14
design,
Key Words: methods,
zero.
JAN-87
ING-81 Ingemaisson,
I.,
and
C.K. Wong "A UsCT Authentication Scheme for Shared Data Based on a Trap-Door One-
Way
JUE-83
Jansen, C.J.A., and
Function," Information
Processing Letters April 13, 1981, pp. 63-67. ,
D.E. Boekee "Modes of Block Cipher Algorithms and Their Protection Against Active Eavesdropper," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 281-
Jueneman, R.R., S.M. Matyas, and C. H. Meyer, "Authentication with Manipulation Detection Codes," Proc. 1983 IEEE Symp. Sec. & Priv. , (5: lEE83a), pp. 33-54.
286.
Key Words:
Key Words:
authentication,
Key Words:
trap-door, methods.
therats,
methods,
authentication,
codes.
algorithms.
ING-82 Ingemarsson,
I.,
D.T. Tang,
JIN-88
and C.K. Wong "A Conference Key Distribution System" IEEE Trans, on Inform. Theory
Jingmin, H., and L. Kaicheng
1982, pp. 714-720.
(8:
,
"A New
Detection Code," Proc. Crypto
ProbabiUstic
Encryption Scheme," Proc. Eurocrypt '88 Davos, 1988, ,
GUN-89),
JUE-86 Juenemam, R.R. "A High Speed Manipulation '86 (8:
,
Santa Barbara, CA, 1986,
ODL-87), pp. 327-346.
pp. 413-418.
Key Words: methods,
Key Words: methods,
keys,
Key Words: methods,
design.
codes,
threats.
case.
JUR-83
JOR-81
JAM-86
Jurgensen. H., and
Jordan, J.P.
James, N.S., R. Lidl, and
"A Variant of
H. Niederreiter "Breaking the Cade Cipher," Proc. Crypto '86 Santa
Cryptosystem Based on Goppa Codes," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82). pp. 25-30.
,
Barbara,
CA,
1986, (8: 87), pp. 60-63.
ODL-
a Public-key
analysis, case.
public-
on
the
of Cryptosystems," Proc. Crypto '83 , Santa Barbara, 1983, 303-356.
(8:
CHA-84b), pp.
key.
JOR-87
Jamnig, P. "Securing the
analysis, theory,
design.
J. Vandewalle, and R. Govaerts
Jorissen, P.,
RSA-
Cryptosystem Against Cycling Attacks," Cryptologia, July 1988, pp. 159-164.
Key Words: RSA,
analysis,
"Extension of Brickell's
Algorithm for Breaking High Density Knapsacks," Proc. Eurocrypt '87 Amsterdam, 1987. (8: CHA-88a), pp. 109,
Kahn, D. "Cryptography Goes Public," IEEE Communications Magazine March 1980, pp. ,
19-28.
Key Words:
Key Words: JAN-82
KAH-80
115.
threats.
public -key,
general.
analysis,
algorithms.
KAH-82
Janardan, R., and
K.B. Lakshmanan "A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem," Proc. Crypto '82 , Santa Barbara, (8:
CHA-83b). pp.
Key Words:
JUE-82 Jueneman, R.R. "Analysis of Certain Aspects
of Output Feedback Mode," Proc. Crypto '82 . Santa Barbara,
CA,
1982, (8:
public-key,
Key Words: DES,
Kahn. D. "The Grand Lines of Cryptology's Development," Computers & Security ,
November
1982, pp. 245-248.
CHAKey Words: methods,
83b), pp. 99-127.
21-37.
methods.
Results
Key Words:
JAM-88
CA, 1982,
"Some
Information Theoretic Analyses
CA, Key Words: methods,
Key Words:
D. E. Matthews
analysis,
general.
KAH-84 Kahn, D.
design.
Kahn on Codes Macmillan, ,
New
York, 1984.
Key Words: book,
8-15
general.
KAR-83
KAH-84a
KON-81
Kahn. D.
Kamin, E.D.,
"Cryptology and the Origins of Spread Spectrum," IEEE
"On Secret Sharing Systems," IEEE Trans, on Inform.
Spectrum September 1984,
Theory 1983, pp. 35-41.
,
et al.
general.
Key Words: methods,
KAR-84
general.
"A
Kak, S.C. "Joint Encryption and Error Correction," Proc. 1983 IEEE
&
Privacy , Symp. Sec. IEE-83a), pp. 55-60.
Trans, on Computers
.
May
(5:
Key Words:
Kesim, S.N.
"On
the
Key
for
KOT-84
Method of Puzzles
Kothari, S.C.
Ciphers," Security
Distribution,"
Management. October 1988,
"Generalized Linear Threshold Scheme," Proc. Crypto '84
Computer
and Information Science
Key Words: methods,
.
pp. 45-47.
Santa Barbara, CA, 1984, BLA-84a), pp. 231-241.
,
April 1984. pp. 103-109. keys.
Key Words: methods,
Kahski, B.S.
Key Words: methods,
KOB-87
Key Words: book,
Koyama,
1984,
(8:
BLA-84a). pp. 83-
Distribution Systems," Proc. Crypto '87 , Sanu
general.
Barbara,
KOB-87a
Jr.,
POM-
keys.
KOY-88 Koyama,
K.,
and K. Ohta
"Security of Improved Identity-
Based Key Distribution
R.L. Rivest,
,
1987. (8:
Key Words: methods,
Cryptosystems," Mathematics of Computation, 1987, pp.
and A.T. Sherman "Is the Data Encryption Standard a Group?," Joumal of Cryptology Vol. 1, No. 1,
CA,
Curve
203-209.
Kaliski. B.S.,
OhU
88). pp. 175-184.
"Elliptic
KAL-85
and K.
Key
Kobhtz, N.
Key Words:
K.,
'Identity-Based Conference
Santa Barbara, CA,
94.
theory.
KOY-87
KobUtz, N. Course in NumbCT Theory and Cryptography Springer, New York, 1987. ,
"Wyner's Analog Encryption Scheme: Results of a Simulation," Proc. Crypto
(8:
general.
A
KAL-84
,
method,
analysis,
"Encryption: Security with
Intemat. Journal of
•84
"Cryptanalysis of ADFGVX Encryption Systems," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 339-341.
case.
KES-88 Kak, S.C.
general.
algorithm,
codes.
KAK-84
Key Words: book,
.
1984, pp. 404-408.
knapsack.
Key Words: methods,
J.
York.
Konheim, A.G.
Algorithm for the Knapsack Problem," IEEE Parallel
Key Words:
Primer .
KON-84
Kamin, E.D.
KAK-83
A
New
1981.
.
pp. 70-80
Key Words: methods,
Konheim, A.G. Cryptography Wiley & Sons,
Key Words: methods,
theory.
System," Proc. Eurocrypt-87 , pp. 11-19.
KOB-89
Key Words: methods,
KobUtz, N.
keys.
"Hyperelliptic Cryptosystem,"
1988, pp. 3-36.
Joumal of Cryptology Vol. No. 3, 1989, pp. 139-150. ,
Key Words: DES,
design,
1,
KRA-86 Kranakis, E. Primality and Cryptography ,
theory.
Key Words: methods,
theory.
Wiley,
New
York, 1986.
KAL-85a Kaliski, B.S. Jr, R.L. Rivest
and A.T. Sherman "Is DES a Pure Cipher?," Proc. Crypto '85 Santa ,
Barbara,
CA, 1985,
(8:
WIL-
theory.
Key Words: book,
Konheim, A.G., et al. "The IPS Cryptographic Programs," IBM Systems Joumal Vol. 19. No. 2, 1980, .
pp. 153-283.
86), pp. 212-226.
Key Words: DES,
KON-80
design,
Key Words: methods, software.
8-16
general.
KUR-88
LEE-88
LID-83 and W.B. MuUer "Permutation Polynomials in RSA Cryptosystems," Proc. Crypto '83 Santa Barbara,
Kurosawa, K., T. Ito, and M. Takeuchi "Public Key Cryptosystem Using a Reciprocal Number
Key Cryptosystem,
with the Same Intractability as Factoring a Large
Eurocrypt '88 Davos, 1988 (8: GUN-89), pp. 275-280.
CA, 1983,
Key Words:
Key Words: RSA, methods,
Lee,
P.J.,
and E.F. BrickeU
"An Observation on
Lidl, R.,
the
Security of McElice's PublicProc.
,
,
(8:
CHA-84b), pp.
293-301.
Number," Cryptologia, October 1988, pp. 225-233.
analysis, public-
key.
Key Words: methods,
theory.
public-
LID-84
LEI-84
key.
LAG-83 Lagarias, J.C.
"Knapsack Public Key Cryptosystems and Diophantine Approximations," Proc. Crypto '83 Santa
Leighton, A.C., and
Lidl, R.
S.M. Matyas "The History of Book Ciphers," Proc. Crypto '84
"On Cryptosystems Based on Polynomials and Finite Fields," Proc. Eurocrypt '84 Paris, 1984, (8: BET-85), pp. 10-15.
Santa Barbara, CA, 1984, BLA-84a), pp. 101-113.
,
,
(8:
Key Words: methods,
,
Barbara,
CA, 1983,
CHA-
(8:
Key Words: methods,
LON-82
84b), pp. 4-23.
LEN-81
Key Words:
Lennon. R.E..
public-key,
IEEE
LAI-89
pp. 773-777.
Key Words:
Journal on Selected in
Communications
,
Santa Barbara, CA, 1984,
LAK-83 Laksmivarahan, S. "Algorithms for Public -Key Cryptosystems: Theory and AppUcations," in M. Yovits,
Key Words: methods,
York,
Levin, L.
Pseudo-random Generators," Proc. 17th Annual ACM Symp. on Theory of Computing 1985, pp. 363-
public-key,
,
LAM-81
365.
.
November 1981,
pp.
Key Words:
Key Words: Methods,
authentication.
one-
way,
Key Words: methods,
general.
Encryption Algorithm," Proc. IHP/Sec. '84 Toronto, 1984, ,
(2:
FIN-85), pp. 557-570.
Key Words: methods, algorithm.
MagUveras, S.S., and N.D. Memon "Algebraic Properties of the
PGM
LEV-87 and R. Chandler "Some Further AppUcations of Permutation Polynomials," Cryptologia, October 1987, Levine,
770-772.
,
MAG-89
Lamport, L.
"Pasword Authentication with Insecure Communications," Communications of the
Luby, M., and C. Rackoff "A Study of Password Security," Proc. Crypto '87 Santa Barbara, CA, 1987, (8: POM-88), pp. 392-397.
Madryga, W.E. "A High Performance
"One-Way Functions and
methods.
ACM
pubUc-
MAD-84
complexity.
LEV-85
22,
1983, pp. 45-108.
Key Words:
(8:
BLA-84a), pp. 468-474.
in
New
(8:
LUB-87
Leung, A.K. "Sequenec Complexity as a Test for Cryptographic Systems," Proc. Crypto '84
knapsack.
.
signatures,
,
key.
authentication.
LEU-84
Key Words: methods,
Advances Computers Vol. Academic Press,
Santa Barbara, CA, 1982, CHA-83b), pp. 187-197.
,
1989, pp. 534-539.
(Ed.),
Longpre. L. "The Use of Public-Key Cryptography for Signing Checks," Proc. Crypto '82
Key Words:
Key Cryptosystem,"
Areas
May
Trans, on
Communications, June 1981,
al.
"Linearly Shift Knapsack Public
IEEE
et al.
"Cryptographic Authentication of Time-Invariant Quantities,"
knapsack.
Laih, C.-S.. et
theory.
general.
J.,
8-17
,
Key Words: methods, case.
pp. 211-218.
Key Words: methods,
Cryptosystem" Proc. Crypto '89 Santa Barbara, CA. 1989 (8: BRA-89).
theory.
theory,
MAS -84
MCE-81
Massey, J.L., and R.A. Rueppel "Linear Ciphers and Random Sequence Generators with Multiple Clocks," Proc. Eurocrypt '84 Paris, 1984, .
MEI-89
McElicie, R.J., and
Meier, W., and O. Staffelbach
D.V. Sarwate
"On Sharing Secrets and Reed-Solomon Codes," Communications of the ACM, September 1981, pp. 583-584.
No.
Key Words:
Key Words:
"Fast Correlation Attacks
on
Certain Stream Ciphers," Journal of Cryptology , Vol. 3,
1,
1989, pp. 159-176.
BET-85), pp. 74-87.
(8:
Key Words: methods,
MEA-87
MAS-88 Massey,
"An
theory, codes.
J.L.
Introduction to
Contemporary Cryptology," Proceedings of the IEEE May 1988, pp. 533-549.
,
MER-80
Meadows, C, and
Merkle, R.C.
D. Mutchler "Matching Secrets in the Absence of a Continuously Available Trusted Authority," IEEE Trans, on Software
"Protocols for Public Key Cryptosystems." Proc. 1980
metliods, theory,
&
IEEE Symp. (5:
Sec. Privacy , IEE-80). pp. 122-134.
Key Words:
Engr. February 1987, pp. 289-292. .
Key Words:
analysis, methods.
design.
protocols, pubUc-
key.
general.
MER-81
Key Words: methods,
MAT-86
Merkle, R.C.
protocols.
"On
Matyas, S.M.
Key
"Public
Registration,"
Proc. Crypto '86
,
Santa
CA, 1986,
Barbara,
(8:
ODL-
87), pp. 451-458.
Key Words: methods,
public-
key.
MEA-88
the Security of Multiple
Encryptions," Communications
Meadows, C, "Some Threshold Schemes
of the ACM, July 1981, pp. 465-467.
Without Central Key Distribution," Proc. Crypto '88 Santa Barbara, CA, 1988
Key Words:
(8:
MER-82
GOL-89b).
Merritt,
MAT-88
Key Words: methods,
Matsumoto,
T.,
,
CA, 1982,
Meijer, H., and S. Akl
GUN-
'Ji, Davos, 1988, (8:
Key Words: methods,
pp. 329-338
design.
Merkle. R.C.
Key Words: methods,
Security, Authentication, and
MEI-85
signatures.
Public-Key Systems University of Michigan Press, Ann Arbor, ,
Meijer, H., and S. Akl
'Two New
MCC-88 McCurley, K.S.
System
Journal of Cryptology 2.
Secret
Key
MI, 1982.
Cryptosystems," Proc.
Equivalent to Factoring,"
No.
.
Eurocrypt '85 Linz, 1985, PIC-86). pp. 96-102. .
(8:
Vol.
1988, pp. 95-105.
Key Words: methods,
Key Words: methods,
public-key.
MER-87 Merkle, R.C. Digital Signature
Based on
a Conventional Encryption Fimction," Proc. Crypto '87
keys,
MEI-88 Meier. W., and
O. Staffelbach "Fast Correlation Attacks on Stream Ciphers," Proc. Eurocrypt '88 Davos, 1988, ,
(8:
Key Words: book,
"A
algorithms. case.
keys,
MER-82a
signatures.
1,
CHA-83b), pp.
Cryptologia, October 1982,
Key Words: methods,
89), pp. 419-453.
Distribution
(8:
321-375.
"Digital Signature Schemes,"
Message
Encryption," Proc. Eurocrypt
"A Key
Proc.
Crypto '82 Santa Barbara,
MEI-82
Efficient Signature
Verification and
M.
"Key Reconstruction,"
keys.
and H. Imai
"Public Quadratic Polynomial-Tuples for
analysis, methods.
.
GUN-89),
Key Words:
pp. 301-314.
analysis,
methods.
8-18
Santa Barbara, CA, 1987, POM-88), pp. 369-378.
Key Words: methods, signatures.
,
(8:
MOO-85
MER-89 Merkle. R.C.
"A
Certified Digital
Signature," Proc. Crypto '89 .
Santa Barbara, CA, 1989,
(8:
NIE-85
Moore, T.E., and S.E. Tavares "A Layered Approach to the Design of Private Key Cryptosystems," Proc. Crypto
CA. 1985,
•85 , Santa Barbara,
BRA-89).
(8:
Key Words:
WrL-86), pp. 227-245.
Key Words: methods,
design,
Way Hash
MOO-86
Functions
and the DES." Proc. Crypto •89 , Santa Barbara,
CA,
Key Words: DES, methods, design.
and
J.H.,
O'Connor,
Simmons
J.
public-
DES Weak and Semiweak
L.J.
and
Seberry
"Cycle Structures of the
The Cryptographic
with
of the Knapsack Problem Aegean Park Press, Laguna HUls, CA, 1987.
Keys," Proc. Crypto '86 , Santa Barbara, CA, 1986, ODL-87), pp. 187-205.
(8:
MEY-82
Significance ,
Key Words: book, knapsack,
Meyer, C.H., and SM. Matyas Cryptography - A New Dimension in Computer Data Sectirity J. Wiley & Sons, ,
New
Key Words: methods,
OCO-87
Moore, G.J.
BRA-89).
(8:
Shift Register
Sequences," Proc. Eurocrypt ^85, Linz, 1985, (8: PIC-86). pp. 35-39.
key.
case.
Merkle, R.C.
1989.
"A Public-Key Cryptosystem Based on
signatures, case.
MER-89a "One
Niederreiter, H.
York, 1982.
Key Words:
book, general,
Odlyzko, A.M.
Moore,
"Cryptanalytic Attacks on the
and
J.H.,
Simmons
Multiplicative
(or Anti-palindromic)
S., et al.
Key Words: DES,
Proc. Crypto '86
design.
Santa
CA, 1986.
(8:
ODL-
87), pp. 381-392.
Key Words: methods,
theory.
ODL-84a
MOR-81 Morrison, D.R. "Subtractive Encryptors
-
DES,"
Proc. Crypto '81 , Santa
Barbara,
Micali. S. "Digital Signatures:
The
CA. 1981.
(8:
Key Words: methods,
Evolution of a Fundamental Primitive." Proc. Crypto '89 ,
Key Words: DES. methods,
Santa Barbara. CA. 1989.
case.
BRA-89).
Key Words:
Odlyzko, A.M. "Discrete Logarithms in Finite Fields and Their Cryptographic Significance," Proc. Eurocrypt ^84. Paris, 1984, (8: BET-85), pp. 225-314.
GER-
82). pp. 42-52.
(8:
analysis,
analysis,
Alternatives to the
MIC-89
Key Words:
knapsack, signatures.
for
Probabilistic Cryptosystems," ,
Knapsack
Cryptosystem and on Shamir's Fast Signature System, IEEE Trans, on Inform. Theory July 1984, pp. 594-601. ,
Sequences of Keys," IEEE Trans, of Software Engr., February 1987, pp. 262-273.
"The Notion of Security
analysis, theory.
ODL-84
MOO-87 "Cycle Structure of the DES for Keys Having Palindromic
MIC-86
Barbara,
analysis,
design.
G.J.
theory, methods, keys.
Micali,
Key Words: DES,
theory.
ODL-87 Odlyzko, A.M., (Ed.) Advances in Cryptology Proceedings of Crypto '86 Santa Barbara, CA, August 1988. Lecture Notes in Computer Science No. 263. Springer- Verlag. New York. ,
MUL-84 signatures,
.
Mullin. A.A.
"A Note on the Mathematics of Public-Key Cryptosystems,"
theory.
Computers
MIL-85 MiUer, V.S. "Use of Elliptic Curves in Cryptography," Proc. Crypto '85 . Santa Barbara, CA. 1985. (8: WIL-86). pp. 415-
&
Security
1987.
Key Words:
Key Words:
public-key,
general.
theory.
426.
Key Words: methods,
,
February 1984, pp. 45-47.
theory.
8-19
proceedings,
OKA-85
OKA-88a
Okamoto,
and
T.,
A. Shiraishi
"A
Scheme
Fast Signature
Based on Quadratic Inequalities," Proc.
IEEE Symp. 1985, (5: 133.
Pfitzmann and M. Waidner 'T*Jetworks Without User
Scheme Using Bijective PublicKey Cryptosystems,"
Observability." Computers
ACM
1985
&
Privacy IEE-85). pp. 123Sec.
Pn-87
Okamoto, T. "A Digital Multisignature
Trans, on
Security
Computer
166.
,
Key Words: methods,
432-441.
Key Words: methods,
case.
PIC-86
signatures.
Pichler. F. (Ed.)
Advances in Cryptology:
signatures.
OKA-89
OKA-85a
Proceedings of Eurocrypt '85
Okamoto,
E.,
and
K. Nakamura "Lifetimes of Keys in Cryptographic Key
Management Systems," Crypto '85
CA, 1985,
&
April 1987. pp. 158-
Systems November 1988, pp.
,
Key Words: methods,
Okamoto,
.
Proc.
Santa Barbara,
,
(8:
and K. Ohta "Disposable Zero-Knowledge Authentications and Their
Linz, Austria, April 1985.
Application to Untraceable
Veriag,
Electronic Cash," Proc. Crypto '89 . Santa Barbara, CA, 1989
Key Words:
(8:
E.,
BRA-89).
Comp.
Science. No. 219, Springer-
New
York, 1986. proceedings,
general.
WIL-86), pp.
Key Words: methods,
246-259.
PIE-84
zero,
Pieprzyk, J.P.
design.
Key Words:
Lecture Notes in
.
"Algebraical Structures of Cryptographic Transformations." Proc. Eurocrypt '84. Paris, 1984,
keys,
ONG-83
management.
Ong.
OKA-86
H., and
CP.
Schorr
"Signatures through
BET-85), pp. 16-24.
"Proposal for Identity-Based
Approximate Representations by Quadratic Forms." Proc.
Key
Crypto '83 . Santa Barbara,
Key Words:
Okamoto, E. Distribution Systems,"
Electronics Letters
,
CA. 1983.
Nov. 20,
1986, pp. 1283-1284.
(8:
(8:
algorithms, theory.
CHA-84b). pp. PIE-85
117-132.
Pieprzyk, J.P.
Key Words: methods,
keys.
Key Words: methods,
"On PubUc-Key Cryptosystems
signatures.
Built Using Polynomial
Rings." Proc. Eurocrypt '85
OKA-87 ONG-84
Okamoto, E. "Key Distribution Systems Based on Identification
Ong, H., C. Schnorr, and A. Shamir "Efficient Signature Schemes Based on Polynomial
Information," Proc. Crypto '87 , Santa Barbara, CA,
1987,
(8:
POM-88),
Equations," Proc. Crypto '84
pp. 194-
Santa Barbara, CA, 1984, BLA-84a), pp. 37-46.
202.
Key Words:
Key Words: methods, ,
(8:
Key Words: methods, signatures.
OKA-88
PIE-85a J.P.. D.A. Rutowski "Modular Design of Information Encipherment for Computer Systems." Computers & Security September 1985,
Pieprzyk,
,
pp. 211-218.
PAT-87
Okamoto, E. "Substantial Number of Cryptographic Keys and Its Application to Encryption Design," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89),
Patterson,
W.
Mathematical Cryptology for Computer Scientists and
,
Mathematicians Rowman «fe Littlefield, Totowa, NJ. 1987. ,
pp. 361-373
Key Words: book, Key Words: methods,
public-
key.
keys,
management.
,
Linz, 1985, (8: PIC-86), pp. 73-78.
keys,
design.
8-20
theory.
Key Words: methods,
design.
POM-88
PIE-85b Pieprzyk,
QUI-87
C,
Pomerance,
J.P.,
DA.
Rutkowski "Design of Public Key Cryptosystems Using Idempotent Elements," Computers & Security
Advances
December 1985,
Springer.
(Ed.)
Quisquater.
in Cryptology:
Crypto '87 Santa Barbara,
1988. Lecture Notes in
CA,
for Public-Key Systems," Proc. .
1987, 203-208.
Computer Science No. 293.
pp. 297-308.
New
design, public-
key.
Key Words:
York. 1988.
QUI-89 Quisquater,
POR-84
Piper, F.,
and M. Walker
"Linear Ciphers and
Cryptology Vol. 1, No. 1989. pp. 185-188. ,
Key Words: methods,
J.
3,
theory.
J.,
and
Delescaille
"How Easy
Porter. S.
Is Collision
Search? New Results and Applications to DES," Proc. Crypto '89 Santa Barbara,
"Cryptology and Nimiber Sequences: Pseudorandom,
Spreads," Journal of
public -key, keys.
proceedings,
general.
PIP-89
POM-88), pp.
(8:
Key Words: Key Words:
Keys
Proceedings of Crypto '87 Santa Barbara. CA. August ,
.
J.-J.
"Secret Distribution of
Random, and Perfectly Random," Computers &
,
CA, 1989
Security . February 1984. pp. 43-44.
(8:
BRA-89).
Key Words: DES, methods, design.
Key Words:
POE-85 Poet, R.
algorithms,
QUI-89a
theory.
"The Design of SpecialPurpose Hardware to Factor Large Integers," Computer Physics Communications ,
1985, pp. 337-341.
Key Words:
analysis,
hardware.
Quisquater, Preneel. B.. et
al.
"A Chosen Text Attack on
the
Modified Cryptographic Checksum Algorithm of Cohen and Huang," Proc. Crypto '89 Santa Barbara. CA. 1989. (8: BRA-89).
Verification Scheme," Proc. Crypto '89 Santa Barbara, CA. 1989 (8: BRA-89). ,
Key Words:
verification,
QUI-89b
Pomerance,
C,
et al.,
Ideas for Factoring
Large Integers," Proc. Crypto '83 Santa Barbara, CA, .
1983,
and K.Vedder
signature.
,
POM-83 "New
J.-J.,
"A Signature with Shared
PRE-89
(8:
CHA-84b), pp. 81-
86.
Key Words:
analysis,
Key Words:
Quisquater,
analysis,
Advances
checksum.
Proctor, N.
"A Self-Synchronizing
Computer Science, Springer-
Cascaded Cipher System with
Veriag,
,
(8:
Pomerance, C. "The Quadratic Sieve Factoring Algorithm," Proc. Eurocrypt '84 . Paris. (8:
BET-85). pp. 169-182.
Key Words: algorithms.
analysis,
New
York, 1989.
Dynamic Control of Error ,
POM-85
(Ed.)
Proceedings of Eurocrypt-89 Houthalen, Belgium, April 1013, 1989, Lecture Notes in
PRO-84
Propagation," Proc. Crypto '84 Santa Barbara, CA, 1984,
algorithms.
J.-J.,
in Cryptology:
BLA-84a), pp. 174-190.
Key Words: methods,
Key Words:
proceedings,
gneral.
RAO-84
design.
QUI-85 J.-J., Y. Desmedt, and M. Davio 'The Importance of 'Good'
Quisquater,
Key Scheduling Schemes (How to Make a Secure DES Scheme with ?)," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 537-542. .
Key Words: DES. methods,
Rao, T.R.N. "Joint Encryption and Error Correction Schemes," Proc., 11th Intern. Symp. on Arch.,
May
Comp.
1984.
Key Words: methods,
codes.
RAO-86
Rao, T.R.N., and K.-H. Nam "Private-Key Algebraic -Coded Cryptosystems," Proc. Crypto '86 . Santa Barbara, CA, 1986, (8:
ODL-87), pp. 35-48.
design.
Key Words: methods,
8-21
codes.
RAO-87
SAL-88
RIV-84
Rao. T.R.N.
Rivest, R.L.. and A.
"On
"How
Struik-Tilburg
Cryptanalysis of
Rao-Nam
Scheme," Proc. Crypto '87
CA.
Santa Barbara,
POM-88).
to
Shamir
Eavesdropper," .
1987. (8:
Salomaa, A. "A Public-Key Cryptosystem Based on Language Theory,"
Expose an
Communications of
the
ACM
.
&
Computers
Security
.
April 1984. pp. 393-395.
February 1988. pp. 83-87.
Key Words:
Key Words: methods,
pp. 458-461.
Key Words:
analysis, threat,
SCH-84
methods, case.
RUB-81
RAO-89
Rao. T.R.N.. and K.H. Nam "Private-Key Algebraic-Code Encryptions,"
theory.
methods.
analysis,
IEEE
Trans, on
Inform. Theory , July 1989, pp. 829-833. codes.
,
126.
Key Words: RSA. Key Words:
Key Words: methods,
W. Alexi "RSA-bits are 0.5 -i- e Secure," Proc. Eurocrypt '84 Paris, 1984. (8: BET-85). pp. 113Schnorr, CP., and
Rubin. F. "Decrypting a Stream Cipher Based on J-K FHp-Flops." Cryptologia, January 1981. pp. 51-57.
analysis,
theory.
analysis,
methods.
SEB-89
RUB-87
REE-84
Seberry,
Reeds, J.A., and J. Manferdelli "DES Has No Per Round Linear Factors," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 377-
Rubin. F. "Foiling an Exhaustive KeySearch Attack." Cryptologia. April 1987. pp. 102-107
389
methods.
and
J.,
to
J.
An
Cryptography:
Computer Security
Hall,
New
Key Words:
,
Prentice-
York, 1989
Key Words: book,
,
Pieprzyk Introduction
general.
analysis,
SGA-83 Sgarro, A.
Key Words: DES.
analysis,
RUE-86
"Error Probabilities for Simple
Rueppel. R. Analysis and Design of Stream Ciphers Springer
design.
Rrr-81
,
R.R. "Data Encryption Basics and the Cipher Feedback Method," Telecommunications Jxme Ritts,
Verlag,
New
Key Words: methods, RIV-82 Rivest, R.L.. ar
analysis,
SGA-84 Sgarro,A.
Rueppel, R.
"Equivocations for
"Key Agreements Based on
Homophonic
Function Composition." Proc. Eurocrypt '88 Davos, 1988,
Eurocrypt '84 Paris, 1984,
(8:
GUN-89),
Technique." Proc. Crypto '82 , Santa Barbara. CA. 1982. (8: CHA-83b). pp. 145-163.
Key Words: methods, design, random.
Ciphers," Proc. ,
(8:
BET-85), pp. 51-61.
pp. 3-10.
Key Words: methods,
A.T. Sherman
"Randomized Encryption
analysis,
theory.
design.
.
d
.
1983. pp. 190-198.
Key Words: methods, Key Words: book,
RUE-88 theory.
IEEE
Trans, on Inform. Theory
York, 1986.
,
1981, pp. 39-44.
Substitution Ciphers,"
Key Words: methods,
theory.
keys.
SHA-80
RUG-84
Shamir, A.
Ruggiu, G. "Cryptology and Complexity Theories," Proc. Eurocrypt 'S4, Paris, 1984, (8:
BET-85),
"The Cryptographic Security of
Compact Knapsacks," Proc. 1980 IEEE Symp. Sec. & Privacy
.
(5:
IEE-80), pp. 94-98
pp. 3-9.
Key Words: Key Words: methods, complexity.
8-22
knapsack.
analysis,
SHA-80 Shamir, A.„and
"On
R E.
"Correlation-Immunity of Nonlinear Combining
Merkle-Hellman Cryptographic Systems," Trans, on Inform.
Functions for Cryptographic
IEEE
May
,
Simmons,
Siegenthaler, T.
the Security of the
Theory
SIM -82
SIE-84 Zippel
IEEE
Applications,"
1980, pp. 339-
Inform. Theory
,
Trans, of
September
1984, pp. 776-780.
340.
G.J., and D. Holdridge "Forward Search as a Cryptanalytic Tool Against Public Key Privacy Channel," Proc. 1982 IEEE Symp. Sec.
&
Privacy
(5:
,
IEE-82), pp.
117-128.
Key Words:
Key Words:
analysis,
knapsack.
algorithms,
Key Words: analysis,
theory.
public-
key.
SHA-81
SIF,-85
Shamir, A., R.L. Rivest,
Siegenthaler, T.
and L. Adleman "Mental Poker," in Klamer, D.E. (Ed). Mathematical Gardner Wadsworth, NY,
"Decrypting a Class of Sream Ciphers Using Ciphertext Only," IEEE Trans, on
SIM-82a Simmons, G.J. "A Game Theory Model of Digital Message
Computers January 1985, pp.
Authentication," Congressus
1981, pp. 37-43.
81-85.
Numerantium 1982,
,
,
,
pp. 413-
424.
Key Words: methods,
Key Words:
protocols.
methods.
analysis,
Key Words:
authentication,
models.
SHA-83
SIM-80 Simmons, G.J. "Secure Communications
Shamir, A. "On Generation of Computationally Strong
in
the Presence of Pervasive
Pseudo-'^andom Sequences," Trans, on Computer Systems May 1983, pp. 38-
ACM
,
Deceit," Proc. 1980
&
Symp. Sec.
IEEE
Privacy
,
(5:
Key Words:
therats,
G.J.
"The Prisoners' Problem and the Subliminal Channel," Proc. Crypto '83 Santa Barbara, ,
CA,
IEE-80), pp. 84-93.
1983, 51-67.
44.
Key Words:
SIM-83 Simmons,
(8:
methods.
Key Words:
algorithms,
SIM-81 Simmons, G.J. "A System for Point-of-Sale
random.
SHA-84
CHA-84b), pp.
SIM-83a Simmons,
analysis, methods.
G.J.
Shamir, A.
or Access, User Authntication
"Verification of Treaty
"A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Trans, of Liform. Theory September 1984, pp. 525-530.
and Identification," Proc. Crypto '81 Santa Barbara,
Compliance Revisited," Proc. 1983 IEEE Symp. Sec. &
CA, 1981,
Privacy .
,
(8:
GER-82). pp.
31-37.
(5:
IEE-83a), pp. 61-
66.
,
Key Words:
authentication.
Key Words:
verification,
methods.
Key Words:
SIM-81 a Simmons, G.J. "Half a Loaf Is Better than None: Some Novel Message
analysis,
algorithm, knapsack.
SHA-84a Shamir, A.
Integrity Problems," Proc.
'Identity-Based
1981 IEEE Symp. Sec. Privacy (5: IEE-81), pp. 65-
&
Cryptosystems and Signature Schemes," Proc. Crypto '84 Santa Barbara, CA. 1984, (8: ,
BLA-84a), pp. 45-53.
,
SIM-84 Simmons,
G.J.
"Authentication Theory/Coding Theory," Proc. Crypto '84 ,
Santa Barbara,
CA,
1984, BLA-84a), pp. 411-431.
(8:
69.
Key Words: Key Words:
authentication.
Key Words: methods, signatures.
8-23
authentication,
codes, theory.
SIM-84a Simmons, GJ. "The Subliminal Channel and Digital Signatures," Proc. Eurocrypt '84 , Paris. 1984. (8:
BET-85). pp. 364-378.
Key Words:
theory,
SIM-87a Simmons. G.J. "A Natural Taxonomy
SIM-89a Simmons,
Digital Information
Verifiable Proof of Identity
Receipts,"
and Unforgeable Transaction
.
Barbara,
CA.
88). pp.
269-288
1987. (8:
POM-
Key Words:
A
Areas pp.
^
authentication,
in
IEEE J. Selected Comm., May 1989,
435447.
Key Words: methods, protocols.
theory.
Simmons. G.J. "Message Authentication: Game on Hypergraj^." Congressus Numerantium
G.J.
Protocol to Provide
Authentication Schemes." Proc. Crypto '87 Santa
signaturtes
SIM -84b
"A
for
SLO-82
SIM-88 Sinunons. G.J. "Authentication Codes that
Sloane, N.Jj\.
1984, pp. 161-192.
Permit Arbitration,"
Cryptology, Part
Key Words: models,
Congessus Numerantium March 1988. pp. 275-290.
Cryptologia, April 1982, pp. 128-153.
Key Words:
Key Words: methods,
,
.
"Error-Correcting
Codes and 1,"
authentication.
SIM-85 Simmons, G.J. "A Secure SubUminal Channel
(?)" Proc.
codes.
SLO-82a
SIM -88a
Crypto
'85 , Santa Barbara,
authentication,
codes.
"How
CA,
Sloane,
Simmons,
N.JA.
"Error-Correcting Codes and
G.J.
to (Really)
Cryptology, Part 2,"
Share a
1985, (8: WIL-86), pp. 33-
Secret," Proc. Crypto '88 ,
41.
Santa Barbara, CA, 1988
Cryptologia, July 1982, pp. (8:
258-278.
GOL-89b).
Key Words: methods,
Key Words: methods,
theory.
Key Words: methods, SIM-85a Simmons,
"How
protocols.
Broadcast a Secret," Proc. 1985 IEEE Symp. Sec. Privacy (5: IEE-85), pp. 108-113.
&
.
SIM-88b Simmons.
G.J..
and
Multiplying Channel in a Private
Communication
G.B. Purdy "Zero-Knowledge Proofs of Identity and Veracity of
Channel," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), 339-
Transaction Receipts." Proc.
348.
Key Words: methods,
Eurocrypt '88 . Davos, 1988,
protocols.
(8:
GUN-89).
Key Words:
SIM-86 Simmons,
SME-84 Smeets, B.J.M. "On the Use of the Binary
G.J.
to (Selectively)
codes.
pp. 35.
protocols, zero.
Key Words: methods,
design.
SME-85 Smeets, B.
G.J.
"Cryptology." Encyclopedia
"A Comment on
SIM -89
Niedereiter's
Britannica, Inc., Chigaco. IL,
"Prepositioned Shared Secret
Public-Key Cryptosystem," Proc. Eurocrypt '85 Linz,
1986, pp. 913-924B.
and/or Shared Control
1985,
Key Words: methods,
Schemes," Proc. Eurocrypt '89. Houthalen 1989, (8:
Key Words:
general.
QUI-89).
key.
Britannica Encyclopaedia ,
Proc. Crypto '87
Barbara.
CA,
.
G.J.
,
SIM-87 Simmons. G.J. "An Impersonation-Proof Identity Verification
Simmons,
Key Words: methods, protocols.
analysis, public-
SPE-83 Spencer, M.E., and
"A Layered Broadcast
Scheme."
Cryptographic System," Proc. Crypto '83, Santa Barbara,
POM-
CA,
1983, 157-170.
88), pp. 211-215.
Key Words:
PIC-86), pp. 40-42.
S.E. Tavares
Santa
1987, (8:
,
(8:
authentication,
(8:
CHA-84b), pp.
Key Words: methods,
case.
8-24
case.
TAN-87
STI-87 Stinson, D.R.,
and
SA. Vanstone "A Combinatorial Approach Threshold Schemes," Proc. Crypto '87 , Santa Barbara, to
CA, 1987,
(8:
VAN-85
Tanaka, H.
POM-88),
pp.
"A
van Tilborg.
Realization
Scheme
for the
Identity-Based Cryptosystem." Proc. Crypto '87 Santa .
CA. 1987,
Barbara,
POM-
(8:
88). pp. 340-349.
Key
Encryption and Error ProbabiHty in Cryptanalysis," Proc. Crypto '85 Santa Barbara, CA. 1985. (8: WEL86), pp. 489-513. ,
330-339.
Key Words: methods, Key Words: methods,
and
J.,
D.E. Boekee "Divergence Bounds on
design.
keys.
TED-84 STI-87a
Key Words: methods,
Tedrick, T.
keys,
theory.
"A Construction of
"Fair Exchange of Secrets," Proc. Crypto '84 Santa
Authentication/Secrecy Codes
Barbara,
from Certain Combinatorial Designs," Proc. Crypto '87
84a). pp. 434-438.
R. Peralta
Key Words: methods,
Show
protocols.
Public Key," Proc. Crypto '87
Stinson, D.R.
VAN-87
,
CA. 1984.
BLA-
(8:
CA,
1987.
(8:
POM-88), pp. 255-366.
Santa Barbara,
Key Words:
authentication,
codes, design, case.
STI-88
and
J.,
"A Simple and Secure Way the VaUdity of Your
,
Santa Barbara,
van de Graaf,
CA,
1987, POM-88), pp. 128-134.
TOM-86 Tompa, M.. and H. Woll "How to Share a Secret With
Key Words: methods,
Cheaters," Proc. Crypto '86
key.
,
to
public-
Stinson, D.R.
Santa Barbara, CA, 1986,
"Some Constructions and Boimds for Authentication
ODL-87), pp. 261-265.
Codes," Journal of Cryptology Vol. 1, No. 1988, pp. 37-64.
Key Words: methods,
An
protocols.
Kluwer Academic PubUshers, NorweU. MA. 1988.
,
1,
(8:
VAN-88 van Tilborg,
J.
Introduction to Cryptology
TSU-89
Key Words:
authentication,
Tsujii, S.,
Key Words: book,
and T. Itoh
Based on Discrete Logarithm Problem," IEEE Journal on
STI-88a
Selected Areas in
Stinson, D.R.
"A Construction
Communic ations May
for
.
Authentication/Secrecy Codes
1989,
pp. 467-473.
.
Key Words: RSA,
VAL-88
authentication,
codes, design, theory.
Struik. R.
"How
and
,
J.
van
B., et al.
Break Okamoto's Cryptosystem by Reducing
(8:
to
GUN-89),
pp. 281-291.
Tilburg
"The Rao-Nam Scheme in
Key Words:
Insecure Against a Chosen
methods.
analysis,
POM-88).
Varadharajan, V.
'Trapdoor Rings and Their in Cryptography," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 369-395.
Use
,
theory.
WAG -84
,
(8:
VAR-85a
Key Words: methods,
Plaintext Attack," Proc.
Crypto '87 Santa Barbara,
CA, 1987,
theory,
case.
Lattice Bases," Proc. Eurocrvpt '88 , Davos, 1988,
STR-87
"Extension of RSA Cryptosystems to Matrix Rings," Cryptologia April
case.
2,
VaUee,
Key Words:
Varadharajan, V.
,
Key Words: methods,
Designs," Journal of
VAR-85
1985, pp. 140-153.
from Certain Combinatorial Cryptology Vol. 1, No. 1988, pp. 119-127.
general.
"An ID-Based Cryptosystem
theory design, codes.
pp.
Wagner, N.R.
445-457.
"A Public-Key Cryptosystem
Key Words:
Based on the Word Problem,"
analysis, case.
Proc. Crypto '84
Barbara,
,
Santa
CA, 1984,
(8:
BLA-
84a), pp. 19-36.
Key Words: methods,
8-25
,
(8:
case.
,
WAG-84a
WIL-82
WIN-83 M.
Wagner, N.
WiUett,
"Search for Public-Key Cryptosy stems," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 91-
on Public Key Cryptosy stems," Computer
,
"A
Tutorial
Security
,
&
January 1982, pp.
Wintemitz, R.S. "Producing a One-Way Hash Function from DES," Proc. Crypto '83 Santa Barbara, ,
CA, 1983,
72-79.
(8:
CHA-84b), pp.
203-207.
98.
Key Words: methods,
Key Words: methods,
public-
public-
Key Words: DES, methods,
key.
design.
key.
WIL-84
WAG-85
WIN-84
Williams, H.C.
Wagner, N.R., P.S. and M.R. Cain
Putter,
"Some Public-Key CryptoFunctions As Intractable as
"Using Algorithms as Keys Stream Ciphers," Proc. Eurocrypt '85 Linz, 1985, (8: PIC-86), pp. 149-155.
Factorization," Proc. Crypto '84 , Santa Barbara, CA, 1984,
Key Words: methods,
key.
in
,
(8:
BLA-84a), pp. 66-70.
Key Words: methods, keys.
WAG-86
public-
"Large-Scale Randomization
Techniques," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87), pp. 393,
CA, 1985,
(5:
IEEE Symp. Sec
Santa Barbara,
,
(8:
WIL-86), pp.
404.
358-368.
Key Words: methods,
Key Words: methods,
Key Words: DES, methods,
random.
key.
Wintemitz, R., and
M. Hellman "Chosen-Key Attacks on a Block Cipher," Cryptologia
,
CA,
Barbara,
1985, (8:
WIL-
WOL-85 Wolfram, S. "Cryptography with Cellular Automata," Proc. Crypto '85
Williams, H. (Ed.) in Cryptology, Proceedings of Crypto '85 ,
Santa Barbara, CA, 1985, WIL-86), pp. 429-432.
Santa Barbara, CA, August 1985, Lecture Notes in
Key Words: methods,
Advances
Computer Science, No. 218,
86), pp. 523-534.
Springer- Verlag,
Key Words: DES,
analysis,
New
York,
proceedings,
general.
Publication,"
Security
,
Computers
&
Jan. 1983, pp. 41-
48.
case.
WUN-83 "Factoring
Key Words: Weingarten, F.W. "Controlling Cryptographic
,
(8:
Wunderlich, M.C.
1986
design.
WEI-83
analysis, methods.
public-
WIL-86
Webster, A.F., and S.E. Tavares "On the Design of S -Boxes," Proc. Crypto '85 Santa
,
January 1987, pp. 16-20.
Key Words:
WEB-85
,
IEE-84), pp. 121-126.
WIN-87
WiUiams, H.C. "An M3 PubUc-Key Encryption Scheme," Proc. Crypto '85
Proc. 1984
design.
WIL-85
Wagner, N.
Wintemitz, R.S. "A Secure One-Way Hash Function Built from DES,"
Numbers on
the
Massively Parallel Computer," Proc. Crypto '83 Santa ,
Barbara,
WIN-82
CA, 1983,
(8:
CIL\-
84b), pp. 87-102.
Wintemitz, R.S. "Security of a Keystream with Secret Initial Value," Proc. Crypto '82 Santa Barbara,
Key Words:
analysis, methods,
hardware.
,
Key Words:
policy, research.
CA, 1982,
(8:
CHA-83b), pp.
WIL-80 Williams, H.C.
"A Modification of the RSA Public-Key Cryptosystem,"
WUN-83 a WunderUch, M.C. "Recent Advances
133-137.
Key Words:
analysis,
methods.
in the
Design and Implementation of Large Integer Factorization Algorithms," Proc. 1983 IEEE
&
IEEE
Privacy Symp. Sec. IEE-83a), pp. 67-71.
Trans, on Inform. Theory November 1980, pp. ,
726-729.
Key Words:
Key Words: RSA, methods,
algorithms.
design.
8-26
analysis,
,
(5:
YAO-82a
YAC-89
YUN-84 Yung, M.
Yacobi, Y., and Z. Shmuley
Yao, A.C.
"On Key
"Protocol for Secure
"Cryptoprotocols: Subscription
Computation," Proc, 23d
to a Public
Distribution
Systems," Proc. Crypto '89
Santa Barbara, CA. 1989
.
IEEE Symposium on
(8:
Foundations of Computer Science November 1982, pp. 160-164.
BRA-89).
.
Key Words: methods,
keys.
Key, the Secret Blocking and die Multi-Player Mental Poker Game," Proc. Crypto '84 Santa Barbara, ,
CA. 1984.
(8:
BLA-84a), pp.
439-453.
YAG-85
Key Words: methods,
Yagisawa,
M.
"A New Method
Key Words: methods,
protocols. for
protocols.
Realizing Public-Key Cryptosy stems," Cryptologia. October 1985, pp. 360-371.
Key Words: methods,
public-
YAO-86 Yao. A.C. "How to Generate and Exchange Secrets." Proc, 27th
IEEE Symposium on Foimdations of Computer Science October 1986, pp. 162-167.
key.
,
YAM-86 Yamamoto, H. "On Secret Sharing Communication Systems with
Two IEEE
May
Key Words: methods,
Zheng, Y., T. Matsumoto, and H. Imai "On the Construction of Block Ciphers and Not Relying on
Any Unproved
Hypotheses,"
Proc Crypto '89 Santa Barbara, CA, 1989 (8: BRA,
89).
protocols.
Key Words: methods,
or Three Channels,"
Trans. Inform. Theory
ZHE-89
,
Yu. K.W.. and T.L. Yu "Data Encryption Based on
1986.
Key Words: methods, protocols.
design.
YUK-89 ZOR-87 Zorbette, G.
"Breaking the Enemy's Code,"
Time Reversal Algorithms." The Computer Journal (U.K.).
IEEE Spectrum September
June 1989. pp. 241-245.
1987, pp. 47-51.
Key Words: methods,
Key Words:
.
.
YAO-82 Yao, A.C. "Theory and Applications of Trapdoor Functions," Proc,
algorithms.
23d IEEE Symposium on Foundations of Comp. Science , November 1982, pp. 80-91.
Key Words: methods,
theory.
8-27
analysis, methods.
9.
Privacy
This section cites publications on the problem of protecting information privacy in computer-based record-keeping systems, descriptions of the privacy problem, legislative measures in the United States and internationally, privacy aspects of international transborder data flows (TDF), and problems in specific application areas (e.g., credit reporting, criminal justice, employment, health care). ABA-82
ADA-84
on Privacy: Law, Ethics, and Technology. National Symposium on Invited Papers
Personal Privacy and Information Technology
,
American Bar Association and AFIPS, Washington. DC,
AUE-83
Adams. J.M. "Canada's Future TDF Policy: Reconciling Free Flow of Information with National Sovereignty," Transnational Data Report. Oct/Nov. 1983,
Key Words: TDF, proceedings,
Adler, A. Litigation
Symposium on Personal
Freedom of Information Act and Privacy Act Center for
Under
the Federal
Key Words: management, records.
laws,
in Africa,"
Transnational Data Report Aug/Sept. 1984, pp. 325-326.
Information Privacy,"
Computers
and Crime Control University Press of America, Lanham, MD, 1984.
1985, pp. 103-107.
Justice, Privacy,
Under the Federal Freedom of Information Act and Privacy Act, American
Key Words:
laws, criminal,
BAS-84 Basche,
AUen, F.A. "1984 and the Eclipse of Private Worlds," Michigan Quarterly Review Fall 1983. ,
laws,
Managing
The Impact on
International
Business, Report No. 852,
Conference Board,
New
Key Words: TDF. foreign.
"Privacy Rights in Personal Information," Annual Survey
of American
Law
,
June 1987.
pp. 495-666.
Key Words:
laws, protection.
9-1
The
York.
1984.
ASA-87 Key Words: FOI, PA.
Transmission:
analysis, general.
Washington, DC, 1989.
use.
J.R., Jr.
Regulating International Data
Key Words:
Civil Liberties Union,
Key Words: managemnt. records.
ALL-83
Litigation
Security , June
,
guidelines,
ACL-89
&
Albanese. S.
records, use. foreign, laws.
I.L.
"Professional ResponsibiUty for
,
Key Words:
AUE-85 Auerbach,
ALB-84
Laws
.
Washington, DC. 1985.
general.
Abass. O. "Guidelines for Informatics
Information Privacy." Proc. fflP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 3-10.
,
use.
ABA-84
I.L.
National Security Studies,
Key Words: FOI, PA. proceedings,
laws, foreign.
.
35+
"Professional Responsibility for
Report on a National
Key Words:
Key Words:
Auerbach.
ADL-85
.
p.
AUE-84
foreign.
Privacy and Information Technology American Bar Association and AFIPS. Washington, DC. 1982.
March 1983.
policy,
general.
ABA-82a
Regulation."
Telecommunications Policy
pp. 405-411.
1982.
Key Words:
Auerbach. L. "Privacy and Canadian Telecommunication
policy,
BEM-82
BAS-89 Bass, G., and D. Plocher
"Strengthening Federal
Information Policy: Opportunities and Realities at
0MB," Journal
Software
Summer
,
Law
BIG-86
Bemer, R.W. "Incorrect Data and Social Harm," Computer Security Journal Winter 1982, pp. 51-
Bigelow, R. "Computers and Privacy
— An
American Perspective,"
56.
Information Age (U.K.), July 1986, pp. 134-140.
Key Words: management,
Key Words:
.
.
1989, pp.
413-459.
rights, laws.
threats.
Key Words:
BIN-83
policy,
BEQ-81
government.
Bing,
BEC-84
The Cashless
Becker, a
New
Sons.
Society:
Crossroads
at the
J.
Information Technology and
J.
"New Technology and
Bequai, A.
New
J.
,
EFTS
Wiley
&
York, 1981.
the
Law: Likely Impact and Future Trends," Computers & Law ,
February 1983, pp. 2-6.
International Order ,
Transnational Data Reporting Service, Springfield,
Key Words:
book, general.
VA,
Key Words:
rights, laws,
records.
BER-87
1984.
Berman.
Key Words: book,
general.
BEE-84
BIN-83a
J.J.
"National Security vs. Access
Bing,
to
"Computers and
Computer Databases: A New Threat to Freedom of
Beer, B.
Information," Software
"Legal Aspects of Automatic
Journal
Trade Data Exchange," Transnational Data Report,
15.
Jan/Febr., 1984, pp. 52-57.
Key Words: FOI,
,
Law
Winter 1987, pp.
1-
Law — The
Regulatory Envirorunent of Information Services," Proc. mP/Sec. '83 Stockholm, 1983, (2: FAK-83), pp. 253,
264. threat,
Key Words:
policy.
Key Words: TDF,
J.,
laws, case.
requirements,
rights.
BER-89 BEL-83
Berkvens,
Beling, C.T.
'Transborder Data Flow: International Privacy Protection and Free
Flow of
BIN-86
J.
"Dutch Banks' Privacy Code of Conduct," Transnational Data Report, June/July 1988, pp. 12-17.
Information," Boston College
&
International
Law Review
,
Computer
Spring 1983,
Key Words:
policy, foreign,
Key Words: TDF,
policy,
laws.
BEL-83a al.
"Mass-Informatics and Their
Berman, J.J. "The Right to Know: Public Access to Electronic Public Journal .
Summer
Law
1989, pp.
491-530.
proceedings,
J., and H.H. Bruggeman "The Personal Model of Data," Computers & Security
Biskup,
,
Key Words:
Key Words: BER-89b Berman,
A
J.,
and
J.
Goldman
Federal Right of
Information Privacy:
Need
for
The
Reform Benton ,
Foundation, Washington, 1989.
Key Words: book, PA, general.
pp. 575-597.
rights, records.
83. Proc. IFIP Congr. Paris .
North-Holland. Amsterdam, 1983.
BIS-88
December 1988,
on Every-Day
Life," Information Processing
requirements,
laws.
Information," Software
Belkin, N. et
general.
Information Age (U.K.), April 1986, pp. 85-94.
Key Words: BER-89a
Key Words:
J.
"Beyond 1984: The Law and Information Technology in Tomorrow's Society,"
case.
pp. 591-624.
Implications
Bing,
DC,
records, general.
A
BIS-89
BUR-84b
Biskup,
CHA-84a
Burton, R.P.. and
J.
"Protection of Privacy and Confidentiality in Medical
Information Systems:
Privacy
Problems and Guidelines,"
Deceased Persons," Transnational Data Report,
Proc.
m WG
11.3 (Data
Base) Workshop
(6:
.
in-89),
Laws on
J., and F. Chamoux "French Data Protection: The First Five Years," Transnational Data Report, April/May 1984, pp. 163-166.
Chamoux,
R.D. Malmrose "The Effects of Recent Rights of
June/July 1984, pp. 237-242.
Key Words:
laws, foreign.
1989.
Key Words:
Key Words:
laws, case.
protection,
BUR-85
medical.
BRA-84 Branscomb, A.W. "The Legal Infrastructure
for
Global Information Flows,"
Shut: Enhancing the
Burgess, B.C.
Right to Know and Right to Privacy Canadian House of
"Restrictions in Data Transfer
Commons, Canadinan
and Use," Transnational Data
Government Printing, Ottawa, March 1987.
,
Report. June 1985, pp. 217219.
Transnational Data Report, June/July 1984. pp. 247-251.
CHC-87 Open and
Key Words: Key Words: TDF,
laws, rights,
foreign.
requirements.
Key Words: TDF,
CHE-84
laws,
BUR-87
design.
BRO-84 Brown, R.W.
"A Model Code
for
Burton, R.P., and
Cheah, C.W. "An Econometric Analysis of
R.D. Malmrose "Impact of Privacy Laws on
Transnational Data Report
Religious Organizations,"
December 1984,
Transnational Commerce?,"
Transnational Data Report.
Transnational Data Report,
June 1987. pp. 5-9.
March 1984,
regulation,
Flow
A
CHP-87
New
Information Technology and the Erosion of Privacy Report
and Data Protection
of the Commission on Humanities and Public Affairs,
Information and Communication Technologies
Plan For Action The ,
Business Roundtable, York, January 1985.
New
analysis,
laws, case.
CEC-84 International Information
,
pp. 475-479
case.
TDF.
BRT-85
Regulation,"
Key Words: TDF,
pp. 117-124.
Key Words:
Key Words:
TDF
,
Information Technology Task Force, Council of European
,
Claremont Graduate School, Claremont.
CA,
1987.
Communities, Brussels, 1984.
Key Words: TDF,
Key Words:
guidelines.
Key Words:
BUR-84 Bumham, D. The Rise of State ,
Key Words:
requirements,
rights.
rights.
CLA-81 the
Computer
Random House,
Westminster,
requirements,
MD,
1984
threats, general.
CHA-83
Clariana, G.G.
'TDF,
DaU
Chavda, H. "Data Protection in the
International
Computing Industry—
Transnational Data Report,
Survey," Information
Age
Protection and
Law,"
July/August 1981, pp. 31-35.
(UK), October 1983, pp. 211-
BUR-84a
Key Words: TDF,
221.
Burkert, H.
"Information Law Problems For the Eighties," Transnational Data Report, Aug/Sept. 1984, pp. 331-336.
Key Words: requirements.
rights,
foreign.
laws,
Key Words:
protection, case.
CLA-88
CHA-84
Clarke, R.A.
Chaum. D. "A New Paradigm
"Information Technology and for
Dataveillance,"
Individuals in the Information
Communications of
Age," Proc. 1984 IEEE Symp. on Sec. & Privacy (5: lEE-
May
the
ACM
1988, pp. 498-512.
,
84), pp. 99-103.
Key Words: rights.
Key Words:
protection, rights.
9-3
surveillance,
,
CLU-88
COE-86
COL-85
Clukey, L.
Protection of Personal Data
"The Electronic Communications Privacy Act of 1986: The Imact on Software Communication
Used
Technologies," Software
for Purposes of Direct
Marketing Reconunendation R(85)20, Council of Europe, ,
Strassbourg, France, 1986.
Law
Journal. Spring 1988, pp.
Key Words:
243-263.
foreign private, records.
Key Words:
analysis, laws.
protection,
COE-86a Used
Purposes Recommendation R(88)l, Council of Europe, Strassbourg, France, 1986.
Europe, Strassbourg, France,
Key Words:
28 January 1981.
foreign, soci^, records.
jwotection,
Challenges to the U.S.
European Community: Data Protection Laws," N.Y.U. Journal on International Law and Politics Summer 1985, .
pp. 893-947. foreign,
analysis.
for Social Security
Convention on Protection of Individuals with Regard to Automatic Processing of Personal Data, Council of
Key Words:
"New
Multinational Corporations in
Key Words: TDF.
Protection of Personal Data
COE-81
Cole, P.E.
,
protection,
COE-88
COM-83 "Computerized Bank Accounts, Credit Cards, and George Orwell's 1984," Computers and
People March/April 1983, pp. ,
27-1-
Key Words:
threats, rights.
Regulating the Use of
foreign.
Personal Data in the Police
COE-81 a
Sector
,
Recommendation
CON-80 International Data
Flow
,
Regulations for Automated
R(87)15, Council of Europe,
Hearings Before Committee on
Medical Data Banks
Strassbourg, France, 1988.
Government Operations, House
Coimcil of Europ>e,
Key Words:
Strassbourg, France, 1981.
foreign, criminal, records.
of Representatives, U.S. Congress, Washington, DC, 1980.
,
Recommendation R(81)l,
Key Words:
protection,
foreign medical, records..
COE-89
Key Words: TDF,
"Protection of Personal Data
Used
COE-83 The
protection,
for
laws.
Congress.
Employment
Purposes," Coimcil of Europe
CON-80a
Recommendation No. R(89)2,
International Information
Computerized Legal
Transnational Data Report,
Flow: Forging a
Information Services , Recommendation R(83)3, Coimcil of Europe,
March 1989,
Framework House Report No. 96-1535, U.S. Congress, Washington, DC, December
Strassbourg, France, 1984.
records,
Protection of Users of
Key Words:
protection,
foreign private, records.
Key Words:
protection,
employment.
COE-89a
New
Technologies:
Challenge
COE-84
pp. 26-28.
to
A
Privacy
New
,
11, 1980.
Key Words: TDF,
Congress.
CON-83
Protection? , Council of
Oversight of Computer
Protection of Personal Data
Europe, Strassbourg, France,
Matching
Used
1989.
Mismanagement in Government Programs
and
for Scientific Research
Statistics ,
Recommendation R(83)10,
Key Words:
Council of Europe,
foreign.
requirements,
to Detect
Fraud and ,
Hearings, Senate Subcommittee
on Oversight of Government
Strassboiu'g, France, 1984.
Affairs,
Washington, DC,
1983.
Key Words:
Flow
protection,
Key Words: Congress,
foreign, statistical, social.
matching.
9-4
CON-83a
CON-87
Who
Cares About Privacy? Oversight of the Privacy Act of 1974 by Office of Management and Budget and by Congress No. 98-455,
CUL-87
Computer Matching and Privacy Act of 1987,
"Protecting Individual Privacy
Hearings, Subcommittee of
House of Representatives,
House Committee on Government Operations, U.S. Congress, Washington, DC,
U.S. Congress, Washington,
1987.
.
DC.
Shadow of a National Data Base," Capital University Law Review Fall '87. pp. 117-141. in
.
Key Words:
threats,
government
1983.
Key Words: Key Words:
Congress, PA,
DAM-83
Congress,
matching.
oversight.
CON-88
CON-83b
Operations, U.S. Congress,
Computer Matching and Privacy Act of 1988, Report 100-802. House Committee on Government OpCTations. U.S. Congress, Washington, DC,
Washington, DC, 1983.
July 27.1988.
Key Words:
Key Words:
Oversight of the Privacy Act of 1974 Hearings, House ,
Committee on Government
Danunan, U. "Auditing Data Protection" Transnational Data Report April-May 1983, pp. 161-163.
Key Words: management records.
DOC-88 Dockrill, C.
Congress, PA,
"Computer Data Banks and
Congress,
Personal Information:
matching.
oversight.
Protection Against Negligent
CON-88a
CON-85 Unauthorized Access to Individual Medical Records Hearings,
on on
The Computer Matching and ,
House Committee
Judiciary,
Subcommittee
Civil and Constitutional
Rights, U.S. Congress, Washington, DC, 1985.
Privacy Act of 1988
.
P.L.
100-503. (5 U.S.C. 552a), U.S. Congress, Washington,
DC
Key Words:
Criminal Justice Information Policy: Intelligence
Cooper, G.R., and
Computer Matching and Privacy Act of 1986 Hearings, Subcommittee on Oversight of Government Management, Senate Commitee on Government ,
R.R. Belair Privacy and the Private Employer Bureau of Justice Statistics, U.S. Department of ,
Justice.
Washington, DC,
Key Words:
Washington. DC, 1986.
employment
Congress,
Electronic Communications
Privacy Act of 1986
,
P.L.
99-508, (18 U.S.C. 2703), 1986, U.S. Congress, Washington, DC, 1986.
policy, criminal,
"Data Protection's
Many
Comp. Sec. Symposium Phoenix.
Tentacles," Proc.
COO-83 S.L. Kirk
&
Priv.
.
"Privacy, Data Protection and
AR. 1981.
Transborder Data Flows: Corporate Response," The
13-24.
Business Lawyer November 1983, pp. 33-66. ,
Key Words: TDF, case.
Key Words:
Key Words:
Donovan, T.G.
A
CON-86a
February 1985.
DON-81
guidelines,
Coombe, G.W., and
matching.
Department of Justice, Bureau of Justice Statistics. NCJ95787. Washington, DC.
rights.
1981.
Affairs, U.S. Congress,
Key Words:
and
Investigative Records , U.S.
COO-81
CON-86
protection,
DOJ-85
Congress,
protection,
medical.
Key Words: records.
1988.
matching.
Key Words:
Disclosure," Dalhousie Law Journal March 1988, pp. 546580.
Congress, laws.
policy,
(1:
Key Words:
HON-81).
pp.
laws, records,
general.
DUB-83 Dubrow. A. "Your Medical Records: How Private Are They?." California Lawyer Apr. 1983, p. 33+. .
Key Words: records.
9-5
threats, medical,
FAR-83
DUF-82 Duffy. D.J. "Privacy vs. Disclosure:
FLA-85
Famsworth, D.P.
Balancing Employee and
"Data Privacy: An American View of European
Employer Rights," Employee
Legislation," Transnational
Relations
Law
Journal
,
Data Report July/August ,
Spring 1982, pp. 594-609.
1983, pp. 285-290.
Key Words:
Key Words:
Flaherty, D.H.
Protecting Privacy in
Way
laws, foreign.
,
Knowledge Industry Publicat., White Plains, NY. 1985.
Key Words: book, rights,
Two-
Electronic Services
rights,
laws.
employment.
FLA-85a
FIS-80 Fishman, W.L.
EAT-86
Flaherty. D.H.
Eaton, J.W.
"Introduction to Transborder
Privacy and Data Protection:
Card-Carrying Americans: Privacy, Security, and the National ID Card Debate,
Data Flow," Stanford Jotmial
An
Rowman &
Law Summer
of Intemat.
.
1980, pp. 1-26.
International BibUography.
Knowledge Industry Publicat.. White Plains. NY, 1985.
Littlefield,
Key Words: TDF.
Totowa, NJ, 1986.
policies,
Key Words: book,
general.
rights.
Key Words: book,
FLA-86
laws,
ns-81
rights.
Flaherty, D.
Fisher. J.F.
ENN-84
"Access
Ennison, T.,
to Fair Credit
Reports: Current Practices and
Jr.
"Sovereignty Considerations
Proposed Legislation."
Perspective," Transnational
American Business Law Journal FaU 1981. pp. 319-
Data Report April/May 1984,
342.
in
TDF: Developing-Country ,
pp. 175-181.
.
rights,
Societies," Science,
Technology and Human Values No. 1, 1986, pp. 1-12. ,
Key Words:
Key Words: TDF,
"Governmental Surveillance and Bureaucratic AccoimtabiUty: Data Protection Agencies in the Western
credit, laws,
Key Words:
laws, rights,
foreign.
rights.
foreign.
FLA-86a
FLA-84
EVA-81
Flaherty. D.H.
Evans, A.C. "Eiu-opean Data Protection Law," American J. of
Law
Comparative
,
Fall 1981,
pp. 571-582.
Key Words: TDF.
.
Ontario, laws, foreign,
Flaherty, D.
Nineteen Eighty-Four and After Final Report of Bellagio Conf. University of Western Ontario, London,
May
Key Words:
15, 1984.
proceedings,
"On Making Data
Protection
Effective," Transnational
Data
Report, April 1986, pp. 15-16.
Key Words:
laws, protection.
FLA-89 Flaherty, D.H.
rights.
Protecting Privacy in
EVE-80
FLA-84a
Surveillance Societies .
Everest, G.C.
Flaherty, D.H., E.H. Hanis,
University of North Carolina
"Nonxmiform Privacy Laws:
and S.P. Mitchell Privacy and Access to Government Data for
Press,
Implications at Attempts at
Uniformity," Hoffman, L.J.
An
Computers and Privacy in the Next Decade Academic Press, New York,
Bibliography Knowledge
1980, pp. 141-150.
Plains,
Key Words:
Key Words: book,
(Ed.),
,
Research:
International
Chapel
Hill,
Key Words: book,
NC,
1989.
laws,
foreign.
,
Industry Pubhcat., White
NY,
1984.
FLE-86 Fletcher, P.T.
"Current Issues in guidelines, laws.
general.
Confidentiality:
Computerized
Information Systems, Medical Records, and Patients' Rights,"
Computers & Society Summer/Fall 1986. pp. 8-18. .
Key Words:
9-6
rights, medical.
FLR-84 "Damages Under
GAO-86 the Privacy
Act of 1974: Compensation and Deterrence," Fordam Law Review March 1984, p. ,
611+.
GOT-84
Privacy Act: Federal Agencies' Implementation
Be Improved GAO/GGD-86,
107, U.S. General Accounting
DC,
Office, Washington,
Key Words: PA,
Can
August 1986.
Key Words: PA,
GRA-84 Gray, J., L.B. McSweeney, and J.C. Shaw Information Disclosure and the Multinational Corporation John Wiley & Sons, Ltd., Chichester. UK, 1984.
GAR-85
"The Vulnerability of Computerized Society," Transnational Data Report, July/August 1981. pp. 21-25.
Key Words:
Garzon, G. "Legal Framework for International Information" Transnational Data Report. March 1985, pp. 101-107.
.
Key Words:
threats, laws.
Key Words: TDF. FRE-83
,
447-449. rights, foreign.
"Computerized Medical Data
Gassman, H.P. (Ed.) Transborder Data Flows. Proceedings of 1973 OECD Conference North-
Issues," Proc. IFIP/Sec. '86 ,
Monte
Carlo, 1986, (2:
GRI-
89).
New
Key Words:
York,
records, medical.
1985.
Freedman, W.
GRE-80
The Right of Privacy in Computer Age Quorum
the
,
Books,
New
Key Words:
Greguras, F.M.
proceedings,
"Information Systems and Privacy Issues in the U.S.A.." Information Privacy (U.K.). May 1980. pp. 90-97.
general.
York, 1987
GEB-88
Key Words:
book, rights,
FUT-83 "Orwell's 1984: to the
How
Gebhardt, H.-P.
"Data Protection in Telecommunication Services," Transnational Data Report,
laws.
The
~
Privacy and Delinquency
Holland/Elsevier Science Publishing Co..
FRE-87
laws.
Grandjean, J.R.
GAS-85
,
Key Words:
TDF,
GRA-86
J.
"The Right to Be Alone in Sweden," Transnational Data Report December 1983, pp.
book.
laws,
foreign.
Freese,
FIN-
Key Words:
laws. J.
'84, Toronto, 1984, (2:
oversight,
FRE-81 Freese,
Information," Proc. IFIP/Sec. 85). pp. 29-39.
protection,
uses.
Godieb. C.C. "Equity in Access to
Close
December 1983.
Greguras. F.M.
Key Words: TDF.
protection.
"Anticipating the Impact of
EFTS on Key Words:
threats, general.
GES-82
Eligibility Verification
and
Privacy in Federal Benefit
Programs: A Delicated Balance GAO/HRD-85-22. U.S. General Accounting Office, Washington, DC,
"Report on Privacy: Who Is Watching You," U.S. News
World Report, July
1.
1985.
&
matching.
goverrunent,
Comp.
Sec.
&
Phoenix, AR, pp. 25-45.
Symp. HON-81),
Priv. (1:
.
Key Words: EFTS,
pp. 34-37.
requirements.
Key Words:
threats, rights.
GRO-82 GOL-89 Golden,
Key Words:
&
12, 1982,
,
March
Privacy
Information Practices." Proc.
Gest, T.. and P.M. Scherschel
GAO-85
rights, general.
GRE-81
June/July, 1988, pp. 18-23.
Truth?," Special Issue,
Futurist ,
Key Words:
J.S.
"Information on the Federal
Government's Electronic Databases: Is There a First
Grossman. G.S. 'Transborder Data Flow: Separating the Privacy Interests of Individuals and Corporations." Northwestem
Amendment Right of Access?," Software Law
Journal of International
Journal Winter 1989. pp. 65-
9-11.
.
.
90.
Key Words: TDF, Key Words: government, laws.
9-7
Law
and Business Spring 1982, pp.
general.
laws,
HAR-86
GUR-84
HIR-89
Harding, N.G.L
Gurry, F.
Breach of Confidence Oxford University Press, Clarendon (UK), 1984.
Key Words: book,
Hiramatsu, T. "Japan Adopts Privacy Protection Act," Transnational
Data Protection in Medicine, Proc. of a National Meeting, Oxford, England, February 1986, HMSO Pubhcations Center, London. 1986.
,
rights,
Data Report, February 1989, pp. 22-29.
Key Words:
laws.
Key Words:
HAE-84
HOF-80
medical.
Hoffman, L.J. (Ed.) Computers and Privacy in the Next Decade Academic Press.
Haeck, L.
HEL-85
'Transborder (Private) Data
Flow and
Hely, M.H., and
the International
Airlines," Transnational Data
.
New
M.T. Morrison
Report, Aug/Sept. 1984, pp.
Data Protection Act of 1984
343-345.
The Computer
Key Words:
proceedings,
general.
U.K., 1985.
policy,
HON-80
foreign.
Key Words:
laws, foreign.
HAM-84 HER-88
Hamelink, C.J. Transnational Data Flows in the Information
Age
,
Hernandez, R.T. "ECPA and Online Computer
Communic. November 1988,
Transnational Data Reporting
Privacy," Federal
Service, Springfield, Va,
Law
1984.
pp. 17-41
Key Words: TDF,
Journal ,
Key Words:
policy,
laws,
government.
foreign.
HAR-84
Catalog of Automated Front-
al.
The Road After
1984: Impact
of Technology on Society. Public Opinion Study Southern New England Telephone Company, New Haven, CT, 1984.
A
,
End
threats, rights,
,
111.
Key Words:
Techniques OAI-85-H-51, U.S. Department of Health and Human Services. Washington. DC. 1985. .
guidelines,
matching.
IBI-80 Transborder Data Flow Policies Papers Presented at IBI Conference in Rome, June 1980. Unipub, New York, 1981.
Key Words:
Privacy Begins
An Economic
Measures," Transnational Data Report. March 1984, pp. 109-
Key Words:
laws, foreign.
laws, foreign.
NY,
Key Words:
1983. policy, rights,
case.
Business Guide to Privacy and Data Protection Legislation ,
No. 384, International
Chamber of Commerce,
HIR-87 Hiramatsu, T.
Key Words:
Corporation, White
ICC-85
112.
,
pp. 133-152.
Home-IBM
Experience with Developing and Administration of Employee Privacy Practices Plains,
Hiramatsu, T. "Japan's Privacy Protection
Analysis," International
Review of Law and Economics December 1985,
at
TDF.
,
HIR-84 Hartmann, J., and S.M. Renas "Anglo-American Privacy
proceedings,
IBM-83
IBM
laws.
HAR-85
laws, foreign.
Eligibility Verification
Key Words:
Key Words:
Hondius, F.W. "Data Law in Europe," Stanford J. of International Law Summer 1980, pp. 87-
,
HHS-85
Harris, L. et
Law:
York, 1980.
,
Services, Ltd.,
Easterton, Devizes, Wilts,
Key Words: TDF,
laws, foreign.
rights, laws,
"Japan's
New
Personal Data
Data Report. October 1987, pp. 14-
Bill," Transnational
16.
Key Words:
Paris,
1985.
laws, foreign.
9-8
Key Words: TDF, laws.
guidelines,
KEN-86
ICC-85a Issues in Computing,
Telecommunications and
Kenny, J.J. (Ed.) Data Privacy & Security.
Information Policy. -No. 385,
Pergamon
International
Commerce,
Chamber of
KIR-87 Kirby,
Press, Elmsford.
The Ten Information Commandments," University of Cincinnatti Law Review 1987.
NJ. 1986
.
Key Words: book,
general.
pp. 745-759.
policy,
KIR-80
foreign.
Kirby.
IRV-86
Key Words:
M.D.
'Transborder Data Flows and
Irving, R.H.,
C.A. Higgins,
and F.R. Safayeni "Computerized Performance Monitoring Systems: Use and Abuse," Communications of the August 1986, pp. 794-801.
ACM
.
Key Words: rights, employment
the 'Basic Rules' of Privacy,"
Stanford Journal of International
Law Siunmer
Key Words: TDF,
Law Review
Summer
'88, pp.
Key Words:
,
703-902.
rights, laws,
general.
Model
Statute."
UCLA Law
Key Words:
p.
Review
A
rights,
medical.
KUS-84
History of in the
Federal Government,
Computerworld, December
14,
1981, pp. 2ff.
Key Words:
matching,
Kusserow, R.P. "The Government Needs Computer Matching to Root Out Waste and Fraud." Communications of the ACM. June 1984. pp. 542-545.
Key Words: M.D.
Kirby,
"Right to Financial Privacy:
"Urgent Need to Solve Legal Difficulties,"
Jan./Febr. 1988, pp.
TDF
Landever, A.R. "Electronic Surveillance,
Aug/Sept. 1984. pp. 347-350.
Computers and the Fourth Amendment." University of Toledo Law Review Winter
Key Words: TDF, rights, laws,
LAN-84
Transnational Data Report.
37-51.
Key Words:
requirements,
case, matching, rights.
Jones, S.E.
Emerging Standards of Bank Compliance," Banking Law
laws,
,
1984. pp. 597-640.
rights.
EFTS.
Key Words:
KIR-86
KAT-88
Kirby.
M.D.
surveillance,
rights.
Katz. J.E.
'Ten Information
"Public Policy Origins of
Commandments."
Telecommunications Privacy and the Emerging Issues."
Transnational Data Report,
Lauffer. S.
June 1986. pp. 19-22.
International Issues in
Key Words:
Communication Technology and Policy Academy for
Information Age (U.K.), July 1988, pp. 169-176.
LAU-83
rights, laws, use.
,
Educational Development,
Key Words: case.
policy, laws,
Washington, DC, 1983.
KIR-86a Kirby,
,
1349-h.
J.
KIR-84
,
Proposal
general.
JON-88
Journal
A
Patient Access
August 1983.
"Privacy:
Marshall
Klugman. E. 'Toward a Uniform Right to
and Information Practices rights,
foreign.
Kirchner,
The John
KLU-83
for a
Computer Matching
"Privacy Edition,"
rights, laws, use.
Medical Records:
.
1980. pp. 27-66.
KIR-81
JML-88
Information and
to
Privacy:
Paris, 1985.
Key Words: TDF,
M.D.
"Access
M.D.
"Human Rights - The Challenge of New Technology," Information (U.K.). October 1986, pp. 200-207. Key Words:
Key Words: book, foreign.
Age
rights, general.
9-9
policy,
MAR-80
LAU-86
MCC-80
Laudon, K.C.
Marchand. D.A.
Dossier Society: Value
The
Choices in the Design of National Information Systems Columbia University Press, New York, 1986
Criminal Justice Records . Information Resources Press,
.
McConnell, R.M.
Politics of Privacy,
Arlington,
VA,
Key Words:
and
1980.
"Designing for Privacy: The Data Vault." in RuUo, T.A.
Advances in Computer Management. Vol. 1, Heyden, Philadelphia, PA. (Ed.).
Security
policy, criminal.
1980. pp. 106-121.
Key Words: book,
MAR-84
surveillance.
Key Words: "protection,
Marx. G.T.. and N. Reichman
LAU-86a Laudon, K.C. "Data Quality and Due Process in Large Interorganizational Record
MCK-83
"Routinizing the Discovery of Secrets:
Computers as
Informants." Americ.
Systems," Communications of the January 1986, pp. .
ACM
Behavioral Scientist, 1984.
Key Words:
5-11.
design.
McKay, G.A.
A
"Privacy Call for Action." Proc. IFIP/Sec. '83 .
March
Stockhohn, 1983,
(2:
FAK-83),
pp. 47-55.
threats, rights.
Key Words:
protection,
general.
Key Words:
MAR-86
requirements,
Marx. G.T., and
S. Sherizen "Monitoring the Job: How to Protect Privacy as well as
case.
LEA-86 Leahy.
Property." Technology
P.
Review.
"Privacy and Progress." Computers & Security
MEL-82
rights, general.
LER-84
Meldman,
Marx. G.T. "Surveillance:
E.J.
Data Wars Are Brewing," IEEE Spectrum. "International
July 1984. p.
rights, criminal.
threats, rights.
MAR-86a Lemer,
Justice,"
Information Privacy (U.K.). March 1981. pp. 43-49.
Key Words:
pp. 347-349.
Key Words: Key Words:
1986, pp.
McLaughlan, W. "Privacy and Criminal
63-72.
.
December 1986.
Nov ./Dec.
MCL-81
Game
A
Dangerous
Played With Matches."
Abacus
.
J.A.
"Privacy Expectations in an
Fall 1986. pp. 60-64.
Information Age," Information Privacy (U.K.). Winter 1982, pp. 81-89.
454-1-.
Key Words: Key Words: TDF.
threats,
matching.
Key Words:
rights, laws.
policy.
MON-88
MAR-88
LIN-89 Linowes. D.F. Privacy in America:
Your
W.
Marx, G.T.
Monssen,
Undercover: Police
"Airline Industry Takes Data
Surveillance in America,
Protection Seriously,"
Private Life in the Public
University of California Press,
Transnational Data Report.
Eye? University of
Berkeley,
Is
Illinois
.
CA, 1988
January 1988, pp. 17-20.
Press, Urbana, IL. 1989.
Key Words: book, Key Words: book,
Madey, B.G. "Computer Privacy
MAI-81 Maisonrouge. J.G. "Regulation of International Information Hows,"
Information Society 1.
Key Words:
.
The Vol.
1981. pp. 17-30.
1,
in
America: Conflicting Practices and Policy Choices." Proc. 1986 IEEE Symp. Sec. & Priv. (5: IEE-86), pp. 219,
Mowshowitz. A. "On Approaches
to the Study of Social Issues in Computing." Communications of the November 1981. . pp. 146-155.
ACM
223.
Key Words: Key Words: TDF.
policy, rights.
MOW-81
MAT-85
rights.
No.
threats.
threats,
policy,
Key Words:
policy, laws.
laws.
9-10
policy, social.
NIB-84
OEC-84 An Exploration
Niblett, B.
Data Protection Act of 1984
Longman Group
.
Limited,
OTA-86
of Legal Issues In Informationa and
Telecommunication
London, 1984.
Technologies
.
Electronic Record Systems and
OECD,
Paris,
1984.
Key Words: book,
Key Words: TDF,
OTA-CIT-
,
Technology Assessment, Washington, DC. June 1986.
laws,
policy.
NOV-80 'Transborder Data Flows and International
Framework
Law:
A
1984
And Beyond: The
Social
Technology Proc. 1984 Berlin
for Policy-
.
Journal of International
Law
.
Conf. 1986.
OECD,
Paris,
March
Key Words:
jwlicy, social.
laws,
OMB-85
foreign.
Management of Federal Information Resources
NOV-82
,
Novotny,
Computer/Law Journal
A- 130, Office of Management and Budget, Washington, DC, December 1985.
New
Electronic Supervisor
Key Words:
Key Words:
threats, rights,
government, policy.
OTA-88
Criminal Justice, New Technologies and the
OTA-CIT-366,
U.S. Congress, Office of
policy,
Techn. Assessment, Washington, DC, May 1988.
guidelines.
Key Words: TDF, OSV-83
requirements.
Key Words:
Osvald, T.
NYC-80
"The Data Act and Documentation Requirements,"
Nyciun, S.H., and
Proc. IFIP/Sec. '83 .
Courmey-Saunders 'Transborder Data Flow:
S.
Legal Persons in Privacy Protection Legislation," Proc, 1980 National Comp. Conf. ,
Press, Arlington,
Stockhohn, 1983, 83), pp. 265-268.
(2:
policy, criminal.
PAG-84 Pagels, H.R. (Ed.)
FAK-
Computer Culture: The
Key Words:
laws, foreign.
and Computer
Scientific Intellectual
Social of the the
VA,
,
The New York Academy of Sciences,
New
York, 1984.
OTA-85
pp. 587-593.
Federal Government
Key Words: TDF,
policy,
Civil Liberties ,
OEC-80
OTA-CIT-293,
U.S. Congress, Office of
Information,
Computer and Communications Policies for
Techn. Assessment, Washington, DC, October
1980s Proc. of a High-Level
^985.
.
OECD,
Key Words: book,
policy.
Information Technology: Electronic Surveillance and
laws.
PAR-83 Parent,
W.A.
"Recent Work on the Concept of Privacy," Americican Philosophical Quarterly
,
1983,
pp. 341-355.
Paris, 1980.
Key Words: proceedings,
rights,
surveillance,
Key Words:
policy, general.
government, policy.
PAR-84
general.
Enslow (Eds.) 1984 NorthHolland, Amsterdam, 1984. Parkhill, D., P.
So This
OEC-81 Guidelines for the Protection of Privacy & Transborder ,
OECD,
Paris,
1981.
Key Words: TDF,
is
,
Key Words: book,
Data Flows of Personal Information
—
Technology, New Tensions OTA-CIT-333, U.S. Congress, Office of Techn. Assessment, Washington, DC, September 1987.
Constinition,
,
Winter 1982. pp. 105-124.
Key Words:
The
Circular No.
E.7.
'Transborder Data Flow Regulation: Technical Issues of Legal Concern,"
AFIPS
OTA-87
.
1980, pp. 141-199.
Key Words: TDF,
rights, records,
laws, government, policy.
Challenge of Information
Oriented Inquiry," Stanford
Summer
Key Words:
OEC-86
Novotny, EJ.
Conf.,
Individual Privacy
296, U.S. Congress, Office of
laws,
foreign.
Federal Government Information Technology:
guidelines.
9-11
general.
RAS-86a
PAT-89
ROB-86
Patrick.
Rasor, P.B.
"Public Access to
"Privacy Implications of
Government Databanks," Proc, 12th Natl. Comp. Sec. Conf.. 1989. (5: NCS-89).
Consumer Credit Laws," The John Marshall Law Review ,
Summer
1986. pp. 941-957.
Robinson, P. "Legal Issues Raised by Transborder Data Flow," Canadian-U.S. Law Journal 1986, pp. 295-316.
,
pp. 609-610.
Key Words:
Key Words:
privacy, credit.
Key Words: TDF,
laws,
foreign.
policy, rights,
RIC-86
laws.
RUB-89
Rice, R.
PIE-83
"I*rivacy,
Pietarinen,
I.
"Finland's Privacy Legislation," Transnational
Freedom and
Rubenfeld,
J.
PublicKey Cryptography," Information Age, (U.K.), October 1986, pp. 208-214.
'The Right of Privacy," Harvard Law Review February
Key Words:
Key Words:
.
1989, pp. 737-807.
Data Report, March 1983, .
pp. 101-103.
Key Words:
laws, foreign.
PIP-84 Pipe, G.R.
"Getting on the
TDF
Track,"
Datamation Jan. 1984, 200-211. ,
Rule,
The
Privacy Act," Transnational
American Library,
Data Report. January 1987.
1980.
Plesser, R.
"Issue of Data Flows Across
Be
Faced,"
ABA
Journal
February 1982, pp.
Banking
RAD-84
Sauvant, K.P.
"The Growing Dependence on
"Enhancing Canadians' Right to Know and to Privacy." Transnational Data Report,
Transborder Data Flows," Computerworld, June 25, 1984. pp. ID/19-24.
Key Words: TDF. rights, foreign.
Services, Springfield,
1987.
,
VA,
Key Words: book,
York, 1984.
policy,
TDF,
policy.
RAS-86 Rasor, P.B.
Government
Personal Financial
Washbum Law
rights, laws.
Seller. R.S.
An
Enforceable Expectation of
RIL-88 RUey, T. "Data Commissioners Consider Wider Horizons: Conference Report," Transnational Data Report,
December 1988,
pp. 10-18.
Review Spring 1986, pp.
Confidentiality."
Key Words:
policy, laws,
Forum Spring .
1980. pp. 628-659.
Key Words:
rights, laws. case.
SEI-86 Seipel. P. "Pitfalls
,
417-436.
Key Words: book,
"Privacy and Insurance:
foreign.
of the Electronic
Revolution." Information
Age
.
(U.K.). October 1986. pp. 215-
foreign.
Key Words:
Schoeman, F.D. (Ed.) Philosophical Dimensions of Privacy Cambridge University Press. New York, 1984
SEI-80
Elsevier Science PubUshers,
to
SCH-84
Transnational Data Reporting
and International Business
Records,"
policy,
laws.
,
Perspectives and Trends ,
Communications Regulation
Access
rights.
Riley. T.
Records: International
Rada, J.F. and G.R. Pipe (Eds.)
"Controlling
York,
laws, foreign.
RIL-87b RUey, T. Access to Government
policy,
laws.
book,
New
SAU-84
Key Words:
Key Words:
New
June 1987, pp. 23-25.
71-78.
New
of Privacy,
Key Words: book,
PLE-82
Key Words: TDF,
Politics
pp. 11-13.
p.
RIL-87a
,
et al.
J.,
"Quebec's Unique Access and
general.
National Borders Must
rights, laws.
RUL-80
RIL-87 RUey, T.
Key Words:
Key Words: TDF,
policy, rights.
219.
policy, records.
Key Words:
9-12
threats, rights.
SEL-88
SIM-85
Selmer, K. "Data Protection Policy Trend," Transnational Data Report,
December 1988,
pp.
19-25.
SMI-86
Simitis, S.
Smith. R.E.
"Data Protection: New Developments, New
Collection and
Challenges," Transnational
Joumal Publication,
Data Report, March 1985, pp.
Washington, DC, 1986.
Security
Use of Social Numbers Privacy .
95-96.
Key Words:
Key Words:
policy, laws.
Key Words:
SHA-84
SMI-88
laws.
Shattuck,
policy, rights.
policy, rights,
Smith, R.E.
J.
"Computer Matching
a Serious Threat to Individual Is
SIM-87
Compilation of State Federal Privacy
Simitis, S.
&
Laws Privacy ,
Communications of
"Reviewing Privacy in an
Joumal Publication,
June 1984, pp.
Washington, DC, 1988.
538-541.
Information Society," University of Peimsylvania
Law Review March
Key Words:
Key Words: matching,
707-746.
Rights," the
ACM
,
,
1987, pp.
STE-81
threats.
Key Words: SHA-85
Stevenson, R.B.,
policy, rights,
Corporations
laws.
Shattuck,
Age of
and P.
Newman
Sizer, R.
Data Report, July/August
The Data Protection Act (U.K.) Gower Publishing
1985, pp. 259-260.
Key Words:
Co..
,
Ltd.,
:
Disclosure
,
Key Words: book,
policy,
rights, laws.
Key Words:
laws, foreign.
STE-83 Steriing.
Presidential Initiative
on
Slansky, P. (Ed.) Nineteen Eighty-Four
On
Information Policy," Software
W.H. Freeman
Law
York, 1983.
,
Summer
1989,
&
Co.,
Common Law - A
Comparative Study in the
,
New
Private Sector,"
Review Vol.
Gozanga Law
18, 1982/83, pp.
,
567-604.
pp. 461-490.
Key Words: book,
Key Words:
R.A.
"Privacy Information Systems
SLA-83
and Spence J.,
Journal
&
laws.
London, 1985.
SHA-89
"A
Jr.
Information
Johns Hopkins University Press, Baltimore MD, 1981.
SIZ-85
Information," Transnational
M.M.
«fe
Secrecy, Access
J.
"Privacy in the
Shattuck,
laws, general.
rights.
Key Words:
policy, rights,
policy, rights,
law.
SMI-83
laws.
Smith, R.E. Shultz, G.P.
Workrights , Privacy Joumal Publication, Washington, DC,
"Consequences of the Age of
1983.
SHU-86
May
1986, pp.
Key Words:
Key Words:
polciy, rights.
MD.
Simitis, S.
,
"Data Protection~A Few Critical Remarks," Transnational Data Report,
Publication, Washington,
March 1983,
Key Words:
pp. 93-96.
DC,
1985. laws, general.
Lanham.
1986
Key Words: book,
SMI-85 Smith, R.E. Fair Information Practices in Seven States Privacy Joumal
SIM -83
Jr.
Press of America.
rights,
employment.
16-19.
Strunk, O.,
Privacy: Studies in Social and Cultural History . University
Information," Transnational
Data Report,
STR-86
general.
STR-88 Strong, D.R.
"The Computer Matching and Privacy Protection Act of 1988: Necessary Relief from
Erosion of the Privacy Act of 1974," Software Law Joumal Summer 1988. pp. 391-422. ,
Key
Words: protection, laws.
Key Words: matching,
9-13
laws.
SWA-83
TLR-87
Swan,
"Privacy, Computers, and the
J.C.
"Public Records and Library Privacy," Library Journal, Sept. 1983.
Commercial Dissemination of Personal Information," Texas Law Review June 1987, pp. ,
TUR-80 Tum,
R. 'Transborder Data Flows,"
Computerworld, March 1980, pp. IDI-IDIO.
3,
1395-1439.
Key Words:
Key Words: TDF,
policy, records.
Key Words:
policy, records.
policy,
laws.
TDR-83 Transborder Data Flow Issues Guide , Transnational Data Reporting Service,
VA,
Springfield,
TRA-85 Traub, J.F. (Ed.) Cohabiting with Computers
William Kaufmaim,
1983.
Altos,
Key Words: TDF,
CA,
Inc.,
,
Los
1985.
guidelines.
TUR-80a Tum, R. "An Overview of
Transnational
Dataflow Issues," Proceedings, Pacific Telecommunications Conference January 1980, pp. .
Key Words:
book, general.
1D31-1D40.
TDR-83a "Statistical
Data Privacyand
Confidentiality,"
Transnational Data Report,
Oct./Nov. 1983, pp. 368-386.
Key Words:
statistical,
laws.
Key Words: TDF,
TRE-88 Tremper, C.R., and M.A. Small "Privacy Regulation of
Computer Assisted Testing and Instruction," Washington Law Review October 1988, ,
TDR-84
pp. 841-879,
"Surveys Show Strategic Importance of TDF," Transnational Data Report, Jan/Febr. 1984, pp. 20-36.
Key Words: TDF,
policy.
TDR-84a "New Technologies' Impact
On
threats, rights.
.
(U.K.), January 1980,
Key Words: TDF,
TRU-86 Trubow, G. "Peeping Sam: Uncle Is Watching You," Computer Security Joumal No. 1, 1986, ,
policy,
design.
TUR-SOc Tum,
R.
"Privacy Protection and
pp. 15-20.
Key Words:
Transborder Data Flows," Proceedings, 1980 National Computer Conference AFIPS
surveillance.
,
TRU-87 Key Words:
'Technical ImpUcations of Privacy Protection Requirements," Information pp. 2-6.
policy, rights.
Data Protection,"
Transnational Data Report, June/July 1984, pp. 204-215.
TUR-80b Tum, R.
Privacy
Key Words:
policy,
laws.
Press, Reston,
Trubow, G.B.
VA,
1980, pp.
581-586.
"National Information Policy
TDR-84b "Second World
TDF
and the Management of
Key Words: TDF,
Personal Records," Software
foreign.
Conference: Special Report,"
Law Joumal
Transnational Data Report,
101-112.
,
Winter 1987, pp.
TUR-80d Tum, R.
Aug./Sept. 1984, pp. 253-283.
Key Words: Key Words: TDF,
policy,
"Privacy Protection and
policy,
Security in Transnational Data
management.
Processing," Stanford Joumal of International Law Summer
foreign.
TRU-89 TDR-85
,
Trubow, G.B. "Watching the Watchers: The
1980, pp. 7-86.
Coordination of Federal Privacy Policy," Software
Key Words: TDF,
Data Report, April/May 1985, pp. 115-117.
Joumal Summer 1989, pp.
"OECD
Sets
TDF
Rules of
the Road," Transnational
,
391-411.
Key Words: TDF,
laws,
guidelines.
Key Words:
policy, rights,
laiws.
9-14
Law
foreign.
laws,
TUR-82b
TUR-80e
UCD-81
Turn, R.
Turn, R.
"An Overview of Transborder
"Situation in the U.S.: Privacy
Dataflow Problems," Proc. 1980 IEEE Symp. Sec. &
Protection
1980s," Transnational Data
Davis
Privacy
Report, July/August 1982, pp.
1981, pp. 473-492.
,
(5:
IEE-80). pp. 3-8.
"Confidentiality of Persoimel
Needs
Files in the Private Sector."
University of California at
in the
Law Review
Winter
,
257-258.
Key Words: TDF,
laws,
Key Words:
foreign.
requirements,
Key Words: rights, employment
laws.
TUR-81
UNI-82
Turn. R., (Ed.) 'Transborder Data Flows: Issues and Organizations," Information Privacy . (U.K.),
TUR-83
Transnational Corporations
Turn, R. "Privacy Protection in the
Computer Age," Information
,
Age, (U.K.), April 1983, pp.
January 1981, pp. 6-20.
Key Words: TDF,
105-109.
Key Words: TDF,
&
Transborder Data Flows United Nations, New York, 1982. policy,
laws.
policy.
Key Words:
rights, laws.
VEE-89
TUR-81 a TUR-83a
Turn, R.. (Ed.)
'Transborder Data Flows:
Veeder, R.N.
Privacy Protection,"
Information Privacy (U.K.), March 1981, pp. 56-67. ,
,
VA,
Eligibility for Federal
Benefits Determinations under
Resiliency of the U.S. Information Society AFIPS Press, Reston,
Key Words: TDF,
"Making
Turn, R., et al. Observations on the
1983.
the
Computer Matching and
Privacy Protection Act of 1988," Proc. 12th Natl. Comp. Sec. Conf. , 1989, (5: IEE-89),
laws,
Key Words:
foreign.
requirements,
pp. 606-608.
policy.
Key Words: matching,
TUR-81b
Privacy (U.K.), pp. 98-119. .
May
laws.
TUR-83b
Turn, R.. (Ed.) 'Transborder Data Flows: Implementation of Privacy Protection," Information
Turn, R. "Privacy Protection in the 1980s," Information Age (UK), April 1983. pp. 105,
1981,
109.
VIT-83 Vitro, R.A.
"Information Sector
Development Planning: Toward Balanced TDF," Transnational Data Report December 1983, ,
Key Words: TDF,
protection.
Key Words:
rights, laws.
Key Words: TDF,
TUR-83C
TUR-82
Turn, R., and E.J. Novotny
Turn, R. "Security Issues in
"Resiliency of the
Transborder Data Flows,"
Computerized Society," Proc, 1983 Natl. Comp. Conf.
Computer Security Journal
,
Winter 1982, pp. 71-79.
Key Words: TDF,
,
AFIPS
May
Press, Reston,
Key Words:
requirements,
policy.
WAL-88 Walden, N., and R.N. Savage "Data Protection and Privacy Laws: Should Organisations Be Protected," International
Computer Law
&
C)uarterly , April
1988, pp. 337-347.
policy.
Turn. R. "Privacy Protection in the 1980s," Proc. 1982 IEEE Privacy (5: Symp. Sec. IEE-82), pp. 86-89.
&
Key Words:
VA,
1983, pp. 341-349.
protection.
TUR-82a
pp. 461-468.
.
rights, laws.
Key Words:
TUR-84
policy, laws.
WAR-80
Turkic, S.
The Second
Self:
Computers
and the Human Spirit, Simon and Schuster, New York, 1984.
Ware, W.H. "Privacy and Information Technology," in Hoffman, L.J. (Ed.), Computers and Privacy in the Next Decade Academic ,
Key Words: book,
societal.
Press.
New
York, 1980, pp. 9-
22.
Key Words: general.
9-15
proceedings,
WAR-81
WES-83
Ware. W.H.
WRI-83
Westin, A.F.
"Security, Privacy,
"New
and
Wright.
Issues of
Computer
J.
"Protection of Corporate
National Vulnerai)ility," Proc.
Privacy in the 1980s,"
Privacy." Transnational Data
Comp.
Information Processing 83, Proc, IFIP Congress Paris,
235.
&
Sec.
Phoenix,
AR.
Priv.
Symp.
,
1981, pp. 107-
,
North-Holland, Amsterdam,
111.
Key Words:
1983.
Key Words:
policy, rights.
policy, rights,
Key Words:
laws.
policy, rights,
YOU-83 Yourow.
laws.
WAR-86a
J.H.
Issues in International
Ware, W.H. "Emerging Privacy Issues," Computers & Security June ,
1986, pp. 101-113.
Key Words:
1983, pp. ID/11-18.
Telecommunications Policy: A Source Book Center for Telecommimications Studies, George Washington University, Washington, DC, 1983.
Key Words:
Key Words: TDF.
WES-83a Westin. A.F.
,
"New Eyes on
Privacy,"
Computerworld. November 28,
policy, rights.
WES-80
policy, rights,
,
York, 1980.
WES-84
YUR-83
Westin, A.F.
The Changing Workplace: A Guide to Managing People, Organizational, and
Key Words:
book,
employment
policy,
laws.
laws.
Westin, A.F., and S. Salisbury Individual Rights in the Corporation Pantheon Books,
New
Report. June 1983, pp. 231-
Yurow.
J.
"Privacy Legislation and Restriction of Transborder
Data Row." Information Age (UK). January 1983, pp. 11-15. ,
Regulatory Aspects of Office
Technology Knowledge ,
Industry Pubhcations, Inc..
WES-80a
White
NY.
Plains,
1984.
Key Words: TDF,
laws,
policy.
Westin, A.F.
"Long-Term Implications of Computers for Privacy and Protection of the Pubhc Order," in Hoffman, L.J. (Ed.), Computers and Privacy in the Next Decade, Academic Press, New York, 1980, pp. 167-181.
Key Words: book, laws, employment
guidelines,
Zaki, A.S.
"Regulation of Electronic
WIG-84 Wigand. R.T., et al. 'Transborder Data Flow, Informatics and National
policy, rights,
Funds Transfer: Impact and Legal Issues," Communications of the
ACM
,
February 1983,
pp. 112-118.
PoUcies," Journal of
Communications Winter
Key Words: EFTS, poUcy.
1984.
laws.
,
Key Words:
ZAK-83
laws.
Key Words: TDF,
policy,
laws.
WLL-81 "Employee Medical Records and Constitutional Right of Privacy," Washington & Lee
Law Review
,
Fall 1981, pp.
1267-1284.
Key Words: employment.
rights,
9-16
10.
Pre-1980 Publications
This section cites pre-1980 publications listed under the following four subject models and database security, communications
categories: security environment, security security,
and privacy.
A. Security Environment BRO-71
DIN-78
Brown, W.F. (Ed.) AMR Guide to Computer and Software Security Advanced ,
Management Research, New
GAO-77
New
Dinardo, C.T. (Ed.)
Computers and Security
AFIPS
Press, Reston.
VA,
Key Words:
book, general.
DOJ-79 Computer Crime: Criminal Justice Resource Manual.
P.S.
Security:
Check
Press, Reston,
,
VA,
1979.
Key Words: book,
Law
Enforcement Assistance
List for
Computer Center Self-Audits
AFPS
general,
BUR-78 J.L. Sardinas
Federal Agencies Should
Key Words:
Data, LCD-78-123, U.S.
guidelines, crime.
M., B. Chadwick, and K. Wong
Computer
Security for
1978.
England, 1972.
,
Security:
Strengthen Safeguards Over Personal and Other Sensitive
General Accounting Office, Washington, EXT, 23 January
Computer Control and Audit: Total Systems Approach Wiley & Sons, New York,
A
GAO-79 Automated Systems
Farr,
and
Key Words: threats, management.
Department of Justice, Washington, DC, 1979.
FAR-72 J.G.,
1977.
Administration, U.S.
risk.
Burch,
November
general.
BRO-79 Brown,
for
.
1978.
York, 1971.
Key Words: book,
Methods Needed
Checking Payments Made by Computers FGMSD-76-82, U.S. General Accounting Office, Washington, DC, 7
.
Systems National Computer ,
1979.
Key Words:
threats,
government
Centre, Ltd., Manchester,
HAM-73 Hamilton, P.
Key Words: book,
auditing.
Key Words: book,
general,
CAR-77
,
NJ, 1973.
Carroll,
GAO-76
JM.
Computer Sectirity Security World Publ. Co., 1977. ,
Key Words: book, methods, general.
Computer-Related Crimes in Federal Programs FGMSD76-27, U.S. General Accotmting Office, Washington, DC, 27 April
Key Words: book,
general.
.
HEM-73 C, and JM. Hemphill Hemphill,
Security Procedures for
1976.
Computer Systems Dow-Jones
COU-77
,
Courtney, R.H., Jr. "Security Risk Assessment in
Key Words:
crime,
Conf.
,
AFIPS
Co.,
Homewood, IL
1973.
government.
Key Words: book, methods,
Electronic Data Processing,"
Proc. 1977 Natl.
VA,
Computer Security Auerbach Publishers, Inc. Pennsauken,
risk.
Comp.
general.
Press, Reston,
pp. 97-104.
Key Words: risk, management.
10-1
NBS-75
IBM-74 Data Security and Data Processing Report in 6 Volumes on a Study by TRW, MIT. and the State of ,
Illinois,
White
IBM
Plains.
PAR-76a
Computer Security Guidelines
Parker. D.B.
Implementing the Privacy Act of 1974 FIPS PUB 41. National Bureau of Standards.
"Computer Abuse Perpetrators and Vulnerabilities of
for
,
Corporation,
Gaithersburg,
NY,
1975.
1974.
MD, 30 May
Computer Systems."
Proc.
1976 Natl. Comp. Conf.
AFIPS
Press. Reston,
.
VA,
1976.
Key Words: methods,
Key Words:
management.
methods, privacy.
KRA-79
guidelines,
Key Words:
NBS-76
PAR-79
Krauss, LJ.
Glossary for Computer
Computer Fraud and
Systems Security FIPS 39, National Bureau of
Countermeasures PrenticeHaU, Englewood CUffs, NJ, ,
1979.
Key Words: book,
crime,
methods.
crime, threats.
.
Standards. Gaithersburg,
PUB
Parker, D. (Ed).,
Computer
Ethical Conflicts in
Science and Technology
MD,
AFIPS
Press, Reston,
15 Febr. 1976.
1979.
Key Words:
Key Words:
guidelines,
,
VA,
ethics, general.
standards.
PAT-74
MAR-73
NBS-77
Martin.
J.
Accuracy and Privacy in Computer Systems Prentice-Hall, Security,
,
Englewood
Cliffs,
NJ. 1973.
Patrick, R.L. (Ed.)
Evaluation of Techniques for Automated Personal
FIPS PUB 48, National Bureau of Standards, Identification .
Gaithersburg,
MD,
April
1
Security: AFIPS System Review Manual AFIPS Press. .
Reston.
VA,
Key Words:
1974. risk,
management.
1976.
Key Words: book, methods,
MOW-78
authentication.
NBS-79
Mowshowitz, A. "Computers and Ethical Judgement in Organizations." Proc. 1978 Nad. Comp. Conf. .
VA,
PET-67
Key Words:
privacy.
AFIPS
Press. Reston,
pp. 675-683.
Guidelines for Automatic Data Processing Risk Analysis .
FIPS PUB 65, National Bureau of Standards, Gaithersburg. MD. 1 August
Petersen, H.E., and R. Turn,
"System ImpUcations of Information Privacy." Proc. Spring Joint Comp. Conf AFIPS Press. 1967, pp. 291.
300.
Key Words:
threats,
methods.
1979.
REE-73
Key Words:
awareness,
Key Words:
guidelines, risk.
OMB-78 NBS-74
Bibliography
Automated
Security of Federal
Guidelines for Automatic
Information Systems
Data Processing Physical Security and Risk Management FIPS PUB 31, National Bureau of Standards,
No. A-71. Transmittal Memo. No. 1. Office of Management and Budget, Washington. DC,
,
Gaithersburg.
MD,
,
Circ.
M. Gray
guidelines,
,
TN
780.
National Bureau of Standards. Gaithersburg,
Key Words:
MD,
June 1973.
awareness,
general.
July 27, 1978.
REN-74
1974.
Key Words: Key Words:
Reed. S.K.. and
Controlled Accessibility
ethics.
requirements,
physical, methods, risk.
PAR-76
Systems.
Crime by Computer
New
TN
809. National
Bureau of Standards.
Parker, D.B. Scribners,
Renninger, C. and D. Branstad
Government Looks at Privacy and Security in Computer
risk.
,
York, 1976.
Key Words: book,
crime, risk.
Gaithersburg.
Key Words: general.
10-2
MD,
February
1974. proceedings,
WON-77
VAN-72
REN-74a
C,
Renninger,
Van
(Ed.)
Approaches to Privacy and Secimty in Computer Systems SP 404, National Bureau of Standards, Gaithersburg, MD, September ,
Wong, K.
Tassel, D.
Computer Security Management Prentice-Hall, Englewood Cliffs, NJ, 1972 ,
Key Words:
Computer Security Risk
A
Analysis and Control:
Guide
DP Manager Hayden Book Co, New Rochelle Park, to the
,
NJ, 1977.
book, general.
1974.
WAL-77 Key Words:
proceedings,
general.
Key Words: book,
Walker,
and
Blake Computer Security and B.J.,
I.F.
Protection Structures
TAB-79
Hutchison and Ross,
,
Dowden,
"On Computer Crime Computer/Law
(S.B.
Journal ,
240),"
Key Words: book,
WOO-73 Wooldridge, S., C. Corder, and C. Johnson Security Standards for Data
Inc.,
Stroudsburg, PA, 1977.
Taber, J.K.
risk,
control.
techniques.
&
Processing Wiley ,
Winter 1979, pp. 517-544.
New
Key Words:
Key Words: book,
crime, laws.
Sons,
York, 1973. general.
Models and Database Security
B. Security
AND-73
ABR-77 Abrams, M.D., et al. (Eds.) Tutorial on Computer Security and Integrity IEEE Computer Society, Long ,
Beach. CA, 1977.
BAY-76
Anderson,
Bayer. R.. and J.K. Metzger "On the Encipherment of
J.P.
Computer Security Technology Planning Study ESD-TR-73-51, James P. Anderson and Co., Fort Washington. PA, 1973.
,
Search Trees and Random Access Files," ACM Trans. Database Systems March ,
1976, pp. 37-52.
Key Words: book, Key Words:
techniques.
policy, models,
Key Words:
database, crypto.
techniques.
AMB-77
BEL-73
Ambler, A.L., and C.G. Hoch "A Study of Protection in Programming Languages," Proc. ACM Conf. on Language Design for Reliable Software 1977, pp. 25-40. ,
ATT-76 Attanassio.
C.
P. Markstein.
and R. Phillips "Penetrating an Operating System: A Study of VM/370 Integrity." IBM Systems Journal January 1976. pp.
BeU, D.E. Secure Computer Systems: A Refinement of the Mathematical Model, Vol. HI, ESD-TR-73-278, Mitre Corp.. Bedford,
MA.
1973.
.
Key Words: methods,
102-116.
Key Words:
policy, models.
software.
Key Words: OS,
threats, case.
Anderson,
BEL-75 BeU, D.E., and
AND-72 J.P.
"Information Security in
Multiuser Computer Environment," in Rubinoff,
Advances in Computers Vol. 12, Academic Press, New York, R., (Ed.),
,
1972, pp. 1-35.
BAR-64
On
LaPadula, Secure Computer Systems Unified Exposition and Multics
L.J.
Baran.
P..
:
Distributed
Communications: IX. Security. Secerecy, and Tamper-Free Considerations Report RM3765-PR. The Rand Corp.. Santa Monica, CA, 1964. ,
Interpretation ,
policy, methods.
Key Words:
threats, policy.
10-3
MA.
1975.
Key Words: case.
Key Words:
ESD-TR-75-306,
Mitre Corp., Bedford.
policy, models,
DOD-78
DEN-76
BER-79
Army
Denning, D.E.,
Proceedings. U.S.
"KSOS—Development
"A
Automation Security
Methodology
Information Flow."
Berson, T., G. Barksdale,
Jr.
for a Secure Operating System," Proc. 1979 Natl. Comp. Conf. .
AFIPS
Lattice
Model of Secure
May
OACSI/DAMI-AMP,
1976. pp. 236-242.
Key Words: models,
pp. 365-371.
Key Words: OS,
ACM.
VA,
Press. Reston,
kernel, case.
BIB -77 Biba, K.J.. Integrity Considerations for
Secure Computer Systems ESD-TR-76-372, Mitre Corp., Bedford, MA, 1977. ,
Workshop Leesburg, VA, December 1978, .
Communications of the
flow.
Key Words:
DEN-77 Denning, D.E., Denning, P.J., "Certification of Programs for Secure Information Flow," Communications of the July 1977, pp. 504-513.
ACM
.
proceedings,
general.
DOD-79 Proceedings, Seminar on the
DOD
Computer Security Program
Initiative
Key Words:
verification, flow.
.
DEN-78
models,
Denning, D.E. "Are Statistical Data Bases
integrity.
CON-72 Conway, R.W., W.L. Maxwell, and H.L. Morgan "On the Implementation of
Secure?," Proc. 1978 Nad.
Key Words: trusted.
statistical, threats.
DEN-79
April 1972, pp. 211-
220.
Key Words: OS,
Security
Workshop Virginia Beach, VA. September 1979. ,
Denning, D.E., Denning, P.J., "Data Security," Computing Surveys . September 1979, pp. 227-250.
Department of the Army, Washington. DC, 1979.
Key Words:
Key Words:
ACM
OACSI/DAMI-AMP.
U.S.
techniques.
DAV-78
databases,
methods.
Davida, G.I., et al. "Data Base Security," IEEE Trans. Software Engr. November 1978, pp. 531-533. ,
Key Words:
Proceedings. Second U.S.
Army Automation
Communications of the
ACM,
proceedings,
DOD-79a Key Words:
Security Measures in
Information Systems,"
July 1979.
U.S., Department
of Defense. Washington, DC, 1979.
Comp. Conf. AFIPS Press. Reston. VA. pp. 525-530. .
MD.
Gaithersburg.
OSD(CCCI).
Key Words:
U.S.
Department of the Army, Washington, DC. 1978.
DON-75
DEN-79a
methods.
Donovan,
and
Denning. D.E., et al., 'The Trackers: A Threat to Statistical Database Security," Trans. Database Systems March. 1979. pp.
"Hierarchical Approach to Computer System Integrity," IBM Systems Joumal No. 2,
76-96.
1975, pp. 188-202.
ACM
database,
proceedings,
general.
,
S.E.
J. J.,
Madnick
,
DEM-77 DeMillo, R.A., et al. "Even Databases that Lie
Can Be Compromised," IEEE
Key Words:
statistical, threats.
January 1977, pp. 73-75.
Key Words:
Inference,"
,
"Protection Against User threats, database.
ACM
Trans.
and
in Security. Integrity,
IBM
Systems Joumal No. ,
3,
1976, pp. 270-278.
Key Words: inference.
New
and
1979. pp. 97-106.
Computation Academic Press,
J. J.,
Madnick "Virtual Machine Advantages
S.E.
Decision Support Systems,"
Demillo, R., et al. (Eds.), Foundations of Secure .
Donovan,
Database Systems March ,
DEM-78
integrity, design.
DON-76
DOB-79 Dobkin, D.A., A.K. Jones, and R. Lipton
Trans. Software Engr.
Key Words:
databases,
Key Words:
York, 1978.
design.
Key Words: book, models, theory.
10-4
integrity,
methods,
DOW-77
GRA-72
FEI-79
Downs, D., and G.J. Popek "A Kernel Design for a Secure Database Management System," Proc. 3rd International Conf. on Very Large Data Base Systems .
IEEE Computer Society, Los Angeles, CA, 1976, pp. 507-
Feiertag, R.J., and
P.G.
Graham, G.S., and PJ. Denning,
Neumann
Comp. Conf. AFIPS
Comp. Conf. AFIPS Press, Reston, VA, 1979, pp. 329-
Reston, VA., 1972, pp. 417479.
.
Principles and
.
GRI-76
design.
design.
Griffiths, P.P.,
Friedman, T.D.
Downs, D., and G.J. Popek "Data Base Management Systan Security and Ingres," Proc. 5th Intemat. Conf. on Very Large Data Base Systems IEEE Computer Society, Los Angeles, CA, ,
"The Authorization Problem Shared Files," IBM Systems Journal No, 4, 1970,
in
,
pp. 258-280.
Key Words:
and
B.W. Wade "An Authorization Mechanism
FRI-70
DOW-79
Press.
Key Words: models, methods.
Key Words: MLS, OS, kernel,
"Protection
Practice," Proc. Spring Joint
334.
514.
Key Words: DBMS,
~
"The Foundations of Provably Secure Operating Systems (PSOS)," Proc. 1979 Natl.
for a Relational
System,"
ACM
Database Systems . September 1976, pp. 242-255.
Key Words:
authorization,
databases, methods.
Database Trans.
authorization,
database, relational.
1979, pp. 280-290.
Key Words: DBMS, case.
EVA-74 Evans, A.,
W.
GUD-76
GLA-77 design,
Kantrowitz,
and E. Weiss "A UsCT Authentication
Gudes, E., H.S. Koch, and FA. Stahl 'The Application of Cryptography for Data Base Security." Proc. 1976 Natl.
Glaseman, S., R. Turn, and R.S. Gaines "Problem Areas in Computer Security Assessment," Proc. 1977 Natl. Comp. Conf.,"
AFIPS
Press, Reston,
VA,
pp.
105-112.
Comp. Conf. AFIPS Press, Reston. VA. pp. 97-107. ,
Scheme Not Requiring Secrecy in the Computer," Communications of the ACM August 1974, pp. 437.
Key Words: methods,
Key Words:
risk.
database, crypto.
HAN-76
GLA-78
King
Gladney, H.M.
Hantler, S.L., and J.C.
"Administrative Control of
"An
Computing Service," IBM Systems Journal No. 2, 1978, pp. 151-178.
Correcmess of Programs," ACM Computing Surveys December 1976, pp. 331-353.
Fabry, R.,
Key Words: management,
Key Words:
"Capability-Based
control.
general.
412.
Key Words:
authentication,
techniques.
,
FAB-74
Addressing," Communications
ACM
of the 403-411.
.
July 1974, pp.
Gold, B.D., et
Key Words:
"Protection in Operating
Natl.
Systems," Communications of August 1976, pp. ,
Comp. Conf. AFIPS Press, Reston, VA, pp. 335-344. ,
Feiertag, R.J., KJ«J. Levitt,
Key Words: MLS. OS,
and L. Robinson,
design, case.
the
A System Design," ACM Symposium
Proc.
on
Operating System Principles , 1977, pp. 57-65.
Key Words: models,
Key Words: MLS, verification,
GRA-68 Graham, R.M., "Protection in an Information
Processing Utility," Communications of the
May
ACM
1968. pp. 385-369.
methods, design.
Key Words:
policy, models.
10-5
ACM
461-471.
"Proving Multilevel Security 6th
W.L. Ruzzo,
and J.D. Ullman,
Security Retrofit of
FEI-77
of
verification,
Harrison, M.A.,
al.
VM/370," Proc. 1979
ciq}ability,
methods.
,
HAR-76
GOL-79 "A
Introduction to Proving
.
theory.
HAR-78
HOF-78
JON-75a
Harrison, M.A.,and
Hoffman,
W.L. Ruzzo
E.
L.J.,
and
W.
Jones, A.K., and
Michelman
Wulf,
'Towards the Design of Secure
"Monotonic Protection
"SECURATE ~
Systems," in De Millo, R.A., (Ed.), Foundations of Secure Computations. (10: DEM-78), pp. 337-363.
Evaluation and Analysis Using
Security
Fuzzy Metrics," Proc. 1978 Nad. Comp. Conf. AFIPS Press, Reston, VA, pp. 531-
Systems," Software Practice & Experience Oct.-Dec., 1975, pp. 321-336. ,
.
Key Words: models, methods.
540.
Key Words: models,
JON-78
theory.
Key Words: HIN-75
risk,
methods,
Jones, A.K.. and R. Lipton,
Hinke, T.H. and M. Schaefer, Secure Data Management
Models: Their Usefulness,"
HOY-73
De
System RADC-TR-75-266, System Development Corp., Santa Monica, CA, 1975.
Computer Security Handbook
Key Words: DBMS,
Key Words: book,
,
design,
Mechanism
"Protection
case.
Hoyt, D.B. (Ed.)
McMiUan, New York, 1973.
,
general.
in
Millo, R.A., (Ed.),
Foundations of Secure Computations 1978, (10: ,
DEM-78).
pp. 237-252.
Key Words: models,
theory.
case.
JON-78a
HSI-76
HOF-70
Hsiao, D.K., and R.L
Hoffman, L.J., and W.F. Miller
in Yovits,
"Getting a Person's Dossier
in
from a Statistical Data Bank," Datamation, May
pp. 231-272.
Baum
"Information Secure Systems,"
M., (Ed.) Advances
Computers Vol. 15, 1976, Academic Press, New York, ,
Jones, A. K., and
B.H. Liskov
"A Language Extension for Expressing Constaints on Data Access," Commimications of the May 1978, pp. 358,
ACM
367.
1970, pp. 74.
Key Words: methods, Key Words:
threats,
Key Words: models,
database.
control,
case.
statistical.
HSI-79
HOF-71
Hsiao, D.K., D.S. Kerr,
Hoffman, L.J. "The Formulary Method for Flexible Privacy and Access Control," Proc. Fall Joint
Comp. Conf. AFIPS Press, Reston, VA, 1971, pp. 587,
601.
and C. Nee "Data Base Access Control in the Presence of Context Dependent Protection Requirements," IEEE Trans. Software Engr., July 1979, pp. 349-358.
KAM-77 Kam, J.B. "A Model of
Statistical Data Bases and Their Security," Trans. Database Systems March 1977, pp. 1-
ACM
,
10.
Key Words: Key Words:
control, methods.
Key Words:
statistical,
models.
database, control.
KAT-73 HOF-73
HSI-79a
Hoffman, L.J., (Ed.) Security and Privacy in Computer Systems Melville Publishing Co., Los Angeles, ,
Katzan, H.,
Computer Data Security
S.E. Madnick, (Eds.)
J.Wiley
Computer Security Academic Press, New York 1979.
1973.
,
Key Words: book, Key Words: book,
Sons.
New
.
York.
general.
JON-75
KIE-78
Jones, A,K., and R.J. Lipton, L.J.,
Modem
"Capability Managers,"
Pohcies for Computation," Operating Systems
Trans. Software Engr.
ACM
Privacy
Review No.
Prentice Hall, Cliffs, NJ, 1977.
Key Words: book, methods.
Kieburtz. R.B.. A. Silberscatz
"The Enforcement of Security
Methods for Computer Security and
Englewood
general.
general.
HOF-77
,
&
Key Words: book, methods,
CA, 1973.
Hoffman,
Jr.
Hsiao, D., D.S. Kerr, and
,
5,
November
1978, pp. 467-477.
1975, pp.
Key Words:
197-206.
Key Words:
policies,
10-6
IEEE
,
methods.
control, cj^ability.
LAM-69
MAC-79
LIN-76
Lampson, B.W., "Dynamic Protection
Linden, T.A.. (Ed.) Security Analysis and
MacCauley,
Structures," Proc. Fall Joint
Comp. Conf. AFIPS Press, Reston, VA, 1969, pp. 27-38.
Enhancements of Computer Operating Systems IR 761041, National Bureau of
Secure Operating System," Proc. 1979 Natl. Comp. Conf.
Key Words: models,
April 1976.
.
,
Standards, Gaithersburg,
AFIPS
MD,
Key Words: OS,
LAM-71 "Protection," Proc. 5th
Princeton Conference on 1971, pp. 437-443.
,
Key Words:
LIN-76a Linden, T.,
"Operating System Structures
Information Systems
models, theory,
to
Support Security and
ReUable Software," ACM Computing Surveys December ,
1976, pp. 409-445.
methods.
Key Words: OS,
LAM-73 Lampson, B.W., "A Note on the Confinement Problem," Communications of ,
October 1973, pp.
345-353.
Key Words:
covert channel.
LAM-76 Lampson, B.W., and
,
252.
Key Words: OS.
MiUen,
J.,
"Security Kernel Vahdation In
LIP-77
Communications of
Practice,"
Lipton, R.J., and L. Snyder
the for
Deciding Subject Security," July Journal of the 1977, pp. 455-464.
ACM
Key Words:
,
control, theory.
ACM May ,
1976. pp. 243-
250.
Key Words:
verification,
kernel.
MIL-78 Millen, J.K.
"Reflections on an Operating
System Design," Commimications of ,
McPhee, W.S. "Operating System Integrity of OSA'S2," IBM Systems Journal No. 3, 1974, pp. 230-
MIL-76
design,
methods.
H.E. Sturgis
ACM May
design.
vulnerabiHties.
"A Linear Time Algorithm
613-615.
,
pp.
MCP-74
design.
ACM
VA,
threats,
Lampson, B.W.,
the
Press. Reston,
A
of
Key Words: MLS. OS,
methods.
Sciences
Drongowski,
E., P.
"KSOS - The Design
"Constraints and Multilevel
LIP-78 Lipton, R.J., and T.A.
the
1976, pp. 251-
"On Classes of
Budd
Protection
De
Security," in DeMillo, R., al.
Millo, R.A.,
Secure Computing (10:
(Eds.), Foundations of
78), 1978, pp. 205-222.
Systems," in
265.
et. al.,
Key Words: OS, methods,
Secure Computations 1978, (10: DEM-78), pp. 281-296.
et.
Foundations of
(Eds.),
,
DEM-
,
Key Words: MLS, models, theory.
design.
Key Words: models,
theory.
MIN-76
LAN-79
Minsky, N.
LIP-78a
Lange, A.G. Fraud and Abuse in
Lipton, R.J. and L. Snyder
Government Benefit
"On Synchronization and
Programs U.S. Department of Justice, Washington, DC, November 1979.
Security," in
,
Key Words:
De
Millo, R.A.,
Foundations of Secure Computations , 1978 (10: DEM-78), pp. 367-385.
et
al.,
(Eds.),
crime,
Key Words: models,
govenunent.
"Physical Integrity in a Large
"Operating System Penetration," Proc, 1975
Nad. Comp. Conf. Press, Reston,
,
VA,
AHPS
pp. 361-
Segmented Data Base," ACM Trans. Database Systems ,
March 1977,
pp. 91-104.
368.
Key Words: Key Words: OS.
ACM
,
March 1976,
pp.
148-159.
Key Words:
database, methods.
MIN-78
Lorie, R.A.
Linde, T.A.
the
theory.
LOR-77
LIN-75
"Intentional Resolution of Privacy Protection in Database Systems," Communications of
Minsky, N. "The Principle of Attenuation of Privileges and Its Ramifications," in DeMillo. R., (Eds.) Foundations of Secure
Computing Academic ,
New
Press,
York, 1978, pp. 255-276.
database,
integrity.
vubierabiUties.
10-7
Key Words: models,
theory.
MOR-73
NEU-77
A
Programming Languages," Commtmications "Protection in
of the
ACM
PET-67
Neumann,
Morris, J.H.
Peters, B.
al.
Provably Secure Operating
"Security Considerations in a Multi-Purpose Computer Systems," Proc. 1967 Spring Joint Comp. Conf. AFIPS Press, Reston. VA, pp. 283286.
System: The System, Its Applications, and Proofs , Stanford Research Institute, Menlo Park, CA, 1977.
January 1973,
,
P.G., et
pp. 15-21.
,
Key Words: methods, Key Words: OS,
software.
verification,
Key Words: methods,
methods, design.
design.
MOR-79 Morris, R., and K.
Thompson
"Password Security: A Case History," Communications of
the
ACM
,
POP-78
Neumann,
Popek,
P.G.,
"Computer Security Evaluation," Proc. 1978
November 1979,
G
,
and C. Kline.
'Issues in Kernel Design,"
Proc, 1978 Natl. Comp. Conf.,
Natl.
AFIPS
Comp. Conf. AFIPS Press, Reston, VA, pp. 1087-1095.
pp. 594-597.
Key Words:
NEU-78
,
Press, Reston.
VA.
pp.
1079-1086.
control, case.
Key Words:
NEE-72
Key Words: OS.
threats, risk,
methods.
kernel,
design.
Needham. R.M. "Protection Systems and
Comp. Conf. Reston. VA,
Proc. Fall Joint
AFIPS
Press.
POP-78a
NIE-75 Nielsen, N.R.
Protection Implementation," ,
pp. 571-578.
"Computers, Security, and the Audit Function," Proc, 1975 Nad. Comp. Conf. AFIPS Press, Reston, VA, pp. 947,
Key Words: models,
Popek, G.J., and D.A. Farber, "A Model for Verification of Data Security in Operating Systems," Communications of the
ACM
,
September 1978. pp.
737-749.
954.
methods.
Key Words:
Key Words: OS,
control, auditing.
verification.
NEE-77 Needham, R.M., and R. Walker "The Cambridge CAP Computer and Its Protection
ACM
POP-79
NIE-76 Nielsen, N.R., B.Ruder, and
D.H. Brandin, "Effective Safeguards for
Operating Systems Review, No. 4,
Computer System
1977, pp. 1-10.
AFIPS
System,"
Integrity,"
Comp. Conf Reston. VA. pp.
Proc. 1976 Natl. Press,
.
Popek, G., et al., "UCLA Secure Unix," Proc. 1979 Natl. Comp. Conf. , AFIPS Press, Reston, Va, pp. 355-364.
Key Words: OS,
75-84.
design, case.
Key Words: OS, methods, Key Words:
case.
PUR-74
integrity,
Purdy, G.
methods.
NEU-76 Neumann,
"A High P.O., et
ORC-78
al.
ACM
"Software Development and
Orceyre, M.J., and
the
Proofs of Multilevel
R. Courtney,
442-445.
Jr.
Security," Proc, 2nd Intemat. Conf. on Software Engr.
Considerations in the
October 1976,
Measures
,
Log-In
Seciffity
Procedure," Communications of ,
August 1974, pp.
Key Words:
Selection of Security
Key Words: MLS.
Automatic Data Processing Systems SP 50050, National Bureau of
verification.
Standards, Giathersburg,
control, methods.
for
,
June 1978.
MD,
REE-74 Reed, S.K., D. Branstad, (Eds.) Controlled Accessibility Workshop Report TN 827, National Bureau of Standards, ,
Key Words:
guidelines,
methods.
Gaithersburg,
Key Words: models.
10-8
MD, May
proceedings,
1974.
SCH-72
REI-78 Reiss, S.P.
Schroeder, M.A., and
"Medians and Database
J.Sal tzer,
De
Security," in
Millo, R.A.,
STO-76 Stonebraker, M., P. Rubenstein
'The
"A Hardware
eL al. (Eds.), Foundations of Secure Computing 1978 (10:
Architecture for Implementing Protection Rings," Communications of
DEM-78),
the
,
pp. 57-91.
ACM
.
March 1972,
Computer Misuse SP 5(X)-25, National Bureau
Intentional
VER-78 al.
"Program Confinement in KVM/370," Proc. 1977 ACM
of Standards, Gaithersburg, MD, January 1978.
Key Words:
Verhofstad, J.S.M.
Schaefer. M., et
,
threads methods.
National Conf.. pp. 404-410.
ACM,
1977,
Key Words: OS, methods,
Ruthberg, Z., R.
McKenzie
(Eds.)
MD,
October
Cleveland.
ACM
,
ACM,
1977, pp. 43-56.
Key Words: OS.
control, auditing.
.
OH.
1974.
Key Words: MLS. models,
WAR-67
kernel,
Ware, W.H. "Security and Privacy in
design.
Computer Systems," Proc.
Schwartz, M.D.,
Spring Joint
D.E. E)enning, and
AFIPS
P.J.
SAL-74
Primitive
theory.
SCH-79 proceedings,
al.
Project," Proc. 6th
1977.
Key Words:
darabase,
and J.H. Saltzer "The Multics Kemel Design
Systems Principles
Gaithersburg,
Key Words: rceovery.
Models for Computer Security ESD-TR-4-117. Case Western Reserve University.
Computer Security
National Bureau of Standards,
1978. pp. 167-195.
Walter. K.G. et
Symposium on Operating
,
ACM
Computing Surveys. June
WAL-74
SCH-77a
Audit and Evaluation of Proceedings of an Invitational Workshop, SP 500-19,
"Recovery Techniques for Database Systems,"
case.
Schroeder, M.D., D.D. Clark,
RUT-77
control,
control, hardware.
SCH-77
Ruder, 6., and J.D. Madden An Analysis of Computer Security Safeguards for Detecting and Preventing
80-84.
case.
Key Words:
RUD-78
ACM
Key Words: DBMS,
statistical,
methods.
Protection
pp.
157-170.
Key Words:
INGRES
System," Proc. 1976 Nad. Conf. . ACM, 1976. pp.
Denning
Comp. Conf. VA, ,
Press, Reston,
1967, pp. 279-282.
"Linear Queries in Statistical
Saltzer,
ACM
Databases,"
J.,
Key Words:
Trans.
"Protection and Control of
Database Systems , March
Information Sharing in
1979, pp. 156-167.
WAR-67a
MULTICS," Communications of the ACM. July 1974. pp. 388-402.
Key Words:
threats, statistical.
STO-74
Key Words:
control, methods,
Ware, W.H. "Security and Privacy: Similarities and EHfferences," Proc. Spring Joint
Stonebraker, M.. and E.
Wong
Conf.
VA,
"Access Control in a
case.
policy, general.
.
AFIPS
Comp.
Press. Reston,
1967, pp. 287-290.
Relational Data Base
SAL-75 Saltzer,
J.,
and
Management System by Query
Key Words:
Modification," Proc. 1974
general.
M.A. Schroeder,
ACM
'The Protection of
1974, pp. 180-186.
Information in Computer Systems," Proceedings of the
Key Words: DBMS,
IEEE September
case.
,
1975, pp.
Annual Conf.
ACM.
WAR-70 Ware, W.H., (Ed.)
control,
Security Controls for
Computer
Systems Report R-609, Rand Corporation, Santa Monica, CA, February 1970, (Reissued as R-609- 1. October 1979). .
1278-1308.
Key Words:
.
requiremnets,
control, methods.
Key Words: methods.
10-9
policy, models,
WOO-77
WEI-69 Weissman, C,
WOO-79
"Security Controls in the
Wood, H. The Use of Passwords
ADEPT-50 Time-Sharing
Controlled Access to
System," Proc. Fall Joint Comp. Conf. . AFEPS Press, Reston, VA, 1969, pp. 119-
Computer Resources SP 5009, National Bureau of
Woodward,
Secure Operating Systems." Proc. 1979 Nad. Comp. Conf.
,
May
Key Words: MLS. OS,
Key Words:
models, case.
control.
AFIPS
MD,
Standards, Gaithersburg,
133.
J.P.L.
"Applications of Multilevel
for
Press, Reston,
VA,
.
pp.
821-830.
1977.
Key Words: MLS, OS, guidelines,
general.
WEI-75 Weissman, C. "Secure Computer Operation with Virtual Machine Partioning," Proc, 1975 Natl.
Comp. Conf. AFIPS Press, Reston, VA, pp. 929-934. .
Key Words: OS, methods, design.
C. Communications Security
AME-78 Ames,
BRA-78
COL-78
Branstad, D.K.
S.R.,
D.R. Oesterreicher "Design of a Message
"Security of
Cole. G.D.. and F. Heinrich
Computer
Design Alternatives for
Processing System for a
Commimications," IEEE Communications Magazine
Multilevel Secure
November
Environment," Proc. 1978 Natl. Comp. Conf. AFIPS, Reston, VA. pp. 765-771. ,
Key Words: MLS,
design,
Computer Network Security SP 500-21, National Bureau of ,
.
1978, pp. 33-40.
Standards, Gaithersburg,
Key Words: methods, Key Words:
networks.
"Safeguarding Cryptographic
"Cryptography Using Modular Software Elements," Proc. 1976 Natl. Comp. Conf. AFIPS. Reston, VA, pp. 113-
Keys," Proc. 1979 Nad.
123.
Comp. Conf. AFIPS Press, Reston, VA, pp. 313-317.
Key Words:
BLA-79 Blakely, G.R.,
Denning, D.E. "Secure Personal Computing in an Unsecure Network," Communications of the ACM, August 1979, pp. 476-482.
.
Key Words: PC,
,
Key Words:
BRA-78 Branstad, D.K. (Ed.)
Computer Security and
the
Data Encryption Standard SP 500-27, National Bureau of ,
Standards. Gaithersburg.
crypto, software.
MD,
DIF-76
Burris, H.R.
Diffie,
"Computer Network Cryptography Engineering," Proc. 1976 Nad. Comp. Conf.
"New
AFIPS
Press, Reston.
VA.
pp.
W.. and M. Hellman, Directions in
IEEE
Cryptography." .
Trans, on
Inform. Theory November 1976. pp. 644-654. .
91-96.
Key Words: Key Words:
crypto, design.
February 1978.
Key Words: DES,
network,
crypto.
BUR-76
crypto, keys,
control.
networic, design.
DEN-79
BRI-76 Bright, H.S., and R.L. Enison
case.
MD,
January 1978.
crypto,
general.
10-10
crypto, theory.
GAO-77
DIF-77 W.. and M.E. Hellman "Exhaustive Cryptanalysis of the
NBS
Data Encryption
Standard,"
LEM-79
Vulnerabilities of
Diffie,
IEEE Computer
,
Telecommunications Systems to Unauthorized Use LSD-77102, U.S. General Accounting Office, Washington, DC, 31 ,
June 1977, pp. 74-84.
March 1977.
Key Words: DES,
Key Words:
analysis.
W., and M. HeUman,
ACM
network,
threats.,
in Transition,"
Computing Surveys December 1979, pp. 285-303. .
Key Words:
crypto, general.
LEN-78 Lennon, R.E., "Cryptography Architecture for
HEL-77
DIF-79
Lempel, A. "Cryptology
Hellman, M.E. "An Extension of Shannon
Information Security,"
"Privacy and Authentication:
An
Theory Approach
pp. 138-150.
Diffie,
Introduction to
IEEE
Crtyptography," Proceedings
Cryptography,"
of the IEEE March 1979, pp. 397-429.
Informal. Theory
Key Words:
Key Words:
.
to
,
IBM 2,
1978,
Trans.
May
,
Systems Journal No.
1977,
Key Words:
crypto, design.
pp. 289-294.
LIE-78 crypto, genral.
crypto, theory.
and
Lientz, B.P.,
I.R.
Weiss
'Tradeoffs of Secure
KAH-67
EHR-78 Ehrsam, W.F., et al. "A Cryptographic Key
Management Scheme
Kahn, D. The Codebreakers Macmillan, New York, 1967.
Processing in Centralized vs. Distributed Networks," Computer Networks February 1978, pp. 35-43.
Key Words: book,
Key Words:
,
for
,
Implementing the Data Encryption Standard,"
Systems Journal No. ,
IBM
KAM-78 crypto,
keys.
Kam, J.B., and G.I. Davida "A Structured Design of Substitution Permutation
and
De
Encryption Network,"
FEI-75 Feistel H., J.
W.
Foundations of Secure
Smith,
Computing 1978,
Techniques for Machine-toMachine Data Communications," Proceedings of the IEEE November 1975, pp. 1545-
78), pp. 95-131.
,
Key Words:
(10:
DEM-
crypto, general.
crypto, design.
crypto, methods,
MAT-79 "Digital Signatures:
An
'The Lattice Model in a
Networks April 1979, pp. 87-
Public Computing Network,"
94.
ACM
,
Natl.
,
Comp.
1978, pp. 453-459.
Key Words:
signatures,
general.
Key Words: modesl, network.
Hardware
Implementations of the Data Encryption Standard, SP 50020, National Bureau of Standards, Gaithersburg,
MD,
November 1977.
Key Words: DES,
Key Words:
Systems Journal 1978, pp. 126-137.
Overview," Computer
J.
Validating the Correctness of the
,
2,
Karger, P.A.
Conf.
Gait,
IBM
Keys,"
Maty as, S.M.
KAR-78
Proc.
GAI-77
"Generation, Distribution, and Installation of Cryptographic
keys.
,
1554.
Maty as, S.M., and C.H. Meyer
No.
Millo, R.A., (Ed.),
Notz,
"Some Cryptographic
Key Words:
networks, design.
MAT-78
1978, pp. 106-125.
Key Words: DES,
crypto,
general.
2,
KLI-79 Kline, C.S., and G.J.
"PubHc-Key
Key
vs.
Conventional
Encryption," Proc. 1979
Comp. Conf. Press, Reston, VA,
Natl.
crypto,
Popek
,
ARPS
pp. 831-
838.
hardware.
Key Words:
crypto, public-
key.
10-11
MER-78 Merkle, R., "Secure Communication Over Insecure Channels," Communications of the , April 1978, pp. 294-299.
ACM
Key Words:
crypto, methods.
NEE-78
MER-78a
POP-79
Merkle, R.C.. and
Needham, R. and
M.E. Hellman
Schroeder. M..
ACM
"Hiding Information and
"Using Encryption for
Signatures in Trapdoor
Authentication in Large
Knapsacks," IEEE Trans, on
Networks of Computers." Communications of the ACM.
Inform. Theory . September 1978. pp. 525-530.
Key Words:
crypto,
knapsack.
,
December 1978. pp. 993-999.
Key Words:
Popek. G.J.. and C.S. Kline "Encryption and Secure Computer Networks," Computing Surveys December 1979, pp. 331-356.
crypto, control,
Key Words:
cryoto, networks.
RAB-78 Rabin. M.O.
authentication.
"Digitalized Signatures." in
MEY-73
PAD-79 Padlipsky. M.A.. et
Meyer, C.H. "Design Considerations for Cryptography," Proc. 1973
Applications." Proc. 1979 Na.
Comp. Conf. AFIPS Press. Reston. VA. 1973.
Comp. Conf. AFIPS Press, Reston, VA. pp. 373-382.
Natl.
.
Key Words:
crypto, design.
al.
"KSOS - Computer Network .
Key Words: OS. network,
of Secure Computing . 1978. (10: DEM-78). pp. 155-168.
Key Words:
signatures,
general.
RrV-78 Rivest. R., A. Shamir,
methods.
MEY-78
and L. Adieman
"A Method
PEL-79
Meyer. C.H.
and A. Rosenfeld
"Ciphertext/Plaintext and
Peleg. S.,
Ciphertext/Key Dependence
"Breaking Substitution Ciphers Using a Relaxation AJgorithm," Communications of the ACM November 1979,
Number
of Rounds for the Data Encryption
vs.
De
Millo. R.A., (Ed.), Foundations
Standard," Proc. 1978 Natl.
Comp. Conf. AFIPS Press, Reston. VA. pp. 1119-1126. .
design.
Key Cryptosystems," Communications of the
ACM.
February 1978. pp. 120-126.
,
pp. 598-605.
Key Words: RSA.
public-key,
signatures.
Key Words: Key Words: DES.
for Obtaining
Digital Signatures and Public-
analysis, crypto,
SHA-49
algorithms.
Shannon. C.E..
MIC-79
"A Communications Theory of Secrecy Systems." Bell System Techn. Journal October 1949, pp. 656-715.
PLE-77
Michelman. E.H. "The Design and Operation of Public-Key Cryptosystems." Proc. 1979 Nad. Comp. Conf. AFIPS Press. Reston, VA, pp. 115.
Pless, V.S.
"Encryption Schemes for Computer ConfidentiaUty." IEEE Trans, on Computers
November 1977,
.
,
pp. 1133-
Key Words:
control, crypto.
POP-78
MD.
15
Key Algorithms and Signatures in
November 1979.
ACM.
pp. 612-613.
EHgital
Networks." in De Millo. R.A., (Ed.), Foundations of Secure ,
(10:
DEM-
78). pp. 133-153.
Key Words: DES.
crypto,
Key Words:
Key Words:
crypto, protocols.
Computer
Computing 1978.
January 1977.
general.
Share a Secret,
"Encryption Protocols. Public
Data Encryption Standard. FIPS PUB 46. National Bureau of Standards, Gaithersgurg,
to
Communications of the
Popek, G.J., and C.S. Kline
NBS-77
Shamir, A.
"How
crypto, public-
key, design.
crypto, theory.
SHA-79
119.
Key Words:
Key Words:
1136.
crypto, protocols.
SKA-69 Skatrud. R.O.
"A Consideration of Applying Cryptographic Techniques to Data Processing." Proc. Fall Joint Comp. Conf. AFIPS Press, Reston, VA, 1969, pp. 111-117. .
Key Words:
10-12
crypto, methods.
SIM-79 Simmons,
TUR-73 G.,
"Symmetric and Asymmetric Encryption,"
WOO-77
Turn, R.
ACM
Computing Surveys December 1979, pp. 117-128. .
Wood, HJ^.
"Privacy Transformations for Databank Systems," Proc.
1973 Natl. Comp. Conf. .
AFIPS
Press. Reston,
VA,
pp.
589-600.
Key Words:
Smith,
WA.
J.L.,
.
crypto, general.
Key Words:
WIN-74
Notz,
and P.R. Osseck "An Experimental Application of Cryptography to a Remotely Accessed Data System," Proc. Natl. Conf. 1972, pp. 282-297.
ACM
.
Remote Computer Systems and Services," Ptoc. 1977 Nad.
Comp. Conf. AFIPS Press, Reston, VA, pp. 27-33.
crypto, methods.
Key Words: SMI-72
"Using Passwords for Controlling Access to
control, network,
passwords, methods.
Winkler,
S., and L. Danner "Data Security in the
Enviroiunent,"
WOO-79 Wood, H.M.
Communications
IEEE
Computer February 1974, pp. .
23-31.
"Access Control Mechanisms Network Operating System." Proc. 1979 Natl. Comp. Conf. AFIPS Press. Reston, VA, pp. 821-830. for a
,
Key Words:
Key Words: methods,
crypto, case.
network.
SMI-79
Key Words: OS,
Smid, M.E.
A
control,
network.
Key
Notarization System Computer Networks SP 500-54, National Bureau of for
.
Standards, Gaithersburg,
MD,
October 1979.
Key Words: crypto, management, keys, case.
D. Privacy BER-75
Security Costs: a
Workshop
CON-74
COE-74
Berg, J. (Ed.) Exploring Privacy and Data
.
Summary
TN
of
Protection of the Privacy of
Privacy Act of 1974
Individuals Vis-a-Vis
579), U.S. Congress.
Electronic Data
Banks
in the
.
(P.L. 93-
Washington, DC, 1974.
Public Sector. Resolution
876.
National Bureau of Standards, Gaithersburg. MD. August
(74)29. Council of Europe,
1975.
September 1974.
Strassbourg, France. 20
Key Words: PA.
privacy, laws.
CON-76 Legislative History of the
Key Words:
privacy, design.
COE-73
Key Words:
privacy, policy.
Privacy Act of 1974
Book on
.
Source
Privacy. Senate
Committee on Government
CON-68
Operations, U.S. Congress,
Protection of the Privacy of
Privacy and the National
Individuals Vis-a-Vis
Washington, DC. 1976.
Private Sector . Resolution
Databank Concept, House Report No. 1842, House Committee on Government
(73)22, Council of Europe,
Operations, U.S. Congress,
privacy.
Slrassbourg, France, 26
Washington, DC,
September 1973.
1968.
Electronic Data
Key Words:
Banks
in the
privacy, policy.
Key Words:
May
Congress,
privacy.
10-13
2,
Key Words: Congress, PA,
HUN-74
GOL-76
CrF-72 Privacy and Computers,
Report of A Task Force of Departments of
Communication and
Justice,
Goldstein. R.C., H.H. Seward,
and R.L. Nolan
A
Methodology
for Evaluating
Alternative Technical and
Information
1972.
Approaches to Privacy Requirements TN 906, National Bureau of Standards, ,
privacy, foreign.
MD,
Gaithersburg,
Databank Systems: An Annotated Bibliography R1361-NSF, The Rand Corporation. Santa Monica, .
Management
Information Canada, Ottawa,
Key Words:
Hunt, M.K.. and R. Turn Privacy and Security in
June 1976.
DUN-67
CA.
1974.
Key Words:
privacy,
awareness.
Dunn, E.S., Jr. "The Idea of National Data Center and the Issue of Personal Privacy," American February 1967,
Statistician ,
pp. 21-27.
Key Words:
privacy, methods.
KIR-79
HAR-67
Kirby,
Harrison, A.
The Problem of Privacy
in the
Computer Age: An Annotated Bibliography RM-5495PR/RC, The Rand ,
Key Words:
privacy, threats,
methods.
M.D.
"Developing International Rules to Privacy," Computer Networks June 1979, pp. 149,
163.
Corporation, Santa Monica,
Key Words:
CA, December
foreign, laws.
1967.
privacy, policy,
FLA-79 Flaherty. D.H.
Key Words:
Privacy and Government
awareness.
Data Banks: International Perspective Mansell Publishing, London, 1979. ,
Key Words: book,
privacy,
foreign.
FON-77 Fong, E. Data Base Management Approach to Privacy Act Compliance SP 500-10, National Bureau of Standards. Gaithersburg. MD, June
A
.
Harrison, A.
Linowes, D.F. (Chrmn.) Personal Privacy in an Information Society Report of the Privacy Protection Study
The Problem of Privacy in the Computer Age: An Annotated
Commission, Government Printing Office, Washington,
Bibliography, Vol. 2
DC,
HAR-69
,
,
RM-
5495/1 -PR/RC, The Rand Corporation, Santa Monica, CA, December 1969.
Key Words:
privacy,
PA.
ACM
A
Computing
Report of the Committee on Data Protection, Cmnd. 7341, Her Majesty's Stationery Office, London, December 1978.
Key Words:
103.
privacy, general,
policy, foreign.
Key Words:
Goldstein. B.
The Cost of Privacy
privacy, general.
MAS-79
.
Honeywell Information
MA,
1975.
HON-75
Masuda, Y,
Hondius, F.W.
"Privacy in the Future
Emerging Data Protection in Europe North-Holland Publishing Co., Amsterdam,
Information Society,"
,
design.
privacy, general,
policy, laws.
,
GOL-75
Key Words: book,
PA,
Surveys June 1969, pp. 85-
methods.
Systems, Brighton,
Key Words:
Lindrop, N. (Chrmn.)
HOF-69
Survey,"
1977.
LIN-78
privacy,
awareness.
Hoffman, L.J. "Computers and Privacy:
1977.
Key Words:
LIN-77
privacy,
privacy,
Computer Networks June ,
1979, pp. 164-170.
1975.
Key Words: Key Words:
privacy, foreign.
10-14
privacy, general.
ONL-76
MIL-69 MiUer. A.R. "Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society,"
STA-79
Privacy and the Computer.
OnLine Conferences,
Ltd.,
Uxbridge, England, 1976.
Legislation," Computer Networks June 1979, pp. 174-
Key Words:
186.
,
proceedings,
privacy, policy, foreign, laws.
Michigan Law
Review April 1969, ,
G. "Survey of National Data
Stadler,
Key Words:
ONL-78
pp.
1089-1247.
privacy, Iwas,
foreign.
Transnational Data Regulation,
Proceedings of Brussels Conf.,
Key Words:
threats, privacy,
OnLine Conferences,
Ltd.,
Uxbridge. England, 1978.
policy, requirements.
MIL-71 MiUer, A. The Assault on Privacy University of Michigan Press, Ann Arbor, MI, 1971.
Key Words: proceedings. TDF, privacy, foreign.
STE-79 Steinmueller, W.,
"Legal Problems of Computer Networks: A Methodical Survey," Computer Networks
,
June 1979, pp. 187-198.
,
ROO-79 J.D.
Key Words: book,
privacy,
Key Words:
Rooms, P.L.P, and
Rooms
"Problems of Data Protection
Law
policy, threats, laws.
MUR-72 J.A., (Ed.)
Turn, R., and W.H. Ware "Privacy and Security Issues in Information Systems," IEEE
1979, pp. 205-218.
Trans, on Computers
Key Words: TDF,
privacy,
1361.
laws.
North Americans University of Windsor Press, Windsor, Canada, 1972.
Key Words:
,
TUR-77
Rosenberg, J.M. Privacy,
Random House, New York,
proceedings,
1969.
privacy, policy, foreign.
privacy, general.
ROS-89 The Death of
Key Words:
,
December 1976, pp. 1353-
Infonnation Processing and the Right of Privacy: A Crossroads Oecision for
TUR-76
Commimications Networks," Computer Networks June
for Private Multinational
,
Murray,
privacy, laws,
networks.
Turn, R. "Privacy Protection in Information Systems," in
M.C. (Ed.), Advances Computers Vol. 16, 1977,
Yovits,
Key Words: book,
OEC-76 Policy Issues in Data Protection and Privacy
1974
OECD
privacy,
Proc,
Key Words:
SIE-76
Seminar in
Paris, Organization for
Sieghart, P.
Economic Cooperation and
Privacy and Computers, Latimer, London, 1976.
Development,
Key Words:
Paris, 1976.
Key Words: book,
proceedings,
privacy,
general.
privacy, policy, foreigiL
Turn R. (Ed.) Transborder Data Flows, Vol. 1: Concerns for Privacy and Free Flow of Information ,
SMI-79 Smith, R.E.
Proc. 1977
What's Left of
Symposium in Vienna, (>ganization for Economic Cooperation and Development, Paris, 1979.
Privacy
Press, Reston,
VA,
1979.
Transborder Data Flows and the Protection of Privacy ,
privacy, general.
TUR-79
AFIPS
OEC-79
OECD
,
pp. 221-335.
threats. ,
in
— How
to Protect It,
Press/Doubleday,
Anchor
New
Key Words: TDF,
policy,
general.
York,
UCL-68
1979.
'The Computerization of
Key Words: book, general.
Key Words: proceedings, privacy, TDF, poUcy, foreign.
privacy,
Government Files: What Impact on Individual?," UCLA Law Review September 1968, ,
pp. 1371-1498.
Key Words:
10-15
privacy, threats.
WAR-73 Ware, W.H. (Chmn.) Records. Computers, and Rights of Citizens.
HEW
Secretary's Advisory Commit, on Automated Personal Data
Systems, Dept. of Health, Education and Welfare, Washington, DC, July 1973.
Key Words:
Westin, A.F., and
MA.
WES-79 Baker
Databanks in a Free Societv Quadrangle Books, New York, .
1972.
Key Words:
privacy, general.
WES-76 Westin, A.F.
privacy, policy.
Computers. Health Records, and Citizen Rights NBS
Westin, A.F.
Computers. Personnel Administration, and Citizen Rights . SP 500-50, National
Bureau of Standards, Gaithersburg, MD, DC, July 1979.
Key Words: privacy, employment
policy,
.
WES-67 Westin, A.F. Privacy and Freedom
Atheneum
WES-72
Monog.
Bureau
of Standards, Gaithersburg,
.
Publishers,
New
York, 1967.
Key Words:
157, National
MD, December Key Words:
1976.
privacy, medical.
privacy, general.
YOU-72 Younger, K. (Chrmn.) Report to the Committee on Privacy. Cmnd. 5012, Her Majesty's Stationery Office, London, July 1972.
Key Words:
10-16
privacy, foreign.
Appendix A: This appendix contains a
Assets Protection
of the periodicals cited in
Computer Law and Security
.
Paul D. Shaw, Editor. Assets Protection Publishing,
PO Box
list
Periodicals
5323, Madison,
WI
53705. 608-231-3817 (Vol. 5 in 1989).
Auerbach Data Security
IEEE Cipher
Security (^arterly. Paul Evans, Editor. Elsevier Science Publishing
Eclipse Publications Ltd., 18-20
Highbury Place, London, N5 IQP, U.K., Tel:01 -354-5858. Ed: 0703-593404 (Vol. 5 in 1989).
(Quarterly.
Newsletter of the IEEE Computer Society's Technical Committee on Security and Privacy.
Dave Bailey, Editor. IEEE Computer Society, 1730 Massachusetts Ave. N.W., Washington, DC 20036-1903. 505-846-4600 (Vol. 10 in 1989).
COM -AND.
Computer Audit
Bimonthly. J.F.
Kuong,
617-235-2895 (Vol. 7 in 1989).
Computer Control Quarterly
Computer/Law Joumal Michael D.
Quarterly.
Scott, Editor.
Center for Computer/Law, PO Box 3549, Manhattan Beach, CA 90266. 213-470-6361 (Vol.
9 in 1989).
Bulletin Monthly.
Michael Comer, Editor. Elsevier Science Publishing Ltd., Mayfield House, 256 Bradbury Road, Oxford 0X2 7DH, U.K. (Vol. 11 in 1989).
Rosenberg, Editor.
ACM
Special
Group on Computers
Interest
and Society (SIG/CAS), 11 Street, New York, NY 10036. Ed: 604-228-4142
West 42nd
Computer Security Newsletter
COM-SAC: Computer
Auditing and Controls (Quarterly. J.F.
Computer Security Institute, 360 Church Street, Northboro,
MA 90
01532. 508-393-2600 (No.
in Oct. 1989).
Koimg,
Security,
Editor.
Management Advisory Publicat., PO Box 81151, WeUesley Hills, MA 02181. 617-235-2895 (Vol. 16
in
1989).
Computer Sectnity Digest Monthly. Jack Bologna and Tim Schabeck, Editors.
Corporate Security Digest Weekly. Betty B. Borsage, Editor.
3918 Prosperity Ave., Suite
Computer Protection Systems, Inc., 150 Nortii Main St.,
Computer Security Joumal Irregular.
Russel Kay, Editor.
01532. 508-393-2600 (Vol.
5 in 1989).
Fairfax,
VA
22031-3334. 703-573-1600 (Vol. 3 in 1989).
CPR-J: Contingency Planning & Recovery Joumal Quarterly. J.F. Koung and CM. Winters, Contingency Planning & Recovery Institute and Management Advisory Publications, PO Box 81151, WeUesley HUls, 02181. 617-235-2895 (Vol. 3 in
MA
Computer Security Products Report Quarterly. Paul D. Shaw, Editor.
1989).
Territorial Imperative Inc.,
PO Box
318,
Editors.
Computer Security Institute, 360 Church Street, Northboro,
The Computer Fraud and Security
Newsletter,
(Vol. 19 in 1989).
K.J. Fitzgerald, Editor.
26 Washington Avenue, East Malvem, Victoria, 3145 Australia. (Vol. 9 in 1989).
Society Quarterly.
S.
Bimonthly. Russell Kay, Editor.
MA .
&
Richard
Editor.
Management Advisory Publicat., PO Box 81151. WeUesley Hills, MA 02181.
Ltd., Mayfield House, 256 Bradbury Road, Oxford 0X2 7DH, U.K. (Vol. 8 in 1989).
Computers
Plymouth, MI 48170. 313-459-8787 (Vol. 7 in 1989).
News and Developments
&
Computers
Report Bimonthly. Stephen Saxby, Editor.
Management Bimonthly. Rich Mansfield, Editor. Auerbach Information Management Series, Auerbach Publishers Inc., a Warren, Gorham & Lamont company. One Perm Plaza, New York, NY 10119. 212-971-5000 (Vol. 9 in 1989).
this bibliography.
5323, Madison,
WI
53705. 608-231-3817 (New in
Cryptologia Quarterly.
David Kahn, et al.. Editors. Rose-Huhnan Institute of Technology, Terre Haute, IN 47803. 812-877-1511 (Vol. 13
1986).
in 1989).
A-1
Cryptosystem Journal Irregular.
Tony
Patti, Editor.
9755 Oatley Lane, Burke, VA 22015. 703-451-6664 (Vol. 2 in 1989).
EDP
Auditor Quarterly. William E. Perry, Editor.
EDP
Auditors Association, 373 Schmale Rd, Carol Stream, IL 60187. 312-653-0950 (Vol. S.
18 in 1989).
Data Processing Auditing Report Monthly. Belden Menkus, Editor. John Wiley & Sons. 600 3rd Avenue, New York, NY 10158. 212-692-6000 (Vol. 11 in 1989).
Data Processing & Communications Security
Security BuUetin/Securite de
Paul D. Shaw, Editor. Assets Protection Publishing,
5323, Madison,
WI
53705. 608-231-3817 (Vol. 13 in 1989).
Datapro Reports on Information Security Monthly. Kristen A. Noakes-Fry,
Linda Kirk, Editor. EDP Security Branch, Royal Canadian Mounted Police, 1200 Vanier Parkway, Ottawa, KIA OR2 Canada. 613-993-8783
G.B. Agnew, Editor. Editor: Dept. of Electrical Engineering, University of Waterloo, Waterloo, Ontario 3G1, Canada. 519-885-1211 Ext. 3041 (Vol. 6
N@L
Age
Quarterly.
1989).
Theresa F. Lunt, Editor. Berson & Limt, PO Box 1593, Palo Alto, CA 94302. 415-325-3662 (Vol. 3 in
Richard Arnold, Editor-in-Chief.
5712 Meramar Drive,
MO
St.
63129. 314-846-1001 (Vol. 2 in 1989)
EDPACS: EDP
Audit, Control
and Security Newsletter Monthly. Belden Menkus, Editor-in-Chief.
Warren, Gorham
One Penn
NY
Plaza,
&
York,
ISPNews: INFOSecurity Product
News
Bimonthly.
Farmington,
Street,
MA
01701. 508-879-7999 (New in 1990).
ISSA Access
Quarterly.
Cherie G. Smith, Editor. Information Systems Security
PO Box
in 1989).
Journal of Cryptology Irregular.
Ernest F. Brickell, Editor-in-Chief.
Verlag
Age
New York, Inc., 175 New York, NY
Fifth Ave..
10010. 212-460-1612 (Vol.
Inc.
A
Warren, Groham and Lamont Company, 210 South Street, Boston, 02111. 212-971-5271.
MA
Information Security Monitor
Jack Smith, Editor. IBC Technical Services Ltd., 57/61 Mortimer Street, IBC House, Canada Road, Byfleet,
KT14
1
in 1989).
Journal of Information Systems Security Quarterly.
Gregory
W.
Therklasen,
Peter S. Browne, and
WiUiam H. Murray. Consulting Editors.
Auerbach Publishers. Division of
Lamont,
Gorham
Inc.,
A &
210 South
MA
Boston, 02111-9990. 800-950-1217 Street,
(New
in 1989)
7JL, U.K.
Lamont,
10119. (Vol. 17 in
1989).
See Information
Surrey,
New
1
Cryptologic Research. Springer Information Privacy
Auerbach Publishers,
Quarterly.
TX
International Association of
Monthly. Sanford Sherizen, Editor.
Disaster Recovery Journal
Louis,
J.
Information Security Advisor
1989).
Drive, Dallas,
75240. 214-404-0897 (Vol.
9457, Newport Beach, CA 92658. 714-250-4772 (Vol. 2
year.
08075.
Quorum
Association, Inc.,
in 1989).
Data Security Letter 9 times a
NJ
Info Gnformation Security and Access Control) Bi-monthly. Isolation Systems Inc., 14800
498 Concord
Research.
Hayes, Editor. Butterworth Scientific Ltd., PO Box 63, Westbury House, Bury Street, Guilford, Surrey GU2 5BH, England. (Vol. 11 in
Parkway, Dekan, 609-764-0100.
ISAC
Newsletter Quarterly.
Newsletter of the International Association for Cryptologic
Information
Corporation, 600 Delran
1989).
in 1989).
Editor.
Datapro Research
Advisor Monthly. Michael Scott, Editor. Law and Technology Press, PO Box 3280, Manhattan Beach, CA 90266. 213-470-9976 (Vol. 3 in
L'informatique Irregular.
lACR
Quarterly.
PO Box
EDP
Computer Law
International
Journal of Security Administration
Lntemal Auditor Bimonthly. of Internal Auditors, 149 Maitland Avenue, Altamonte Springs, PL 32701. 305-830-7600. Institute
Semiannual.
Norman
Press, 1550 Northwest Highway, Park Ridge, IL 60068. 305-279-9437 (Vol. 11 in
1989).
A-2
R. Bottom, Editor.
London House
News
PIN: Personal Identification 11 times a year.
Ben
Tom
Miller and George
Warfel, Editors.
Warfel
&
Security, Audit
&
Control Review
Quarterly.
Miller. Inc.,
PO
11018. Washington. DC 20008. 301-652-9050 (Vol. 5
Box
in 1989).
Privacy Journal Monthly.
Robert E. Smith. Editor. PO Box 15300. Washington DC 20003. 202-547-2865 (Vol. 15 in 1989).
ACM
Richards, Editor. Special Interest
Group on
Security, Audit and Control
(SIG/SAC), 11 West 42nd Street, New York. NY 10036. 817-565-3110 (Vol. 6 in 1989). Biweekly. Robert McCrie, Editor. Security Letter, 166 East 96th St., New York, NY 10128. 212-348-1553 (Vol. 20 in
Sectirity Letter
Software Law Journal Quarterly. Michael D. Scott, Editor. Center for Computer/Law, PO Box 3549, Manhattan Beach, CA 90266. 213-470-6361 (Vol. 2 in 1989).
Software Protection Monthly. Michael Scott, Editor.
Law and Technology
Press,
PO Box
3280, Manhattan Beach. CA 90266.
213-470-9976 (Vol. 8
in
1989).
1989).
Privacy Times Bi-weekly. Evan Hendricks. Editor.
PO Box
DC
21501. Washington, 20009. 202-526-2415
(Vol. 7 in 1986).
Quality Assurance Quest Monthly.
W.E.
Perry. Editoi
Quality Assurance Institute. Suite 350. Dr. Phillips Blvd.
FL
32819. 407-363-1111 (Vol. 9 in Orlando, 1989).
Transnational Data Report
Management Monthly.
Security
American Association
for
North Fort Myer Drive, Suite 1200, Arlington. VA 22209. 703-522-5800 (Vol. 33 in
2039, 22152. 202- 488-3434 (Vol. 12 in
1989).
1989).
Security Systems Administration
Monthly.
Thomas
PTN
S. Kapinos. Editor.
Publishing Co.. 101
Analysis.
1989).
in
New
Security
World Monthly.
Frances Bouchoux, Editor-in-
Kerrigan Lyndon, Editor. Cahners Publishing Co.. Cahners Plaza, 1350 E. Touchy Avenue, PO Box 5080, Des Plaines, IL 60018. 312-635-8800 (Vol. 26 in
Chief.
1989).
York,
Rutgers Computer and Technology Law Journal Semiannual. .
Rutgers
Law
Service. Inc.. Springfield,
PO Box
VA
The EDP Auditor Journal The EDP Auditors Foimdation, PO Box 88180. Carol Stream. IL. 60188-0180.
Virus Bulletin Monthly. Edward Wilding. Editor. Virus Bulletin. Ltd..
Curtis Travis. Editor-in-Chief.
10013. (Vol. 9 in 1989).
Editor.
Transnational Data Reporting
Risk Analysis Quarterly. Journal of the Society for Risk
Spring Street,
Timothy G.Donovan.
Industrial Security (ASIS), 1655
Crossways Park West, Woodbury. NY 11797. 516-496-8000 (Vol. 18
Plenum Publishing Co.. 233
Monthly.
School, 15
Washington Street, Newark. NJ 07102. 201-648-5549 (Vol. 12 in 1986). Security Monthly.
Cahners Publishers. 44 Cook Street, Denver. CO 80206. 303-388-4511 (New in 1989).
A-3
Haddenham. Aylesbury, HP17 8JD, U.K. +44 844 290396, or PO Box 875, 454 Main Street,
CT 06877. 203- 431-8720 (Vol. 1 in Ridgefield,
1989).
Appendix B: This appendix contains a Section
1
:
list
of
all
List of
the
Key Words
keywords used
in
each of the sections.
General
awareness, book, crime, computer virus, Congress, contingency, ethics, general, government, PC [personal computer], physical, policy, risk, software piracy, techniques, threats, virus, vulnerabilities. guidelines, hackers, integrity, international, laws, legislation,
Section 2
:
Management
computer virus, control [access control], denial [of government, guidelines, hackers, hardware, integrity, management, methods [mechanisms, procedures], PC [personal computer, microcomputer], personnel, physical, policy, proceedings, recovery [operational, disaster], requirement, risk [management], software, techniques, theory, virus [worm], vulnerabilities. auditing, awareness, book, certification, service], general,
Section 3
:
Foundations
authentication, capability, case [specific description], control, covert channel, database, discretionary, flow, formal, inference [non-inference], integrity,
methods, models,
MLS
[multi-level security],
LAN
[local area network],
network [also distributed system], policy,
proceedings, safety, specification, take-grant [specific access control model], theory, trusted [systems], verification, virus.
Section 4
:
Access Control
control [access], architecture, authentication [identification], book, capability [for access control], case [case study], design, discretionary, government, guidelines, hardware, integrity,
PC
management, mandatory, methods,
OS
[operating system], passwords, proceedings
[personal computer], safety, software, techniques, trusted [system].
Section 5
:
Trusted Systems
architecture, authentication, book, capability, case [case study], certification, control, covert
channel, criteria, cryptography, denial [of service], design, discretionary, general, government, guidelines, integrity, kemel, methods, MLS, models, network, OS [operating system], proceedings, specifications, software, TCB [trusted computing base], threat, techniques, theory, trusted [system], verification.
B-1
Section 6 Database Security :
auditing, authentication, case [case study, example], control [access control], criteria,
database
[files,
records], design, discretionary, distributed, encryption, government,
guidelines, inference, integrity, kernel,
methods, models,
MLS, network
DBMS
[database
management system], mandatory,
[distributed], policy, privacy, proceedings, relational,
requirements, software, statistical [databank], techniques, theory, trusted, verification, views [of database].
Section 7
:
Communication and Network Security
architecture, auditing, authentication, book, case [case study], controls, criteria, crypto
[cryptography],
DES
[data encryption standard], design, distributed,
general, government, guidelines, hardware, keys [cryptographic],
management, methods, MLS, models, network system],
OSI [open systems
interconnect],
PC
EM
LAN
[electronic mail],
[local area network],
[also distributed system],
OS
[operating
[personal computer, terminal], physical,
policy, proceedings, protocols, public-key [cryptography], requirements,
RSA
[Ri vest-Shamir- Adleman public-key algorithm], software, standards, techniques, threats [also
covert channels], trusted [system], verification [also assurance], vulnerabilities.
Section 8
:
Cryptography
algorithms, analysis [also crypto-analysis], authentication [identification], book, check-sum,
DES [data encryption standard], design, evaluation, hardware, integrity, keys [cryptographic keys, management], knapsack [public-key algorithm], methods, proceedings, protocols, public-key [cryptographic method], oblivious [transfer protocol], one-way [functions], poUcy, random, RSA, research, signatures [digital], software, codes, complexity,
techniques, theory, threats, trap-door [functions], verification, vulnerabilities, zero
[zero-information protocol].
Section 9
:
Privacy ("privacy"
is
implicit in all entries).
analysis, book, case [case study], confidentiality. Congress, credit [data], criminal [justice records], databank, design, EFTS [electronic funds transfer system], employment [records],
information], foreign [countries other than the U.S.], general, government, guidelines, identifier, laws [legislation], management, matching, medical [records], oversight [of laws], PA [U.S. Privacy Act of 1074], proceedings, profiling, protection [of rights],
FOI [freedom of
records, requirements, rights [individual], social [sciences], statistical [data, databanks], surveillance, threats,
TDF
[transborder dataflow], use.
B-2 oV.S.
GOVERNMENT PRINTING OmCE: l990.28l.6l^23^e9
NIST-114A
DEPARTMENT OF COMMERCE OF STANDARDS AND TECHNOLOGY
U.S.
NATIONAL INSTITUTE
(REV. 3-89)
BIBLIOGRAPHIC DATA SHEET
1.
PUBLICATION OR REPORT NUMBER
NIST/SP-800/1 PERFORMING ORGANIZATION REPORT NUMBER 3.
PUBLICATION DATE
December 1990 TITLE
AND SUBTITLE
Bibliography of Selected Computer Security Publications January 1980 - October 1989 AUTHOR(S)
5.
compiler; Lawrence E. Bassham III, editor
Rein Turn,
PERFORMING ORGANIZATION
6.
(IF
JOINT OR OTHER THAN NIST, SEE INSTRUCTIONS)
SPONSORING ORGANIZATION NAME AND COMPLETE ADDRESS (STREET,
9.
7.
Rein Turn Associates 15239 Earlham St. Pacific Palisades, CA
DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY GAITHERSBURG, MD 20899 U.S.
8.
CONTRACT/GRANT NUMBER
43NANB922203
TYPE OF REPORT AND PERIOD COVERED
January 1980-October 1989
CITY, STATE, ZIP)
Same as item #6
'
!
!
10.
SUPPLEMENTARY NOTES
11.
ABSTRACT
DOCUMENT D ESCRIBES A COMPUTER PROGRAM; SF-1B5, FIPS SOFTWARE SUMMARY, IS ATTACHED. IF DOCUMENT INCLUDES A SIGNIFICANT BIBLIOGRAPHY OR (A 200-WORD OR LESS FACTUAL SUMMARY OF MOST SIGNIFICANT INFORMATION.
LITERATURE SURVEY, MENTION
IT
HERE.)
This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre-1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography.
12.
KEY WORDS
13.
AVAILABIUTY
(6
TO
12 ENTRIES;
ALPHABETICAL ORDER; CAPITALIZE ONLY PROPER NAMES; AND SEPARATE KEY
WORDS BY SEMICOLONS)
access controls; auditing; communications security; computer crime; computer security; confidentiality; crytography; disaster recovery; integrity; privacy; risk management; trusted computing base.
Y
14.
UNUNITED FOR OFFICIAL DISTRIBUTION. DO NOT RELEASE TO NATIONAL TECHNICAL INFORMATION SERVICE
ORDER FROM SUPERINTENDENT OF DOCUMENTS, WASHINGTON, DC 20402.
U.S.
GOVERNMENT PRINTING
ORDER FROM NATIONAL TECHNICAL INFORMATION SERVICE
ELECTRONIC FORM
(NTIS),
OFFICE,
SPRINGFIELD, VA 22161.
NUMBER OF PRINTED PAGES
200
(NTIS). 15.
PRICE
!
1
ANNOUNCEMENT OF NEW PUBLICATIONS ON COMPUTER SECURITY
Superintendent of Documents
Government Washington,
Dear
Printing Office
DC
20402
Sir:
Please add my name to the annoimcement list of new publications to be issued in the series: National Institute of Standards and Technology Special Publication 800-.
Name Company Address City
(Notification key N-503)
State
Zip Code
/
i 1
A. Technical Publications
Periodical
—
Journal of Research of the National Institute of Standards and Technology Reports NIST research and development in those disciplines of the physical and engineering sciences in which the Institute is active. These include physics, chemistry, engineering, mathematics, and computer sciences. Papers cover a broad range of subjects, with major emphasis on measurement methodology and the basic technology underlying standardization. Also included from time to time are survey articles on topics closely related to the Institute's technical and scientific programs. Issued six times a year.
Nonperiodicals
— Major contributions to the technical literature on various subjects related to the and technical Handbooks — Recommended codes of engineering and industrial practice (including safety codes) developed in cooperation with interested industries, professional organizations, and regulatory bodies. Special Publications — Include proceedings of conferences sponsored by NIST, NIST annual reports,
Monographs
Institute's scientific
activities.
and other special publications appropriate to this grouping such as wall charts, pocket cards, bibliographies. Applied Mathematics Series
—Mathematical
tables,
manuals, and studies of special interest to physi-
engineers, chemists, biologists, mathematicians, scientific and technical work. cists,
and
computer programmers, and others engaged
in
—
National Standard Reference Data Series Provides quantitative data on the physical and chemical properties of materials, compiled from the world's literature and critically evaluated. Developed under a worldwide program coordinated by NIST under the authority of the National Standard Data Act (Public Law 90-396). NOTE: The Journal of Physical and Chemical Reference Data (JPCRD) is published quarterly for NIST by the American Chemical Society (ACS) and the American Institute of Physics (AIP). Subscriptions, reprints, and supplements are available from ACS, 1155 Six20056. teenth St., NW., Washington, Building Science Series Disseminates technical information developed at the Institute on building materials, components, systems, and whole structures. The series presents research results, test methods, and performance criteria related to the structural and environmental functions and the durability and safety characteristics of building elements and systems.
DC
—
Technical ment of a treatment under the
Notes
— Studies or reports which are complete in themselves but restrictive
subject.
Analogous
to
monographs but not so comprehensive
in their treat-
scope or definitive reports of work performed at in
in
NIST of the subject area. Often serve as a vehicle for final sponsorship of other government agencies. Voluntary Product Standards Developed under procedures published by the Department of Commerce in Part 10, Title 15, of the Code of Federal Regulations. The standards establish nationally recognized requirements for products, and provide all concerned interests with a basis for common understanding of the characteristics of the products. NIST administers this program as a supplement to the activities of the private sector standardizing organizations. Consumer Information Series Practical information, based on NIST research and experience, covering areas of interest to the consumer. Easily understandable language and illustrations provide useful background knowledge for shopping in today's technological marketplace. Order the above NIST publications from: Superintendent of Documents, Government Printing Office, 20402. Washington, Order the following NIST publications—FIPS and NISTIRs—from the National Technical Information
—
—
DC
VA 22161. Federal Information Processing Standards Publications (FIPS PUB)— Publications in 'this series collectively constitute the Federal Information Processing Standards Register. The Register serves as the official source of information in the Federal Government regarding standards issued by NIST pursuant to the Federal Property and Administrative Services Act of 1949 as amended, Public Law 89-306 (79 Stat. 1127), and as implemented by Executive Order 11717 (38 FR 12315, dated May 11, 1973) and Part 6 of Title 15 CFR (Code of Federal Regulations). NIST Interagency Reports (NISTIR)— special series of interim or final reports on work performed by NIST for outside sponsors (both government and non-govemment). In general, initial distribution is handled by the sponsor; public distribution is by the National Technical Information Service, 22161, in paper copy or microfiche form. Springfield,
Service, Springfield,
A
VA
U.S. Department of Commerce National Institute of Standards and Technology (formerly National Bureau of Standards) Gaithersburg, 20899
MD
Official Business Penalty for Private
Use $300