Computer security - Nvlpubs.nist.gov… [PDF]

Communication and Network Security. 7-1. 8. Cryptography. 8-1. 9. .... "Jesse James at the Terminal,". Harvard Business

0 downloads 10 Views 12MB Size

Recommend Stories


COMPUTER SECURITY
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

[PDF] Computer Security: Art and Science
The happiest people don't have the best of everything, they just make the best of everything. Anony

[PDF] Online Computer Security: Principles and Practice
Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will

[PDF] Computer Security: Principles and Practice
Seek knowledge from cradle to the grave. Prophet Muhammad (Peace be upon him)

Computer security Lecture 07
Keep your face always toward the sunshine - and shadows will fall behind you. Walt Whitman

Computer Security Solution Manual
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Analyzing Computer Security
What we think, what we become. Buddha

computer network security
If you want to go quickly, go alone. If you want to go far, go together. African proverb

Book Corporate Computer Security
Kindness, like a boomerang, always returns. Unknown

Computer Security Specialist
If you want to become full, let yourself be empty. Lao Tzu

Idea Transcript


Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below).

Archived Publication Series/Number:

NIST Special Publication 800-1

Title:

Bibliography of Selected Computer Security Publications, January 1980 - October 1989

Publication Date(s):

December 1990

Withdrawal Date:

July 9, 2018

Withdrawal Note:

SP 800-1 is a bibliography of old, non-NIST-series publications. It is being withdrawn but remains available for historical reference.

Superseding Publication(s) The attached publication has been superseded by the following publication(s): Series/Number: Title: Author(s): Publication Date(s): URL/DOI:

Additional Information (if applicable) Contact:

Computer Security Division (Information Technology Laboratory)

Latest revision of the attached publication: Related information:

https://csrc.nist.gov/publications

Withdrawal announcement (link):

N/A

Date updated: :ƵůLJϵ͕ϮϬϭϴ

NIST

Special Publication 800-1

DEPARTMENT OF

U.S.

COMMERCE

National Institute of Standards

and Technology NAT

L

INST

OF STAND

4

l^l^j""' l

Bibliography of Selected Computer Security Publications January 1980October 1989

l

A111D3 MbEl^lb

Rein Turn

Lawrence E. Bassham

III

NIST

PUBLICATIONS

COMPUTER SECURITY

100 .U57

_

800-1

1990 C.2

NIST

Special Publication 800-1

Bibliography of Selected Computer Security Publications January 1980October 1989 Rein TUm, Compiler Rein Tlim Associates Pacific Palisades,

CA 90727

Lawrence E. Bassham

III,

Editor

COMPUTER SECURITY National Computer Systems Laboratory

National Institute of Standards

and Technology Gaithersburg,

MD

20899

December 1990

U.S.

DEPARTMENT OF COMMERCE

Robert A. Mosbacher, Secretary

NATIONAL INSTITUTE OF STANDARDS

AND TECHNOLOGY

John W. Lyons, Director

Reports on Computer Systems Technology

The National Institute of Standards and Technology (NIST) has a unique responsibility for computer systems technology within the Federal Government. NIST's National Computer Systems Laboratory (NCSL) develops standards and guidelines, provides technical assistance, and conducts research for computand related telecommunications systems to achieve more effective utilization of Federal information NCSL's responsibilities include development of technical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. NCSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 800 series reports NCSL research and guidelines to Federal agencies as well as to organizations in industry, government, and academia. ers

technology resources.

National Institute of Standards and Technology Special Publication 800-1 Natl. Inst. Stand. Technol. Spec. Publ. 800-1, 200 pages (Dec. 1990)

CODEN: NSPUE2

U.S.

For

sale

GOVERNMENT PRINTING OFFICE WASHINGTON:

1990

by the Superintendent of Documents, U.S. Government

Printing Office, Washington,

DC

20402

ABSTRACT This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals,

magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre- 1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography.

Key Words:

access

controls;

auditing;

computer management; trusted computing base.

communications

security;

computer crime;

security; confidentiality; cryptography; disaster recovery; integrity; privacy;

risk

iii

Contents Introduction

1

1.

General

1-1

2.

Management

2-1

3.

Foundations

3-1

4.

Access Control

4-1

5.

Trusted Systems

5-1

6.

Database Security

6-1

7.

Communication and Network Security

7-1

8.

Cryptography

8-1

9.

Privacy

9-1

10. Pre- 1980 Publications

10-1

A. Security Environment

10-1

B. Security Models and Database Security

10-3

C. Communications Security

10-10

D. Privacy

10-13

A-1

Appendix A: Periodicals Appendix B:

List of

Key Words

B-1

V

INTRODUCTION need for better dissemination of computer security information throughout government and industry, the National Institute of Standards and Technology (NIST) has produced this selected bibliography of key computer security literature published from January 1980 through October 1989. This bibHography was compiled by Rein Turn of Rein Turn Associates under contract to NIST. In recognition

of the

The bibliography

is

critical

organized into the following 10 sections and 2 appendices:

1.

General

2.

Management

Foundations 4. Access Control 5. Trusted Systems 6. Database Security 7. Communication and Network Security 8. Cryptography 9. Privacy 10. Pre- 1980 Publications Appendix A: Periodicals Appendix B: List of Key Words 3.

Citations in sections 1 through 9 are organized by subject matter; section 10 is a listing of pre- 1980 publications. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. EngHsh language articles from foreign journals were included as available.

The

individual citations have the following structure (an example

is

shown

at

the

right):

AAL-83

Identifier

Author

Aalders, J.C.H.

"Towards Standards in Computer Security," Proc. inP/Sec. '83 Stockholm, 1983, (2: FAK-83),

Title

Journal

title

(or publishing house)

.

Date and page (or location and year) Key words (two or three)

pp. 5-13.

Key Words:

Each

name

of the principal author's last is identified or listing by more meaningful) and the last two digits of the year of publication. A following the year serves to distinguish otherwise identical citation identifiers.

citation is uniquely identified

(or the publishing

organization

lowercase

is

letter

by the

guidelines, policy.

first letters

organization's acronym, if no author

1

Section numbers are used to distinguish identical citations identifiers from different sections and multiple citations from the same publication [e.g. (2: NBS-81) and (7: NBS-81)],

Appendix A contains a list of the periodicals from which citations in this bibliography have been taken. The list contains publisher and editor information where appropriate in order to assist the user of this bibliography to obtain more information about documents cited. Appendix B contains a

key words used in each of the 10 sections. This on a topic that spans more than one an example, information viruses section. As on can been found in each of the first three sections (General, Management, and Foundations).

list

will assist the reader

list

of

who would

all

the

like information

2

General

1.

This section cites general, mostly nontechnical publications on computer threats and vulnerabilities (including the hacker

and computer

viruses), the

need for computer security, and

other aspects of computer security.

ALA-86

AAL-83

ASS-81 "An Atlas of Terrorism,"

Alagar, V.S.

Aalders, J.C.H.

'Towards Standards in

"A Human Approach

Computer

Technological Challenges in

Security," Proc. IFIP/Sec. '83 Stockholm, .

1983.

FAK-83), pp. 5-13.

(2:

to the

&

Data Security," Computers Security

.

December 1986. pp.

Assets Protection March/April 1981, pp. 26-36. ,

Key Words:

crime, hackers.

328-335.

Key Words:

ATK-85

guidelines,

Key Words:

policy.

awareness,

Atkins,

AAL-85

Harvard Business Review

ALL-85

Aalders, J.C.H., I.S.

W.

"Jesse James at the Terminal,"

policy.

Herschberg, and

Allen, R.J.

A. Van Zanten

Handbook Security

,

for Information

"Data Security: Problems and Remedies," Today's Office

New

York,

1985.

Key Words:

Backwith, N. "Unique Approach

crime, threats,

Security

Key Words: book,

general,

APR-81 .

Key Words:

guidelines, policy.

BAI-84

Key Words: book,

crime.

Criminal Justice, Washington,

ARD-85

DC, 1984.

Ardis, P.M., and

Key Words: book,

crime,

Crime

Agranoff, M.H.

,

(5:

Key Words: legislation.

Key Words:

crime, policy,

&

IEE-84). pp. 180-

187.

crime, hackers,

BAI-87 Baird, B.J., L.L. Baird, and

international.

R.P. Ranauro,

1983. pp. 7-17.

ARN-83 awareness,

Privacy

6.

,

"Achieving Security Awareness: Tips and Techniques." Computer Security Journal Spring

"Attacks on Computers: Congressional Hearings and Pending Legislation," Proc.

US and UK," Computer Fraud & Security Bulletin August 1985. pp. 1Insurance in the

AGR-83

Bailey. D.

1984 IEEE Symp. on Sec.

R.M. Johnson "Electronic and

laws, policy.

guidelines.

&

January 1982, pp. 35-

Madison, WI, 1981

Report on Crime, American Bar Association. Section on

Key Words:

,

40.

Crime Investigation Manual

Assets Protection Publishing,

ABA-84

to Security

Evaluation," Computers

general, techniques.

policy, guidelines, techniques.

crime, hackers.

BAC-83

April 1985, pp. 26-27.

North-

Key Words:

,

Holland/Elsevier Science

Publishing Co.,

,

July/August 1985

Amell, A.

'The Moral Cracker?," Computers & Security

"On-Site Hazards, Off-Site

December 1987,

,

pp. 471-478.

Safety," Computerworld,

December

12, 1983, pp.

ID/13-24.

Key Words:

threats, physical.

1-1

Key Words:

crime, hackers.

BEA-84

BAI-89 Bainbridge, D.I.

"Hacking - The Unauthorized Access of Computer Systems: The Legal Implications," Modem

Law Review March .

BEE-84

Beane. W.F., E.R. Hilton, and B. Goldstein

Who

"Computer Security:

Is

Charge?" Security World October 1984, pp. 42-46.

in

1984, pp.

,

77-1-.

Key Words:

1989,

Key Words:

pp. 236-245.

Beebe, C.A. "Plarming for Access Control," Security Management, January

guidelines, policy.

general, policy.

BEL-87

Key Words:

crime, hackers,

legislation.

BAK-85

BEC-80

Belford, P.. and

Becker,

J.

"Rifkin

-

History,"

Baker, R.H.

Journal

The Computer Security Handbook TAB Books,

472-720.

,

.

A Documentary Computer/Laws

Summer

1980, pp.

Key Words:

crime.

Key Words: BEC-83

Key Words: book,

general,

policy, guidelines, techniques.

BAL-82 "Crime," Technology Review, April 1982, pp. 21-30.

Key Words:

crime, pohcy,

awareness,

hackers, threats, vulnerabilities.

Becker, L.G.

Computer Security: An Overview of National

BEQ-83 Bequai, A.

How

Concerns and Challenges Report No. 83-135 SPR, Congressional Research Service, U.S. Library of Congress, Washington, DC, February 3, 1983. ,

Ball. L.D.

Quann

Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 155-157.

Inc.,

Blue Ridge Summit, PA, 1985

J.

'The Hack Attack Increasing Computer System Awareness of Vulnerability Threats," AL\A 87-3093, Proc. 3d

to Prevent

Wiley

&

Crime

New

Sons.

,

J.

York,

1983.

Key Words: book,

crime,

guidelines, techniques.

legislation.

Key Words:

BAL-88 Ball.

BEQ-83a

crime, policy,

Bequai, A.

legislation.

"What Can Be Done to Stem The Rising Electronic Crime?," The Office November 1983,

M.

'To Catch a Thief," Security

Management March 1988. .

pp. 72-78.

BEC-83a Becker, H.B. Information Integrity

McGraw-Hill,

Key Words:

crime, hackers,

New

,

pp. 47-49.

,

York,

Key Words:

1983.

Key Words: book,

BAS-88

guidelines,

BEQ-84

policy, techniques.

Bequai. A.

Baskerville, R.

Designing Information Systems Security Wiley & Sons, Somerset, NJ, 1988 ,

BEC-85 Becker, L.G.

"Lack of Ethics as a Cause of Crime." Computers and People

Computer Abuse and Misuse:

May-June 1984, pp. 7-14.

An Key Words: book,

guidelines,

policy, techniques, general.

Assessment of State and

Federal Legislative Incentives Princeton, NJ, 1985.

Bauder, D.

Key Words:

"Electronic Fimds Transfer

legislation.

crime, policy,

Sec. Progr. (5:

vulnerabilities,

threats, pwlicy. guidelines.

crime, ethics.

BER-82 Bemhard, R. "Breaching System Security," IEEE Spectrum June 1982, ,

BEC-85a

Key Words:

Becker, L.G.

"Computer and Network

Key Words:

Key Words:

pp. 24-31.

Security," Proc. 7th Seminar,

DOD-84), 1984, pp. 188-194.

,

Defense Analysis,

Institute for

BAU-84

DoD Comp.

crime, policy,

guidelines.

guidelines.

Security Policy:

A

Challenge

to Organizations," Proc.

MP/Sec. (2:

'85 . Dublin. 1985.

GRI-85), pp. 241-250.

Key Words:

policy,

guidelines.

1-2

threats, crime.

,

BLO-85

BIG-81

BLO-82

Bigelow, R.P. (Ed.)

Computers

&

the

Laws

BloomBecker.

.

Commerce

Clearing House, Chicago. 1981.

Key Words: book,

crime,

"International Crime: Where Terrorism and Transborder Data Flow Meet." Computers & Security January 1982, pp.

Bigelow, R.P.

Computer Security

Journal,

crime, laws.

BLO-83

Bigelow, R.P.

,

and J.-O. Bruer "Office Information Systems and Security," Proc. IFIP/Sec. 'J3, Stockholm, 1983, (2: FAK-83), pp. 107-110. R..

guidelines,

.

107. guidelines,

Key Words: book,

crime, laws.

BLO-85b J.J.

Introduction to Crime National .

BLO-83a Bloom, R. "Computers Don't Commit Crime, People Do," Data

Management

Key Words:

Computer-Crime Data, CaUfomia State University, Los Angeles, CA. 1985.

Bloombecker.

policy.

"The Security Officer's Role in Legal Protection of Software," Computer Security Journal Winter 1982, pp. 99-

BLO-85a

Reporter National Center for

Blom.

Key Words:

BIG-81b

awareness, ethics.

Bloombecker, J. Computer-Crime Laws

vs.

Winter 1982, pp. 131-136.

Key Words:

crime, hackers,

international.

McLaughlin, or Why the Criminal Sometimes Goes Free,"

Report, Oct./Nov. 1985, pp. 367-370.

Key Words:

Key Words:

BIG-81a

Bloombecker, J. "Computer Security for the People," Transnational Data

.

41-53.

guidelines, laws.

"The Queen

J.

Center for Crime Data, Los Angeles, CA, September 1985.

Key Words: book,

crime, laws.

July 1983, p.

,

BLO-86

14.

Bloombecker, J.J. Crime, Computer Security

policy.

Key Words:

crime.

BLA-84

,

Computer Ethics National Center for Crime Data, Los Angeles, CA, February 1986. ,

Blakney. S. "Crime," Computerworld.

December

26, 1983, p.

57-I-.

BLO-83b BloomBecker, J. "Crime - Corporate Coimcel's View," Crime Digest March ,

Key Words:

crime, threats.

BLA-88

1983, pp. 7-10.

Key Words:

crime, laws.

"A Manufacturer's Approach Computer

BloomBecker.

J.

"International Crime:

'88

Growing Threat,"

AustraUa, 1989. (2: CAE-89). pp. 187-195. .

A

Laws Bolsters Computer Security Efforts," Computerworld, October 27, 1986, p. 53-66.

Key Words:

crime, laws.

awareness,

guidelines, policy, techniques.

Key Words:

crime, threats,

BLO-80 BLO-84

Bloom, R. "Catching the Computer Crook," Infosystems July 1980. pp. 30-35. .

Bloombecker,

J.

"Introduction to Crime," Proc. IFIP/Sec. '84 Toronto, 1984, .

(2:

BLO-86b Bloombecker, J.J. "Lobbying for Protection," Computerworld, August 4,

international.

guidelines.

J.J.

Federal

Transnational Data Report,

June 1983. pp. 219-230.

Key Words:

BLO-86a

"New

BLO-83C

Systems," Proc. IFIP/Sec.

Key Words:

book, crime,

Bloombecker,

Blatchford, C. to the Security of

Key Words:

ethivcs, policy.

1986, pp. 55-62.

Key Words:

crime, awareness.

FIN-85), pp. 423-430.

BLO-86C

crime,

Key Words:

crime, general.

Bloombecker, J.J. "Defense of Crime Cases,"

American Jurisprudence

Trials ,

Vol. 33. 1986. pp. 1-197.

Key Words:

1-3

crime, laws.

BOL-86

BLO-88

Management

July 1988, pp.

.

BRO-83

Bologna,

Bloombecker, J.J. "Captain Midnight and the Space Hackers," Security 76-82.

J.

"Computer Related Crime: The Who, What, Where, When, Why and How, I," Data ProcessinE & Communications Security Winter 1986. pp. 19-23. .

Key Words:

crime, hackers.

Bloombecker,

Key Words:

crime, general.

J.J.

'Trends in Computer Abuse/Misuse," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 611-614.

BOL-86a

crime, laws.

Browne. M.W. "Locking Out The Hackers."

Novonber 1983.

"Computer Related Crime:

The Who, What, Where, When. Why and How, U,"

BLO-89a

Key Words: awareness. hackCTs. crime.

BUI-84 Buikema,

C.

et al.

"Security Regulation:

Bloombecker,

Commitment

J.J.

Key Words:

(Ed.)

crime, general.

1989.

BOR-85

State-

pp. 39-48.

Borking, J.J. Third Party Protection of Software and Firmware,

North-Holland PubUshing Co.

crime,

Amsterdam, 1985.

policy, general.

Key Words: book,

BOL-81

software

White-Collar Crime Causation," Proc. Comp. Sec. & Priv. Symp. 1981 (1: HON-81), pp. 57-67. ,

BOS-82 Bosworth, B., Codes, Ciphers and Computers: An Introduction to

Book

Co., Rochelle Park, NJ,

1982.

guidelines.

Cases

Piracy

in the Courts,"

&

Security

May

,

1984, pp. 123-134.

Information Security , Hayden crime, threats,

crime, laws.

BUM-84

Computers

privacy.

J.

Key Words:

Bump, M. Jr. "A Primer on Software

"The 8 -Factor Theory of

Key Words:

A

by-State Update." Security

Management, January 1984.

to Security ,

National Center for Computer Crime Data, Santa Cruz, CA,

Key Words: book,

pp.

30-40.

J.

Spring 1986. pp. 25-30.

Bologna,

Key Words:

Discover.

Bologna,

Data Processing & Communications Security .

crime, threats,

laws, guidelines.

Criminal Laws Journal . Apml 1983, pp. 68-89.

BRO-83a

Key Words:

BLO-89

Brown, R.A. "Crime and Computers,"

Key Words: awareness,

laws,

software piracy.

BUR-88 Burger, R.

Computer Viruses: A HighTech Disease Abacus. Grand .

Key Words: book,

BOL-81 a Bologna, J. Crime: Wave of the Future Assets Protection Publishing, Madison, WI, 1981.

awareness,

general.

Key Words: computer

,

Key Words: book,

crime.

B0L-81b Bologna,

J.

"MOMM's:

A

BOT-86

viruses,

threats, general.

Bottom, N.R., Jr., et al. "About the Security Degree: Are We Losing It (A Discussion)," Journal of Security Administration , June 1986, pp. 7-20.

BUS-81 "Computer-Crime

- The

Spreading Danga to Business," Business Week, April 20, 1981, pp. 86-91.

Taxonomy of

Computer-Related Employee

Key Words:

general, policy.

Theft," Assets Protection ,

May/June 1981, pp. 33-36. crime, threats.

Key Words: guidelines.

BRE-86 Breton, T., and D. Beneich

Key Words:

Rapids. MI. 1988.

Softwars, Holt, Rinehart,

Winston,

New

York, 1986.

Key Words: book,

1-4

awareness.

crime, threats,

CAM-88

BUS-84

CHO-84

Buss, M.DJ., and

Campbell, D.

L^.

"Computer

Salemo

"Common Sense and Computer Security," Harvard Business Review March,

Destruction," Security

Choney, L.B. "Software Escrow and the Security Practioner," Computer

Management

Security Journal

Sites:

Targets for

July 1988, pp.

.

56-60.

,

Summer

1984, pp. 65-74.

April 1984, pp. 112-121.

Key Words:

Key Words:

guidelines, policy, general.

BUS-88 "Is

threats, physical.

Your Computer Secure?,"

Business Week, August

1,

CAN-86

policy, guidelines.

CJJ-88

Canning, R. "Information Security and Privacy," EDP Analyzer February 1986, pp. 1-16. ,

1988, pp. 64-70.

Key Words: Key Words:

Key Words:

awareness,

awareness,

"Crime

Statutes:

Are They

Bridging the Gap Between Laws and Technology?," Criminal Justice Journal , Fall/Winter 1988, pp. 203-233.

awareness,

Key Words:

general.

crime, laws.

computer crime, policy.

CU-80

CAR-80

BYN-85

"Crime, Part

Carroll, JJ^.

Bynum, T.W.

(Ed.)

Computer

"Ethics for the

"Computers & Ethics," Metaphilosophy October

Age," Proc. Comp. Sec. & Priv. Symp. 1980 (1: HON-

1985.

80), pp. 17-25.

,

Key Words: book,

ethics.

1,"

Computer/Laws Journal Spring ,

1980.

,

Key Words:

Key Words:

crime, ethics.

crime, laws.

CU-80a "Crime, Part 2,"

CAR-81

CAE-89 Caelli,

W.J. (Ed.)

Computer/Laws Journal

JM.

Carroll,

Computer Security

in the

Age

Summer

"Decriminalization of

of Information, Proceedings. IFIP/Sec '88 .

Computer Crime,"

Gold Coast, Queensland,

1981

Australia,

May

Comp.

&

Sec.

(1:

Proc.

Priv.

HON-81), pp. 61-68.

Key Words: Crime,

policy.

Amsterdam/New York, 1989. proceedings,

Gates.

Processing

Calhoun, G. "Deterring Crimes,"

Telephony April ,

4,

A

Review of Data Communications

Security

,

&

Spring 1986, pp. 19-

Key Words:

crime, laws,

crime, laws.

CLY-89

crime, laws.

Techniques,"

Computer

CHA-85 Chamoux,

techniques.

Fall

"Crime Investigation

1983, pp.

Key Words:

Key Words:

,

Clyde, R.

21.

45+.

"Misappropriation of Computer The Need to Enforce

Services:

1983, pp. 401-420.

State Statutes,"

CAL-83

CU-83

Computer/Laws Journal

H.W.

"Crime Laws:

general.

crime, laws.

Civil LiabiUty,"

CAT-86 Key Words:

Key Words:

Symp.

1988, North-

HoUand/Elsevier,

,

1980.

COM-SAC:

Security, Auditing

and Control No. ,

1,

1989, pp.

1-7.

J. P.

"Data Security and

CAM-87Campbell, M.

Confidentiality in Europe,

"Security and Privacy: Issues

of Professional Ethics," Proc. 10th Nad. (5:

Comp.

Computers & Security September 1985. pp. 207-210.

333.

crime, techniques.

COA-83 Coates, J.F.

Sec. Conf.

NCS-87a), 1987, pp. 326-

Key Words:

,

Key Words:

crime, threats,

laws, international.

"The Future of Data Security: Thoughts and Proposals,"

Computer Security Journal

Key Words:

,

Spring 1983, pp. 77-84

awareness,

ethics.

Key Words: general.

1-5

awareness, policy,

CON-84a

COL-82

CON-86a

Colvin. B.D.

S. 1920.

'Training Crime

Computer Crime Act

EDPACS

Investigators,"

March 1982, pp.

Key Words:

,

6-11.

crime, policy,

guidelines.

Computer Fraud and Abuse Act of 1986 Public Laws 99-

Small Business ,

.

Hearings before the Senate Committee on Small Business,

474, U.S. Congress,

March

1986.

1984, U.S.

7.

Congress. Govenunent Printing Office. Washington. DC. 1984.

Washington, DC, October 16,

Key Words: Congress, legislation.

COM-83 Crime Needs

International

Countermeasures: Proceedings of London Conference , June 1983, Elsevier International Bulletins, Oxford, England, 1983.

Key Words: Congress,

CON-87 Computer Secigity Act of

legislation.

1987 Hearings Before Subcommittee on ,

CON-84b The

Counterfeit Access Device and Computer Security Act of 1984 P.L. 98-473).

proceedings,

Key Words: Congress, legislation.

DC,

U.S. Congress. 1984.

techniques, international, policy.

Materials of the Committee on

Science and Technology, House of Representatives, U.S. Congresss, Government Printing Office, Washington,

.

Key Words:

Transportation, Aviation and

1987.

CON-80 CON-85

The Government Classification of Private

Ideas

,

House Report No. 96-

Key Words: Congress,

Federal Government Computer Security

,

legislation.

Hearings before

CON-87a

Subcommittee on

1540. U.S. Congress, Washington, DC, December

Transportation, Aviation and

Computer Security Act of

22, 1980.

Materials of the Committee

Key Words: Congress,

on Science and Technology, House of Representatives,

1987 Hearings before Subcommittee on Legislation and National Security of the Committee on Govenunent

policy,

May

government.

1985, U.S. Congresss,

Government

CON-83

Printing Office,

Washington, DC, 1985.

Computer Security in the Federal Government and the Private Sector

,

Hearings

,

Operations,

House of

Representatives, U.S.

Congresss, Government

Key Words: Congress,

Printing Office, Washington,

government, policy,

DC, 1987.

threats.

before Subcommittee on

Oversight of Government Management, Senate Committe on Government Operations, U.S. Congesss,

Government

Printing Office,

Washington, DC, 1983.

Key Words:

Congress, threats, laws, government.

CON-84 Computer and Communications Security and Privacy

,

CON-85a

Key Words:

Computer Security Research and Training Act of 1985 Hearings before Subcommittee on Legislation and National Security of the Committee on Government Operations, House of Representatives, U.S. Congress, Govenmient

Congress,

legislation.

,

CON-87b Computer Security Act of 1987 Part

,

Report No. 100-153,

1,

of the Committee on

Science, Space and

Printing Office, Washington,

Technology, House of Representatives, U.S.

DC, 1985.

Congresss, Government Printing Office, Washington,

Key Words:

Congress, poUcy.

DC, June

11, 1987.

Hearings,

Subcommittee on Transportation, Aviation and Materials,

Committee on

Science and Technology, House of Representatives,

Government

Printing Office,

Washington, DC, 1984.

CON-86

,

the Judiciary, U.S. Congress,

Gocemment

legislation.

Printing Office,

Washington, DC, September 3,

Key Words:

Key Words: Congress,

Computer Fraud and Abuse Act of 1986: Report on S.2201 Senate Committee on

1986.

Congress,

Key Words: Congress, legislation.

1-6

legislation.

COT-84

CON-87C

CSC-88 and B.D. Weiss

Computer Security Act of 1987 Report No. 100-153, Part 2, of the Committee on

Cottrell, P.,

Govemmait

of Computer Error,"

.

House of

Operations,

Representatives,

U.S. Congresss, Government

'Third-Party Liability

.

Insurance: Protection in Case

Computerworld, April 1984, pp. ID1-ID7.

October 1988.

2,

Key Words:

Printing Office, Washington,

DC, June

Key Words:

11, 1987.

Key Words:

Courtney, R.H.,

CSI-83 "Making the Case

Jr.

'The Democratization of White Collar Crime,"

CON-89

guidelines,

government.

policy, laws.

COU-81

Congress,

legislatioiL

Glossary of Computer Security Terms NCSC-TG-004. National Computer Security Center. Ft. Meade, MD, 21

for

Computer Security." Special Section by Computer Security

Implementation of the

Computer Security Journal

Computer Security Act,

Spring 1981, pp. 39-44.

Datamation September 1983.

Subcommittee on

Key Words:

Key Words:

Transportation, Aviation and

awareness.

Institute,

,

.

Hearings before crime, laws,

awareness,

general, poHcy, guidelines.

Materials of the Committee

on Science and Technology, House of Representatives on September 22, 1988, U.S. Congresss, Government

COU-84 Courmey, R.H., Jr. "Computer Security Goals of the

DoD-Another Opinion,"

Printing Office, Washington,

Computer Security

DC, 1989.

Summer

Key Words:

Congress, policy,

Journal,

.

1984, pp. 60-62.

Key Words:

1984.

Key Words:

policy,

government

laws.

COO-84

Courtney,

CSI-85 "Computer Security: Issues and Answers," Special Section by

R.J., Jr.

"Computer Security: The

Menace Office .

is

awareness,

general, poUcy, guidelines.

COU-84a

Cooper, C. "The Real Cost of Software Piracy," Information Age (UK), April 1984, pp. 98-

CSI-84 "Computer Security: Issues and Answers," Special Section by Computer Security Institute. Datamation September 1,

Human

Error,"

March 1984,

The

pp. 119.

Computer Security

Institute.

Datamation September .

15,

1985.

102.

Key Words: Key Words:

threats, policy.

Key Words:

software piracy.

COU-87

COO-89 Cook, WJ. "Access to the Access Codes '88-'89:

A

Prosecutor's

National

Comp. Sec.Conf.

Courmey, R.H., Jr. "Computer Data Security: A Leadership Vacuum," Computer Security Journal ,

Prospective," Proc. 12th (5:

Responsibilities." Special

Section by Computer Security

16.

Institute, 1.

Key Words: hacking, policy,

CSI-86 "Computer Security: Issues and

Vol. IV, No. 2, 1987, pp. 7-

NCS-89), 1989, pp. 619-623.

Key Words:

awareness,

general, policy, guidelines.

Datamation October .

1986.

awareness,

Key Words:

policy.

laws.

awareness,

general, policy, guidelines.

COU-89a

COR-87

Courtney, R.H.

ResponsibiUty for Data

Crime Heinemann

Management March 1989,

Professional Publishing,

83-86.

,

CSI-89 "Computer Security: Issues and Trends." Special Section by

Jr.

"Proper Assignment of

Cornwall, H. Computer Fraud, Industrial Espionage, & Information

Computer Security

Security," Security ,

pp.

Institute.

Datamation September .

15,

1989.

London, 1987.

Key Words: Key Words: book,

crime.

policy,

Key Words:

awareness,

general, poHcy, guidelines.

guidelines.

1-7

CWO-83

DEM-83

"Crime in Japan," Computerworld, November

7,

End

1983, pp. ID/7-20.

Key Words:

DEN-89

DeMaio. H.B. "Computer Security and

User," Proc. IFEP/Sec.

J3, Stockholm, 1983, FAK-83), pp.

crime,

Denning, PJ. the

(2:

1-4.

"The Internet Worm," American Scientist. March/April 1989, pp. 126128.

international.

Key Words:

CWO-84

awareness,

policy.

Key Words: threats, hackers, computer viruses.

"Protecting the Corporate

Information Resource: Special

DEM-88

DER-88

Report," Computerworld,

DeMaio, H.B.

October 29, 1984, pp. SR/1-

"Iriformation Ethics

32.

Doesn't

Come

Vol. V, No.

policy,

guidelines.

It

Naturally,"

Computer Security

Key Words:

Derosier,

~

1,

Journal.

1988. pp. 7-

J.

"Computer Security Proc.

MP/Sec.

at Digital,"

'88 . Australia.

1989. (2: CAE-89). pp. 163165.

19.

Key Words:

CWO-85

Key Words:

awareness, ethics.

awareness,

general.

"System Security: Protecting

DEM-89

Corporate Information Assets,"

Computerworld

November

DEW-84

DeMaio, H.B.

,

25, 1985, p. 55ff.

"Viruses

A

-

Management

Computers & Security. August 1989. pp. 381-388.

Threats to Computer

Key Words: computer

American June 1984, pp. 14-

Issue,"

Key Words:

policy,

Viruses,

Worms, and Other

Memories," Scientific

guidelines.

DAV-85

viruses,

policy.

Davis, G.F.G.

.

23.

ffl

Software Protection: Practical and Legal Steps to Protect and Market Computer Programs Van Nostrand Reinhold, New York, 1985. ,

DEM-89a

Key Words: book,

software

Key Words: computer

DeMaio, HJ8. "Information Ethics, 12th Natl.

Comp.

A

Sec. Conf.

NCS-89), 1989, pp. 630-

633.

piracy, general, laws.

Key Words: DEA-83

Security Bibliographies

Wheaton,

,

MD,

GPD

Dewdriey. A.K. "Of Worms, Viruses and Core Wars," Scientific American. March 1989, pp. 110-113.

Key Words: computer

"Data Security, Special Issue," Data Management, July 1983.

Denning, D.E.,

Neumann, and

February 1983.

D.B. Parker "Social Aspects of Computer

Key Words:

Key Words:

Security," Proc. 10th Natl.

guidelines, techniques.

awareness,

Comp.

general.

Sec. Conf. (5:

DEL-88 Haskins & Sells, October 1988.

,

Deloitte,

New

York,

Key Words:

general,

NCS-

87a), 1987, pp. 320-325.

Computer Viruses

viruses.

DMA-83

DEN-87 P.G.

DEW-89

awareness, ethics,

policy.

DeAnnuntis, G. A Bibliography of Computer

viruses,

general.

Practical Approach," Proc.

(5:

Press,

Dewdney. A.K. "A Core War Bestiary of

awareness,

general.

DOJ-80 Crime: Legislative Resource Manual Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, 1980. ,

DEN-88 Key Words: book, computer

Denning,

viruses, guidelines,

"Computer Viruses," American Scientist, May/June 1988, pp.

techniques.

Key Words:

P.J.

236-238.

Key Words: computer guidelines.

1-8

viruses,

crime,

government, guidelines, laws.

ERM-89

ELM-88

DOJ-80a Crime: Expert Witness Manual Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, ,

Ebner-DeWitt, P. "Invasion of the Data Snatchers," Time September ,

28, 1988, pp. 62-67.

Erman, M.D., M.B. Williams, and C. Gutierrez Computer Ethics and Society Oxford University Press, New ,

York, 1989.

1980.

Key Words: Key Words:

hackers, threats.

Key Words:

crime,

guidelines, government, laws.

EWI-88

Eloff, J.H.P.

DOJ-82 Crime: Electronic Funds Transfer Systems and Crime U.S. Department of Justice, Bureau of Justice Statistics, Washington, DC, 1982.

"Computer Security Policy: Important Issues," Computers ,

&

Security

December 1988,

,

pp. 559-562.

Key Words:

Ewing, D. "Meeting Data Security Needs," Proc. IFIP/Sec. '88 AustraUa, 1989, pp. 291-302.

(2:

Key Words:

awareness,

f)olicy.

crime,

government, laws, guidelines.

EMM-84

FAK-88

Emmet, A.

DOJ-82a Crime: Computer Security Techniques U.S. Department of Justice, Bureau of Justice Statistics, Washington, DC, ,

Fak, V.

'Thwarting the Data Thief," Personal Computing January 1984, pp. 98-105. ,

"Are

We

Vulnerable

Attack," Computers

to

&

Security, April 1988, pp. 151-

hackers, threats.

Key Words: computer EPN-85 crime, laws,

EIS-89

Epner, S.A.

,

Eisenberg, T., et

al.

"The Cornell Commission: On Morris and the Worm," Communications of the ACM June 1989, pp. 706-

viruses,

threats.

"Computer Security: Plenty of Questions But No Easy Answers," The Office March 1985, pp. 74-76.

techniques.

Virus

155.

Key Words:

1982.

Key Words:

,

CAE-89),

awareness,

policy.

Key Words:

ethics, policy.

ELO-88

FAU-81 Faurer, L.D.

"Keeping the Secrets Secret,"

Govenunent Data Systems

,

Nov./Dec. 1981. pp. 14-17.

Key Words: awareness, Key Words: awareness,

policy.

policy,

government, guidelines.

.

EPP-80

709.

FAU-83

Epperly, E.V.

Key Words:

hackers, laws,

computer viruses.

"Trends in DoD Directives: Survey of Federal Computer Proceedings, U.S.

"Information Protection in Federal and Private Sectors,"

Security Policies,"

EKE-85

Faurer, L.D.

Army 3d

Computer Security Journal

,

Fall/Winter 1983, pp. 89-95.

"Security of Electronic

Automation Security Conference Williamsburg,

Transactions," Proc. IFIP/Sec.

VA, December

Key Words:

Ekebrink,

I.

J5, Dublin, 1985,

(2:

,

GRI-

1980,

International Business

85). pp. 233-239.

Services, Inc., pp. 31-44.

Key Words:

Key Words:

general, threats,

FAU-84 policy,

Faurer, L.D.

"Computer Security Goals of Department of Defense," Computer Security Journal

government.

guidelines.

policy,

government.

the

ELB-89

ERI-83

El-Haghdadi, M., and M.P. Singh "The Pivotal Role of

Computer Security," Security Management, July 1989, pp.

,

Summer

Eriksson, A. "Vulnerability in a

Computerized Society," Proc. IFIP/Sec. '83 Stockhohn, 1983, (2: FAK-83), pp. 27-30. ,

63.

Key Words: awareness,

Key Words:

awareness,

1984, pp. 54-59.

threats.

general.

1-9

Key Words: government.

policy,

GEM-80

FOR-89

FEN-88 Fennelly, L.J.

Forcht, K.A.

Handbook of Loss Prevention and Crime Prevention

"Ethical

Gemigniani, M. "Crime: Laws in the '80," Indiana Laws Review. April 1980, pp. 681-723.

Use of Computers,"

Butterworlh Publishers, Stoneham, MA, 1988.

Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 624-626.

Key Words:

Key Words:

Key Words: general,

crime, laws.

awareness, ethics.

GEM-81

guidelines, techniques.

FRE-84 Freed, R.N.

Gemignani, M.C. Laws and the Computer CBI

Fifield, K.J.

"Security Interests in the

Publishing, Boston, 1981.

"Smartcards Outsmart

Computer Age:

Computer Crime," Computers

Advice

FIF-89

&

Security

May

,

1989, pp.

247-255.

,

Practical

Key Words:

Secured Lender," Banking Laws

Journal

to the

July/Aug. 1984, pp.

,

GEM-89 Gemignani, M. "Viruses and Criminal Laws," Communications of the ACM, June 1988, pp. 669-671.

404-429.

Key Words:

crime,

Key Words:

techniques.

crime, laws.

awareness,

guidelines.

Fn'-84

"Crime

Freese,

in Australia,"

EDPACS

,

Key Words: computer

FRE-84a

Fitzgerald, K.J.

August 1984, pp.

"What About Your Legal When Your Data

GLR-83

1-7.

Parachute

Key Words:

Security Crashes?," Proc. inP/Sec. '84 Toronto, 1984,

crime, general,

international.

FIN-85), pp. 23-28.

Key Words:

Frr-86

"Larceny Enters the Electronic Age: The Problem of Detecting and Preventing Crimes," Gonzaga Laws Review 1982/83, pp. 517-538.

,

(2:

viruses,

threats, laws.

J.

awareness, laws.

,

Fitzgerald, K.J.

Automated Computer Control

"Security in the Office,"

Quarterly

,

Summer

1986, pp.

21-24.

Key Words:

Key Words:

FUL-84 "Computer Abuse: The Emerging Crime and Need for Legislation," Fordham Urban

Laws Journal 73-101.

policy,

,

GOL-81

Goldstein, B. Pocket Guide to Computer Crime Investigation Assets Protection Publishing, Madison,

A

1983/84, pp.

,

WI, 1981.

guidelines.

Key Words:

crime, laws.

Key Words:

FIT-89 Fites, P., P.

Johnson and

M. Kratz The Computer Virus

Co.,

York, 1989

Remain Highly Vulnerable

Goldstein, B.

Fraudulent, Wasteful, Abusive

and threats,

GOL-83

to

Illegal Practices ,

"Crime and Its Prevention," Computers & Security January

MSAD-

82-50, U.S. General

Key Words: book, computer viruses.

crime, laws.

GAO-82 Federal Information Systems

Crisis ,

Van Nostrand Reinhold

New

crime, laws.

,

-

1983, pp. 63-66.

Accounting Office, Washington, DC, 21 April

Key Words:

1982.

guidelines, policy.

crime, laws,

FOR-82 Fordyce, S.

"Computer Security:

A

Key Words:

crime, threats,

government, general.

Gonzales, P. "Addressing Crime

Current Assessment,"

Computers

&

Security ,

GON-83

GAR-89

Legislation,"

January 1982, pp. 9-16.

Gardner, P.E.

Journal

195-206.

Key Words: awareness,

"The Internet Worm: What Was Said and When," Computers & Security June

general.

,

1989, pp. 291-296.

Key Words: computer

1-10

viruses.

,

Computer/Laws

Summer

Key Words:

1983, pp.

crime, laws.

GUY-81

GOS-85

HAR-83

Gosler, J.R.

Guynes,

"Software Protection: Myth or Reality," Proc. Crypto '85

"Software Security: Legal Aspects and Traditional Considerations," Journal of

Santa Barbara, 1985,

.

(9:

WIL-86), pp. 140-157.

Key Words:

Hartson, D.R.

S.

Systems Management, April

'Teaching Protection in Computing: A ResearchOriented Graduate Course," Computers & Security

1981, pp. 34-38.

November

Key Words:

Key Words:

,

1983, pp. 248-255.

software piracy.

awarenss, laws.

GOU-85

awareness,

general.

Goussy, A.R. "Legal Issues in Proprietary Secxirity," Journal of Security Administ. . December 1985,

GUY-83 Guynes. V. "EFTS Impact on Computer Security," Computers & Security , January 1983, pp. 73-77.

pp. 23-29.

Key Words:

GRA-84

awareness,

"Education and Training of

Computer Security Staff: Methodology and Course Stockholm, 1983, pp. 287-292.

policy.

Graham, R.L. 'The Legal Protection of Computer Software," Communications of the ,

Harari, A.

Topics," Proc. IFIP/Sec. '83

policy, laws.

Key Words:

ACM May

HAR-83a

HAF-88

Key Words:

Hafner, K.M., et "Is

1984. pp. 422-

awareness,

Your Computer Secure,"

Business Week, August

1,

HAR-85 Harry,

M.

The Computer Undeground

Key Words:

software piracy.

Key Words:

HAM-84

Greenlee, M.B. "Financial (Banking)

Computer Seminar, Progr. (5:

View of

Security," Proc. 5th

DoD Comp.

Sec

.

DOD-82), 1982,

Key Words: book,

Hammond, R.G. "Theft of Information,"

Laws Quarterly Review

The ,

April

1984. pp. 252-264.

HEL-88 Helfant, R., and

McLoughlin Computer Viruses: Technical Overview and Policy

G.J.

Key Words: Key Words: awareness,

crime, laws,

threats.

Considerations

policy.

HAN-89 GRE-84 Greguras, P.M.

'Technical and Other Practical Software Protection

Measures," TeleSystems Journal, March/April 1984, pp. 28-32. policy,

,

CRS

Report

to

No. 88-556 SPR, Congressional Research Service, Washington, DC, the Congress,

Hankinson, A.L. "Computer Assurance: Security, Safety and Economics," Proc. COMPASS '89: Comp. Assurance (2: IEE-89), 1989, pp. 1-7.

Key Words:

general,

December

15, 1988.

Key Words: computer

viruses,

policy.

HEL-89 Helsing,

guidelines.

C, M. Swanson, and

M.A. Todd

techniques.

HAR-82 GRE-84a

Harris, B.

Greguras, P.M.

"Software Protection: Beyond

"Data Security: Plan for the Worst," Infosystems , June

Copyright," Computerworld,

1982, pp. 52-58.

Dec. 12, 1983, pp. ID25ID32.

Key Words:

Executive Guide to the Protection of Information Resources , SP 500-169, National Institute of Standards

and Technology, Gaithersburg, October 1989.

MD,

awareness,

general, policy.

Key Words:

hackers,

threats.

pp. 167-176.

Key Words:

,

Loompanics Unlimited, Port Townsend, WA, 1985.

awareness,

general.

GRE-82

.

FAK-83),

general.

al.

1988, pp. 64-72.

426.

(2:

Key Words: government.

software piracy.

1-11

guidelines, policy,

HHS-83

HEL-89a

C, M. Swanson, and M.A. Todd Management Guide to the

Computer Related Fraud and Abuse in Government

Protection of Information

Helsing,

Agencies Office of the .

Resources SP 500-170,

Inspector General, U.S. Dept. of Health and Human

National Institute of

Services, Washington,

Standards and Technology,

1983.

.

MD,

Gaithersburg,

October

1989.

Key Words:

crime,

Helsing,

C, M. Swanson, Todd

government,

threats.

Computer User's Guide

Holman. W.D. "Remedies Available

"Information Security as a

Victims of Crimes," Proc.

Resources SP 500-171, National Institute of Standards and Technology, Gaithersburg, MD, October

89), 1989, pp. 553-557.

,

Sec. Conf. (5:

NCS-

awareness,

guidelines.

Highland, H.J.

guidelines,

"What

techniques.

Key Words:

crime, jwlicy.

Computer Security and Privacy Symposium Proceedings Honeywell Information Systems, Phoenix, AZ, April 1980.

EDPACS

.

July 1989,

pp. 11-17.

Key Words:

proceedings,

general.

and

R. Paans

Key Words: computer

"The Programmer's Threat Cases and Causes," Proc.

threats.

viruses,

HON-81 Computer Security and Privacy

Symposium Proceedings,

'84 , Toronto, 1984,

FIN-85), pp. 409-422.

Key Words:

.

Computer Virus

If a

Strikes,"

HER-84

(2:

& Priv. Symp. HON-80), pp. 77-86.

Sec.

(1:

.

HIG-89a

MP/Sec.

1980

HON-80

Key Words:

1989.

I.S.,

Comp.

HJL-84

Honeywell Information

"Legislative Issues in Crime,"

Harvard Journal on Legislation Winter 1984, pp.

threats, crime.

Systems, Phoenix, AZ, April 1981

,

Key Words:

239-254.

HER-87

proceedings,

general.

Key Words:

Herschberg, I.S. "Hackers' Comfort,"

Computers

&

Security

,

crime, legislation.

HOR-85

HOF-82

April

Horgan, J. "Thwarting the Information

1987, pp. 133-138.

Hoffman,

"Impacts of Information

Thieves,"

Key Words:

crime, hackers.

System Vulnerabilities on Society," Proceedings, 1982 National Computer

1985, pp. 30-41.

I.S.

Conference AFIPS Press, Reston, VA, 1982, pp. 461-

HER-88 Herschberg,

"Make

to

Scientists," Proc. 12th Natl.

to

Comp.

Herschberg,

awareness, threats,

Higgins, J.C.

the Protection of Information

Key Words:

.

September 1986, pp. 211-217.

HOL-80

Topic for Undergraduate Education for ComputCT

MA.

"Societal Vulnerability to

Computer System Failures," Computers & Security

vulnerabiUties

HIG-89

HEL-89b

Hoffman, K.J., and L.M. Moran

Key Words:

Key Words: guidelines,

policy.

and

DC,

HOF-86

the Tigers

You," Computers

L.J.

,

Hunt

&

for

Security

,

467.

Key Words: crime, hackers.

Key Words:

.

July

crime, threats,

laws.

HOW-82 Howe, C.L.

April 1988, pp. 197-203.

Key Words:

IEEE Spectrum

awareness,

"Coping with Computer Criminals," Datamation

threats.

,

January 1982, pp. 118-126.

Key Words: guidelines.

1-12

crime, laws,

IRM-84

HUB-86 Huband,

F.L.,

and

Data

R.D. Shelton

Computer

Protection of

JON-88

"Information Security and

Systems and Software Laws & Business, Inc., Clifton, NJ, ,

Jones, L.G.

Integrity. Special Issue,"

Media Hype?," The EDP

Management (UK), March

Auditor Journal Vol.

,

3,

Key Words: computer Key Words:

Key Words:

book, general,

awareness,

KAN-89 Israel,

Kane, P. H.

V.I.R.U.S.: Vital Information

Hunt, D.B., and

"Computer Viruses: Myth or

F.G. Tompkins

Reality?, Proc. 10th Natl.

"Protecting Sensitive Systems and Data in an Open Agency," AIAA 97-3092, Proc. 3d Aerospace Comp.

Comp.

Sec. Conf. (5: IEE-87b),

threats, awareness, guidelines.

Sec. Conf. (5:

NCS-

viruses,

Interest in

the Private Sector," Proc.

IBM-83

Seminar,

Report on the Data Security Leaders' Conference San ,

April 1982,

IBM

NY,

1983.

DoD Comp.

Progr. (5:

2nd

proceedings,

pp. El-ElO.

&

Security

,

May

1984, pp. 117-122.

Key Words:

awareness, threats,

guidelines, techniques.

Key Words:

awareness,

KAY-86 Kay, R. "Computer Security

JAS-83

general, guidelines,

Jaslow,

techniques.

"How

M.D.

Information Sources," Computer Security Journal Vol. 4, No. 1, 1986, pp. 29,

to Fight

Fraud,"

IBM-86

Computers

Sec.

DOD-80a), 1980,

policy.

Key Words:

I.

"Industrial Espionage,"

"Computer Security

Plains,

virus, threats,

awareness, guidelines.

Kaperonis,

Jacks, E.L.

policy,

White

1989.

KAP-84

guidelines.

CA,

,

Key Words:

Key Words: computer

JAC-80

Corp.,

Resources Under Siege Bantam Books, New York,

87a), 1987, pp. 226-230.

1987, pp. 158ff.

Key Words:

viruses,

general.

ISR-87

HUN-87

1988.

awareness, threats.

policy, guidelines, techniques.

Computer

EDPACS

,

July 1983,

40.

pp. 6-9.

Key Words:

Security, Auditability,

Systems Control Publications Bibliography G320-9279-1, ,

IBM

,

or

1984.

1986.

Jose,

"Computer Viruses: Threat

Information Resource

Key Words:

crime, poUcy,

guidelines.

KAY-86a

Corp., White Plains,

NY. May

JOH-85

1986.

Kay, R. (Ed.) "Data Security Scoreboard,"

Johnson, D.G.

Key Words: awareness,

Computer Ethics PrenticeHall, Englewood Chffs, NJ,

Computer Security Journal Vol. 4, No. 1, 1986, pp. 41-

1985

54.

,

general.

awareness,

general.

,

ING-80

Key Words:

Ingraham, D.G. "On Charging Crime,"

Computer/Laws Journal

awareness, ethics.

Key Words:

awareness,

general. ,

KEL-88

Spring 1980, pp. 429-456.

D.W. "A Guide to Cost-Effective PC

Kelley,

Key Words:

crime, laws,

Security," Security

guidelines.

Management October 1988, ,

pp. 55-58.

Key Words: PC.

1-13

guidelines, policy,

KRA-88a

KEN-85 Kenny, J.J.P. Data Privacy and Security

Pergamon

Kratz, ,

Infotech, Oxford,

KUR-82 M.

"Industrial

Kurzban. S.A.

Theft of Information," Proc. IFIP/Sec. '88

1985.

.

Australia, 1989,

CAE-89), pp. 279-289.

(2:

Key Words: book,

"A

Espionage and

general,

policy, guidelines, techniques.

Selective. Slightly

Armotated Bibliogr^hy on Works on Data Security and Privacy." Computers & Security January 1982, pp. 57.

Key Words:

crime, threats,

64.

laws.

Key Words:

KIR-81 Kirchner,

KRI-80

J.

"Vulnerability:

Confront

WiU

the U.S.

Flaws?," Computerworld

December

Krieger,

M.M.

KUR-86

"Current and Proposed

Systems'

Its

,

28, 1981, pp. 36-

32.

awareness,

general.

Computer Crime Legislation," Computer/Law Journal

Kurzban, S.A.

Summer

Not So Appealing After All," Computers & Society Winter

,

1980, pp. 721-771.

"Careers in Computer Misuse

-

-

,

Key Words:

vulnerabilities,

awareness, threats.

Key Words:

crime, threats,

1986, pp. 7-9.

laws.

Key Words:

KRU-86

KIR-83 Kirby,

M.D.

Krull, A.

"Computer Crime and Law Reform in Australia," Information

general, crime,

threats.

Age (UK),

'Ten Losing Strategies for Data Security," Computer Security Joumal Vol. 4, No. ,

October 1983. pp. 241-247.

1,

Key Words:

Key Words:

crime, laws,

LAN-85 Landreth, B. (with H. Rheingold)

Out of

1986, pp. 21-28.

the Inner Circle . Microsoft Press, Bellevue,

WA.

awareness,

1985

general, policy, guidelines.

policy, international.

Key Words: book,

KUO-87

KLI-80 Kling, R.

"Computer Abuse and Computer Crime as Organizational Activities,"

Computer/Law Journal

,

Spring 1980, pp. 403-427.

hackers,

general. vulnerabiUties.

Kuong, J.F. "Computer Disasters and Corporate Amnesia and Corporate Paralysis," CPR-J: Contingency Planning & Recovery Joumal No. 4, ,

LAS-81 Lasden,

M.

"Computer Crime," Computer Decisions

,

June 1981, pp. 104-

124.

1987, pp. 1-4.

Key Words:

Key Words:

crime, threats,

Key Words: Awareness,

policy.

awareness, crime,

threats, general.

threats, vulnerabilities, policy.

KNA-83 Knapp,

LAU-88

KUO-88

T.J.

Laureson, A.

Upper Management," Data

Kuong, J.F. "Computer Viruses ~ Are

Management

They

"Selling Data Security to

,

July 1983, pp.

a Threat to Business

22-25.

Continuity?," CPR-J:

Key Words:

Contingency Planning Recovery Joumal No

policy,

KRA-88 Kratz,

.

53-55.

& 2,

1988,

pp. 5-7.

guidelines.

Key Words:

guidelines,

PC,

policy.

Key Words:

M.

"Keeping Your PCs Where They Belong." Security Management, July. 1988, pp.

viruses, threats,

awareness, policy.

LEE-86 Lee, J.A.N., G. Segal, and

"Computer Crime Legislation in Canada" Proc. IFIP/Sec.

R. Steier

'88 . Austraha, 1989, (2:

Report on an Panel on Hacking," Communications of

"Positive Altematives:

ACM

CAE-89). pp. 101-118.

the

Key Words:

ACM

,

AprU 1986,

A pp.

297-299.

crime,

international, legislation.

Key Words: policy.

1-14

hackers, general,

MAR-88

LOU-84

LEH-82 Lehman, R.L.

Louwerse, CP., and

'Tracking Potential Security Violations," Security Audit

J.M.L. Kouwenberg* "Data Protection Aspects in an Integrated Hospital Information System,"

&

Control Review Winter 1981/82. pp. 26-39. ,

Key Words:

policy,

Computers

&

November

1984, pp. 286-294.

Security

Marx, P. "The Legal Risks of Using Information as a Competetive Weapon," Software Law Journal

Key Words:

guidelines.

Key Words: LOB-81

general,

awareness,

general, policy, laws.

guidelines, policy, techniques.

Lobel

MAX-85

J.

"The Foreign Corrupt Practices Act Applied

LYN-83 to

Maxfield,

Lyndon, K.

Information Systems," Proc.

"A New

Comp.

-

&

Sec.

Priv.

Symposiimi, Phoenix, AZ, 1981 (1: HON-81). pp. 69-

Policy in Protection

-

Computer Crime Insured,"

Security World, January 1983,

J.F.

"Computer Bulletin Boards and the Hacker Problem,"

EDPACS

October 1985, pp.

,

1-11.

pp. 38-40.

Key Words:

78.

Key Words:

Key Words:

Lobel

MAY-85

MAD-88

LOB -83 J.

Mayo, K.

Madsen, C. "The World Meganetwork and

Pirates,"

Terrorism," Proc. IFIP/Sec.

Systems February 1985, pp.

'The State-of-the-Art In

'88

Computer Security," Computers & Security

89), pp. 343-349.

November

,

Australia, 1989, (2:

CAE-

Key Words:

MAN-84 Mantle, R.A.

LOB -86

'Trade Secret and Copyright

Computer

Protection of

J.

"Impact of Technology on

Software," Computer/Law

Computer

Journal, Spring 1984, pp. 669-

Security,"

Information Age, (U.K.) April 1986, pp. 77-80.

M. Shain

&

Computer

Security:

Dictionary of Standards and

Terms Stockton ,

Press,

viruses,

McAfee, ID. "Managing the Virus Threat,"

Marbach, W.D., et al. "Beware: Hackers at Play,"

Newsweek

Computerworld, February

13,

1989, pp. 89-96.

Sept. 5, 1983, p.

,

Key Words:

5-1-.

Key Words: awareness, hackers, crime, threats.

viruses, threats.

MCI-81 Mclsaac, D. "Introduction to Computers:

book, guidelines,

laws, general, policy.

York, 1989.

New

York, 1987

Key Words:

New

MCA-89a

MAR-83 Longley, D., and

,

Press,

software piracy,

techniques.

LON-87

Data Diddlers, Killer Programs, and Other Threats to Your System St. Martin's

threats, vulnerabilities.

laws.

general,

MCA-89

Key Words: book,

694.

Key Words:

Key Words:

software piracy.

McAfee, J., and C. Haynes Computer Viruses, Worms,

awareness,

techniques.

Lobel

,

60-65.

awareness,

policy, threats, intemational.

Key Words:

"Business Battles In-House Business Computer

Key Words:

,

1983, pp. 218-222.

hackers, threats.

general, policy.

legislation,

policy.

Data

Spring 1988, pp. 185-

,

201.

,

MAR-84

Security Problems and

Martin, W.P. "Arresting Interface

Considerations," Assets

Computer Crime,"

Age

,

(U.K.)

Protection

,

November/December 1981,

February 1984, pp. 71-75

13-22.

Key Words:

Key Words:

crime, laws,

threats, guidelines.

1-15

awareness,

general, threats, policy.

pp.

MOU-82

MCL-88

NEU-86

W.

McLeod. K.

Moulton, R.T.

Neugent,

"Computer

"A

"Preposterous Opinions About

Insecurity,"

Age

Information

,

(U.K.),

April 1988. pp. 89-93.

Key Words:

Strategy for Dealing with

Computer Fraud and Abuse," Computer Security Journal,

Computer

Winter 1982, pp. 31-40.

Summer

Audit

&

Security," Security,

Control Review, 1986, pp. 1-8.

awareness,

general, crime, threats.

Key Words:

Key Words:

crime, threats,

policy, guidelines.

awareness,

general.

MIL-85 MiUard, C.J. Legal Protection of Computer Programs and Data, Carswell Co., Ltd, Toronto. 1985.

MUR-86

NOR-83

"Aspects of Hacker Crime:

Norman, A.R.D. Computer Insecurity Chajwnan

High-Technology Tomfoolery

and Hall, London. 1983.

Murphy,

I.

or Theft?," Information

Key Words:

software piracy,

Age

.

,

(U.K.) April 1986, pp. 69-73.

Key Words: MIS-85

awareness,

crime, policy,

NOR-84

laws, hackers, threats.

Miskiewicz.

"DP

Key Words: book, general, threats.

laws.

J.

Security:

A

Delicate

Balance," Computer

Decisions

,

April 23, 1985,

pp. 104ff.

Norman, A. "Crime by Computer,"

MUR-86a Murray, W.H. "Security Concepts and the New Computer Economics,"

Computer Security Journal Vol. 4, No. 1, 1986, pp. 7-14.

Information Resources

Management (UK) March .

1984, pp. 18-21.

,

Key Words:

awareness,

Key Words:

crime, threats,

general, policy.

general, policy.

Key Words:

general, poUcy.

NYE-81

MOS-88 Mosaccio,

MYE-83

J.

"Computer

the Threat," Security

Myers, J. "Fraud and Computers."

Management

Law

Sites:

Assessing

July 1988, pp.

,

40-51.

Key Words:

vulnerabilities,

New

January 21, 1983, pp. 71-72. Journal

Key Words:

,

crime, threats,

Nye, J.M. "A Primer on Security, Part " Mini-Micro Systems June 1, ,

1981, pp. 139-148.

Key Words:

awareness,

general.

laws.

threats, general.

NYE-81a

MOU-81

NAF-80

Moulton, R.T. "System Security Standards,"

Computer Security

Journal.

Spring 1981, pp. 73-82.

Key Words:

Naftalis, G.P.

White Collar Crimes American Law Institute and American Bar Association, Philadelphia, PA, 1980. .

.

1981, pp. 166-174.

Key Words:

awareness,

general.

general,

Key Words:

guidelines.

Nye. J.M. "A Primer on Security. Part 2. " Mini-Micro Systems July

book, crime,

OLI-85

general.

M0U-81a

OUver. C.R.

Moulton, R.T.

Than Government Data

"Prevention: Better Protection,"

NBS-80 Guidelines for Security of Computer Applications FTPS ,

Systems Nov ./Dec. 1981, pp.

PUB

20-23.

Standards, Gaithersburg,

,

73, National

Bureau of

MD,

June 1980.

Key Words:

Security Journal

Key Words:

general,

guidelines, techniques, policy.

1-16

,

Winter 1985,

pp. 51-56.

Key Words:

awareness,

general, guidelines, policy.

"A Psychological Approach to Abuse A Case History," Computer Preventing Computer

crime, threats,

laws, guidelines, policy.

OMB-85

PAR-83a

Management of Federal

OMB

RIC-84

Parker, D.B.

Richards, T.C.

"How Much Computer Abuse

"A Computer Fraud

Information Resources Circular No. A- 130, Office of Management and Budget,

Is

There?" Computer Security Journal , Spring 1983. pp. 85-

ACM

Washington, DC, December

89.

1984, pp. 17-23.

,

Security Audit

Control Review

Survey,"

&

Spring-Sum.

,

1985.

Key Words:

Key Words: government,

Key Words: awareness, computer crime, general,

crime, general,

awareness.

threats,

policy.

threats.

PAR-84

OTA-81

RIC-86

Parker, D.B.

Computer-Based National

"A

Information Systems:

Program

Technology and Public Policy Issues Office of Technology Assessm.ent, Washington, DC, September 1981.

Hacking," Computer Security

,

Journal

,

TTieft

Guynes "A Strategic Plan for Reducing Consumer Anxiety About

and System

J.L.

Siunmer 1984, pp.

EFTS

21-32.

Security," Security,

&

Control Review Spring 1986, pp. 4-8.

Audit

Key Words:

Key Words: government,

Richards, R.M., and

Strategy for Preventing

hackers, crime,

,

threats, policy, guidelines.

Key Words:

policy, guidelines, laws.

awareness, policy.

PAR-84a

OTA-86

RIC-86a

Parker, D.B.. and

Nycum

Intellectual Property Rights in

S.H.

an Age of Electronics and

"Computer Crime," Communications of the

Information.

OTA-CIT-302,

R.M. Computer Risks," Computers & Security Richards,

ACM

"Insuring

,

,

U.S. Congress, Office of

April 1984, pp. 313-315.

September 1986, pp. 207-210.

Technology Assessment, Washington, DC, April 1986

Key Words:

Key Words:

crime, threats,

policy, guidelines.

general, awareness, guidelines.

Key Words: government,

RIC-86b

PER-84

policy, legislation.

Richards, T.C.

"A Historical Perspective of Computer Related Fraud,"

Perry, T.. and P. Wallich

"Can Computer Crime Be Stopped?," IEEE Spectrum

PAR-80 Parker, D.B.

"Computer Abuse Research Update," Computer/Law Journal

329-352.

Security, Audit

,

&

Control

Review Summer 1986, pp. 15-

1984, pp. 34-49.

,

25.

Key Words:

Spring 1980, pp.

,

May

crime, policy,

Key Words:

laws.

crime, threats,

awareness, general.

Key Words:

crime, threats,

PAR-81 Parker, D.B. Ethical Conflicts in

Computer

Science and Technology

AFIPS

Press, Reslon,

POD-86

ROB-88

Podell, H.G.. and

policy, awareness, laws.

M.W. Abrams

Roberts, R.

"Computer Security Glossary for the Advanced Practitioner." Computer Security Journal Vol. 4, No.

Computer Viruses Compute! Books, Greensboro, NC, 1988

.

,

VA.

1,

1986. pp. 69-88

,

Key Words: book,

viruses,

threats.

1981.

Key Words:

Key Words:

general, policy,

ROB-88a

guidelines,

Roberts.

general.

MMI

REB-86 PAR-83

Reber,

Parker, D.B.

Fighting

W.

"Remember

ethics.

Computer Crime

Charles Scribner's Sons, York, 1983.

Key Words:

,

New

crime, generd,

policy, guidelines, laws.

J.

to

Lock

the Door:

and the Hacker."

Information Age (U.K.), July 1988, pp. 146-150. ,

"The Essence of Industrial Espionage," Data Processing & Communications Security Winter 1986. pp. 24-25.

,

Key Words:

awareness,

general, threats, laws.

1-17

Key Words:

hackers,

awareness, threats, guidelines.

SCH-84a

ROS-85 Ross. SJ. (Ed.) "Computer Security Issues:

A

Roundtable," Computer Security Journal

,

SEI-84

Scherer, M.E.

Computer Security Journal

Winter

1985. pp. 39-50

Summer

Key Words:

Key Words:

awareness,

policy.

R.A. "Contingency Planning in the

Seif,

"Unsafe Software — The Missing Security Perspective," ,

1984, pp. 43-52.

Banking Community," Computers & Security

Key Words:

awareness,

,

February 1984, pp. 29-34. awareness, policy.

threats.

SER-83

SAM-85

SCH-85

Samociuk, M. "Hacking or the Art of Armchair Espionage," Computer Fraud and Security Bulletin

,

"Industrial Espionage,"

Schweitzer,

Security Worid, April 1983, pp. 33-39.

A.

"A Management View: Computer Security as a Discretionary Decision,"

&

Computers

July 1985.

J.

Security

,

hacking, crime,

Sewell. C.

Key Words: SAT-89

crime, threats.

SEW-84

1985, pp. 13-22.

Key Words:

Key Words:

March

"Screening Out The People Problem." Security World

policy,

guidelines.

.

Sato, O.

October 1984. pp. 50-52.

"Controlling End-User Computing: An Analytical Framework," ACM Security, Audit and Control Review ,

Fall 1989, pp. 6-12.

SCH-86

Key Words:

J. A.

Schweitzer,

"Who Owns

Security?" Security, Audit & Control Review Spring 1986, ,

pp. 1-3.

Key Words:

policy, guidelines.

Information

SEY-85 Seymour.

J.

"Lx)cking

Up Your

Information

Assets," Today's Office

policy,

Key Words:

guidelines.

awareness,

,

April

1985, p. 23ff.

general.

Key Words:

SCH-80

policy, guidelines.

SCH-86a

Schulte, L.A.

"Computer Crime

Schweitzer, J.A.

Bibliography," Computer/Law

Computer Crime and Business

Sieber, U.

Information

The International Handbook on Computer Crime: ComputerRelated Economic Crime and

Journal

,

Sununer 1980, pp.

,

787-803.

York, 1986

Key Words: awareness,

Key Words:

Elsevier,

SIE-87

New

crime, threats.

general, crime, guidelines.

SEC-86

"Safeguarding EFTS,"

Datamation February 1983,

60.

Schwartz, M.B.

.

,

Sons, Somerset,

Key Words:

crime, threats,

general, international.

SIL-83

pp. 148-160.

Key Words:

crime, poUcy.

SEC-89 "10

SCH-84 Schmucker K.J. "Computer Crime: Fiction and Science Fact," Abacus Spring 1984, pp. 8-21.

Silverman, M.E. "Selling Security to Senior

policy,

guidelines, techniques.

Key Words:

&

Wiley

NJ. 1987

"How Business Battles Crime by Computer." Security World October 1986, pp. 54-

SCH-83

Key Words:

the Infringements of Privacy , J.

,

Top

Security

Management, DP Persoimel and Users," Computer Security

Trends, "Security, February 1989, pp. 47-51.

Journal

Key Words:

Key Words:

policy,

,

FallAVinter 1983, pp.

7-18.

awareness,

general, poHcy, guidelines.

techniques.

awareness,

crime.

1-18

TUR-86

STA-85

SIL-85 Silverman, M.E. "Strategic Planning

~ The

Missing Link in Computer Security"

Stanley, P.M.

Turn, R.

"Educating Computer Crime

"Security and Privacy Requirements in Computing," Proc. ACM/IEEE Fall Joint Computer Conference November 1986, pp. 1106-

Investigators," Proc. IHF/Sec.

Computer Security

GRI-

;85, Dublin, 1985, (2:

Journal. Winter 1985, pp. 31-

85), pp. 313-322.

,

38.

Key Words: Key Words:

crime, guidelines.

1113.

policy,

Key Words:

STA-86

guidelines.

D.W. "Computer Abuse and

policy, guidelines.

Straub,

SIM-81 Simkin, M.C. "Computer Crime: Lessons

Security:

and

Security, Audit

TUR-86a

Update of an

Turn, R.

Empirical Pilot Study,"

The CPA Journal December 1981, pp. E)irections,"

&

"Security, Privacy, Safety

Control

Review Spring 1986, pp. 21-

,

,

10-14.

Software Design Methods

31.

Key Words:

NATO ASDI

Key Words:

crime, threats,

crime, guidelines,

techniques.

policy.

SMA-84 Computer

Straub, D.W., and

Crime," Security Managment January 1984, pp. 19-34.

.

crime, poUcy,

"Uncovering and Disciplining Organizational Responses and

Age

,

(U.K.), July 1988, pp. 151-

SMI-83

VAN-84 Van Hoboken, W.R.C. "The Burglar's Viewpoint," Computers & Security ,

November

1984, pp. 295-302.

156.

Key Words:

Smith, T.H.

"Computers and the

Law

of

Evidence," Transnational Data

December 1983,

Report,

Key Words:

VAN-85

threats, guidelines.

van Tongeren, H.

TUR-82

"Information Security in the

Turn, R.

Key Words:

crime, policy,

"Private Sector

Needs

for

Trusted/Secure Computer

laws.

Sokolik, S.L.

National Computer

Conference AFIPS Press, Reston. VA, 1982, pp. 449-

Key Words:

460.

international.

,

"Computer Crime

— The

for Deterrent

Legislation,"

Journal

,

333-383.

Key Words:

policy,

crime,

"The Investigation, Prosecution and Prevention of Computer

TUR-85 Tumer, B.M. 'Tenorist Attacks

STA-84 N.

"Designs for Computer Security," Security World,

March 1984,

Upon

Technological Systems," Journal of Security Administration December 1984, pp. 25-32.

Crime: A State of the Art Review," Computer/Law Journal , Spring 1980, pp. 385402.

,

Key Words: policy, laws.

pp. 52-55.

Key Words:

Key Words:

VOL-80 Volgyes, M.R.

guidelines.

legislation.

Staikos,

policy, guidelines,

Computer/Law

Spring 1980, pp.

Key Words:

Framework of the International Information Flow Debate: A Business View," Proc. MP/Sec'85 (2: GRI-85), pp. 323-328.

Systems," Proceedings, 1982

SOK-90

crime, threats.

crime, policy,

pp.

451-454.

Need

policy, guidelines,

W.D. Nance

Options," Information

techniques.

,

Volume

techniques.

Computer Abuse:

Key Words:

Series

F22, Springer- Verlag, New York, 1986, pp. 653-679.

Key Words:

STR-88

"Controlling

andResiliency in Computing," J. Skwirzynski (Ed.),

in

crime, threats.

policy,

guidelines, techniques.

1-19

crime, guidelines,

WEB-85a

VOL-83

WON-84

Volkman, T.C. "Computers — America's

Webster, W.H.

Achilles' Heel," Air

Industrial Espionage,

University Review 1983. pp. 43-47.

,

May-June

&

"Computer-Related Fraud in EDPACS. June

the U.K.,"

Computer Crime: The FBI's Computer Security

1984. pp. 5-9.

Activities,"

Journal

Key Words:

Wong. K.

'Technology Transfer,

vulnerabilities,

Winter 1985, pp. 7-

,

Key Words: awaraiess.

12.

crime,

international.

threats.

Key Words:

WAR-83

WON-85

crime,

government, guidelines,

Ware, W.H. "Computer Security Standards for Government and Industry:

Wong. K.K.

policy.

"Computer Disaster

WEI-82

Where Will They Come From?," Computer Security

Weiss, E.A. "Self-Assessment Procedure

Journal. Spring 1983, pp. 71-

With Ethics in Computing," Communications of the ACM March 1982. pp.

76.

E)ealing

,

Key Words:

guidelines, government.

awareness, ethics.

WAR-84

WOO-82

NCC

England. 1982.

"Information Systems

Weinberger, F.

Security and Privacy,"

"Computer Security: Plan for Action," TeleSystems Journal

Communications of the ,

April 1984, pp. 315-

Keyword: awareness, general. ,

Key Words:

awareness,

Yngstrom, L.

Key Words:

"Experiences from a One- Year Academic Programme in

awareness,

policy, guidelines.

Security Informatics." Proc. IFIP/Sec. '88 . Australia, 1989.

general.

WEL-86

WAR-88

(2:

WeUer.

Ware. W.H.

on Trusted

"Perspectives

Computer Systems," IFIP/Sec. '88 (2:

,

Proc.

Wall "Source Code Under Lock and Key," Computerworld June 2, 1986. p. 69. and

R..

awareness,

general, techniques.

Keyword: awareness, general.

,

YOS-85 Yost, G.

Key Words:

guidelines,

Spy-Tech. Fact On File Pub., York, 1985.

New

techniques.

Key Words:

CAE-89). pp. 83-86.

S.

Australia,

CAE-89), pp. 309-

YNG-88

March/April 1984. pp. 11-21.

312.

WON-83

Key Words:

Wong, K.

awaroiess,

general.

"Computer-Related Fraud,"

WEB-85 Webster,

Information

W.H.

'Technology Transfer, Industrial Espionage and Computer Crime: The Problems We Are Facing,"

Computer Crime

Digest,

January 1985. pp. 1-5.

Key Words:

Age (UK)

,

January 1983, pp. 16+

crime,

guidelines, policy, techniques.

YOU-82 Yourdan, E. Silent Witness Yourdan Press, New York. 1982. .

Key Words:

awareness,

general, crime, threats,

Key Words: awareness,

WON-83a

general.

Wong, K. "Computer-Related Fraud in Age. (U.K.) October 1983, pp. 238-240. the U.K.," Information ,

YOV-89 Yovel. S. "On Viruses and Top Managers." Information

Age

(U.K.), September 1989. pp.

Key Words:

awareness, crime,

202-210.

international.

Key Words:

awareness,

viruses, guidelines.

1-20

.

Publications. Manchester.

WEI-84

Ware, W.H.

1989, 330.

crime,

Introducing Computer Security

Key Words:

ACM

Key Words: awar^ess, international.

Wood, M.

181-195.

policy,

in the

United Kingdom," EDPACS. January 1985, pp. 1-7.

.

ZAL-83

ZAJ-85 Zajac, B.P..

Jr.

Zalud, B.

"Police Response to

"Computer Criminals Will Be

Computer Crime in the United States," The Computer

Prosecuted: Adoping

Law

Data Management, April 1983, pp. 30+.

and Sectmty Report, July-August 1985, pp. 16-17.

A

'Prevention First' Approach,"

ZIM-85 Zimmerman, J.S. "PC Security: So What's New?" Datamation November ,

1,

1985, pp. 86-92

Key Words: general, PC.

Key Words:

crime,

ZAJ-86 Zajac, B.P.,

Jr.

"What to Do When You Have Reason to Believe Your Computer Has Been Compromised". Computers & Security

.

Key Words:

crime, policy,

guidelines.

legisIatiorL

March. 1986, pp.

11-16.

ZIM-84 Zimmerman,

J.S.

"The Human Side of Computer Security," Computer Security Journal

,

Summer

1984, pp. 7-20.

Key Words:

awareness.-

general, threats, guidelines.

Key Words:

hackers, viruses,

threats, guidelines.

1-21

awareness,

2.

The

Management

on various management issues, including: the need for minicomputer and personal computer systems (risk management, risk analysis); administrative and personnel policies and controls; physical security in computing facilities; and operational (disaster) recovery. Also included are publications containing technical discussions of threats and vulnerabilities (e.g., viruses). section cites publications

security in mainframe,

ADD-87 Addison, K., et

"Computer Security Microsystems,

at

SUN

Inc.," Proc.

Comp.

10th Natl. (5:

AIM-81 AIM/SAFE:

al.

Data Processing Contingency Planning Methodology

Al-Saffar, H.

Advanced Information Management, Inc., Woodbridge, VA, 1981.

1986, pp. 1-14.

"Using

Sec. Conf.

,

219.

Key Words:

Key Words: company, management,

Symposium on

Proceedings,

Physical/Electronic Security,

1986.

Planning," Proc. IFIP/Sec. '83

"Preliminary Formulation of a

Stockholm, 1983,

Policy Based on Risk (PER) Asessment Methodology,"

pp. 143-146.

Comp.

Key Words:

Sec. Risk

guidelines,

physical.

Austin, B.B.

Proceedings, 2nd Annual

Key Words:

Symposium on

methods.

Physical/Electronic Security Philadelphia,

risk, policy,

ALK-89

Spring 1981, pp. 83-98.

Alkemi Computer Risk Manager Elsevier Advanced Technology New York, NY, ,

Key Words:

proceedings,

physical.

"ControUing Physical Access from a Central Locations," Computer Security Journal ,

,

PA,

August 1986.

Key Words:

physical, control,

techniques.

BAD-89

1989.

AFC-87

Badenhorst, K.P., and

Key Words:

Proceedings, 3d Annual

Symposium on Physical/Electronic Security

1987.

risk,

management, methods. ,

ALL-81 Allen, B.R.

Key Words: physical.

,

FAK-83),

AUS-81

AFC-86

AFCEA,

(2:

,

pp. 225-242.

AFCEA,

Computers and

Office: Security Conscious

Aldridge, B.T.

Proc. physical.

Audit February

Ancker, A.

Manag. Model Builders Workshop 1988 (2: NBS-88),

proceedings,

,

auditing, methods.

"Facilities for

AFC-85

for

ANC-83

guidelines,

recovery, techniques.

ALD-88

Key Words:

Data

EDPACS

Key Words:

techniques

AFCEA,

SMF

Purposes,"

,

NCS-87a), 1987, pp. 216-

general, policy,

ALS-86

A

proceedings,

"Threat Teams:

A

Technique for the Detection and ftevention of Fraud in Automated and Manual Systems," Computer Security Journal

,

Spring 1981, pp. 1-

13.

Key Words:

guidelines,

techniques.

2-1

J.

Eloff

"Framework of a Methodology for the Life Cycle of

Computer Security in an Organization," Computers & Security August 1989, pp. ,

433-442.

Key Words:

general, methods.

BER-83b

BEC-83

BAK-85 Baker, R.H.

Becker, H.B.

The Computer Security Handbook TAB Professional

Information Integrity:

.

Structure for

Bernstein. R.A.

A

Definition

Its

and Reference Books, Blue Ridge Summit, PA, 1985.

and Management McGrawHill, New York, 1983

Key Words:

Key Words: book,

,

.

Key Words: book, geberal,

integrity,

A

"Contingency Planning — Case Study," EDPACS October 1983. pp. 9-12. contingency,

methods.

general, methods, guidelines.

techniques.

BER-84 BEC-84

BAL-87

Berg. R.

Baldwin, R.W. "Rule Based Analysis of

Becker, H.B.

Computer

the Small Systems Environment," Proc. IFIF/Sec.

Security,"

IEEE Compcon

Proceedings,

1987 pp. 227-233.

Toronto. 1984, 85), pp. 501-516.

_;84,

,

Key Words:

"Security Considerations in

(2:

FIN-

"Risk Management for Computer Centers,"

Informormation Resource

Management (U.K). March 1984, pp. 16-17.

Key Words:

general,

Key Words:

methods.

risk,

management,

methods.

general,

guidelines.

BAR-80

BES-88 BEI-84

Barbarino, P.

"Multi-Tiered Approach to

System Security," Proc. 1980 IEEE Symp. on Security & Privacy (5: IEE-80), pp. 114-120. ,

Bessenhoffer. R.

Beitman, L. "An Audit Software Program

Modem

Base,"

Center."

Computer Security

Journal,

Volume V, No.

EDPACS March ,

general, method,

1,

1988. pp. 53-66.

Key Words: Key Words:

1984,

pp. 6-8.

"Designing Security Into a Data Processing

auditing,

Key Words: methods,

software.

techniques.

techniques.

BEN-89

BEA-84

BIC-89

Benzel, T.C.V.

Beatman, L. "Microcomputer Function,"

in the

EDPACS

Audit

"Integrating Security

Bickner. L.

Requirements and Software

"Security Engineering of Secure Ground Stations," Proc. Aerospace Comp. Sec. Conf. (5: IEE-85a), 1985, pp. 49-54.

Development Standards," Proc.

,

September 1984, pp. 4-6.

12th Natl. (5:

Key Words:

Comp. Sec.Conf.

NCS-89), 1989. pp. 435-

458.

auditing,

Key Words:

methods.

Key Words: methods,

BEA-85

software

BIS-86

Beatson, J.G.

BER-83

"Development and Organization of the Audit

Bishop,

Bermhed, L.

M.

"Analyzing the Security of An Existing Computer System,"

and Security Function," Proc.

"A Method

MP/Sec.

VuherabiUty." Proc. IFIP/Sec. ^83. Stockholm. 1983. (2: FAK-83). pp. 161-166.

Joint

Key Words:

Key Words:

(2:

physical,

techniques.

'85 , Dublin, 1985,

GRI-85), pp. 251-259.

Key Words:

for Testing

Proceedings.

ACM/IEEE

Fall

Computer Conference,

Nov. 1986, pp. 1115-1119.

audit,

management.

vulnerability,

risk,

methods.

methods.

BEA-86

BLA-81 BER-83a

Beatson, J.G.

"Managing the

EDP

Audit

and Security Function," Computers «fe Security September 1986, pp. 201-206. ,

Blanding, S.F.

Bemhard, R.

A

Doors, Trojan Horses...,"

Aug./Sept. 1981, pp. 4-24.

management.

,

Systems and Software April ,

1983, pp. 67-68.

Key Words:

"Computer Fraud Auditing Case Study," EDPACS

"Foiling the Spoofers, Trap-

audit,

Key Words:

hackers, threats,

methods.

2-2

Key Words: crime, company.

auditing,

BOL-84

BON-81 a

Bologna, J. "Disaster/Recovery Planning: Qualitative Approach," Data Processing &

A

Communications Security

.

March/April 1984, pp. 11-15.

BRA-81

Bonyun, D.A. 'Towards A Standard All-

Brafman, M.J.

Purpose Activity Log,"

Using the Matrix Approach,"

Proceedings. Honeywell Computer Security and Privacy Symposium April

EDPACS December

"Evaluating Computer Controls

.

,

Key Words:

1981. pp. 133-145.

Key Words:

contingency, auditing,

BRI-83

guidelines.

BOL-88

BriU, A.E.

BON-88

Bologna, G.J., and R.J. Linquist

Fraud Auditing and Forensic Accounting J. Wiley & Sons, New York, 1988. ,

Key Words: book,

auditing,

Building Controls into

Bonyun. D.A.. and J. Graeme "An Expert Systems Approach to the Modelling of Risks in

Structured Systems ,

Dynamic Envirorunent," Proc. Comp. Sec. Risk Manag. Model Builders Workshop

Key Words:

,

1988

control.

(2:

NBS-88). pp. 203-

223.

BOL-88a

Press.

New

Yourdon

York, 1983. controls, methods.

BRO-84 Browne, P.S. 'The Automated Risk

Profile

(RiskPac), Proc. 7th Seminar,

Bologna,

J.

"Selection Risks in Hiring

Information Systems Personnel," Computers Security

risk, control,

methods.

Key Words:

recovery, management.

1981. pp.

1-10.

,

&

August 1988, pp.

353-355.

Key Words:

risk, personnel.

Bound, W.A.J.. and D.R. Ruth "Risk Mangement — How It Can Become a Useful Tool," Proc. IFIP/Sec. '83 , (2:

FAK-

"The One Minute Fraud

&

Security , February 1989, pp. 29-31.

Key Words:

crime, auditing.

BON-81 Bonyun, D. "The Role of a Well Defined Auditing Process in the Enforcement of Privacy PoUcy and Data Security," Proc. 1981 IEEE Symp. on Sec. & Privacy (5: IEE-81),

Key Words: methods.

policy, auditing,

risk,

pp. 402-404.

methods,

management.

BRO-86 Brown. R.V. "Managing Diffuse Risks from

(DR/AS)

with Special Refemce to

Key Words: risk, methods, management.

Computer Nati.

Security," Proc. 9th

Comp.

Sec. Conf. (5:

NCS-86). 1986. pp. 162-167.

BOU-83a Bound, W.A.J., and D.R. Ruth "Making Risk Analysis A Useful Management Tool with Microcomputer Electronic Worksheet Packages." Computers & Security June .

Key Words:

risk,

methods,

risk,

management,

BRO-87 Brown, R.L. "Specification for a

Management Tool," Proc. 10th NaU. Comp. Sec. Conf. (5: NCS-87a), 1987. pp. 84-90.

management.

Key Words: management,

BOY-82 Boyer. T.J. "Contingency Planning: Opportunity for DP

methods.

An

Management." Computer Security Journal

.

Winter 1982,

pp. 41-49.

Key Words:

Key Words: methods.

CanonicalConfiguradon

1983. pp. 102-115.

,

pp. 19-25.

Sec. Progr. (5:

Adversarial Sotirces

J.

Auditor," Computers

DoD Comp.

DOD-84). 1984.

Key Words:

BOU-83

Stockholm. 1983, 83), pp. 147-160.

BOL-89 Bologna,

Key Words: risk, methods, management.

contingency,

recovery, methods.

Browne,

P.S.,

and

Laverty "Using Decision Analysis to Estimate Computer Security Risk," Proc. Comp. Sec. Risk Manag. Model Builders J.E.

Workshop 1988

(2:

.

88)

CAR-82

BUR-85

BRO-88

,

Bums, R.W.

Carroll, J.M.

"Security Implications of the

Controlling White Collar

Space Station Information System," Proc. Aerospace Comp. Sec. Conf. (5: lEE-

Crime: Design and Audit for Systems Security Butterworths, ,

Wobum, MA,

1982.

85a), 1985, pp. 3-10.

NBS-

Key Words: book, Key Words:

pp. 117-134.

requirements,

crime,

auditing.

govenmient.

Key Words:

CAR-83

risk,

BUR-88

management, methods.

Computer Viruses: A HighTech Disease Abacus, Grand Rapids, MI, 1988.

BRO-89 Brothers,

M.H.

,

"A 'How To' Guide for Computer Virus Protection

89)

,

Key Words: book,

,

January 1983, pp. 24-

general,

Key Words:

virus, risk, techniques.

risk, threats,

methods, managements.

1989, pp. 349-358.

Key Words:

Security 34.

in

MS-DOS," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-

and O. Wu "Methodology for Security Analysis of Data Processing Systems," Computers & Carroll, J.M.,

Burger, R.H.

BUU-84

virus, guidelines,

CAR-83a

Buurmeijer, F.

"IBM's Data Security

methods.

BRU-85

Carroll, J.M.

Some

Strategy:

"Descision Support for Risk

Implementation Aspects,"

Bruske, S.Z., R.E. Wright,

Computers

&

Analysis," Computers Security

and W.D. Geaslen "Potential Uses of Probabilistic Risk Assessment Techniques for Space Station Development," Proc. Aerospace Comp. Sec. Conf

November

1984, pp. 273-277.

.

(5:

IEE-85a), 1985, pp. 21-

Security

Key Words: methods, company.

risk,

methods.

,

Age

Proc.

Introduction to Data

Information Sciences, Wellesley,

MA,

Q.E.D.

,

May

Amsterdam 1989.

Key Words:

methods.

BUI-87

MA

1984.

Key Words: book, risk, methods, management.

CAR-84a Carroll, J.M.,

CAM-83

control,

Stoneham,

proceedings,

general, international.

and

W.R. Maclver 'Towards an Expert System

Campbell, R.P.

Key Words: book,

Managing Risk: A ComputerAided Strategy Butterworth,

1988, North-

Inc.,

1987.

risk, threats,

,

Gold Coast,

IFIP/Sec. '88,

Holland,

Security and Controls

230-236.

Carrroll, J.M.

in the

Buck, E.R.

An

&

1983, pp.

CAR-84

AustraHa,

BUC-87

November

Key Words:

CaelU, W.J. (Ed.) of Information

Key Words:

,

methods, management.

CAE-89 Computer Security

29.

,

Up

Mainframe, Part 1," Computerworld, October 10, 1983, pp. IDlID15. "Lxjcking

the

for Computer-Facility

Certification," Proc. IFIP/Sec.

J4, Toronto, 1984,

(2:

FIN-

85),'84, pp. 293-306.

Bui, T., and

T.R. Sivasankaran

Key Words:

"Cost-Effectiveness Modeling

methods.

System Computer Security," Computers & Security April

threats, policy,

Key Words:

physical, methods,

risk.

fora Decision Support in

,

1987, pp. 139-151.

CAM-83a

Part 2,"

Key Words: methods, management.

CAR-85

Campbell, R.P. "Locking Up the Mainframe,

Computerworld

,

Carroll, J.M.,

and

W.W. Mac Iver "COSSAC: A Framework

October 17, 1983, pp. IDlID14.

Analyzingand Configuring

Key Words:

1985, pp. 5-12.

for

Secure Computer FaciUties," Computers & Security March .

threats, policy,

methods.

Key Words:

2-4

physical, methods.

CHO-89

CAR-87 Carroll,

]M.

COH-84a

Chokhani,

Cohen, F. "Computer Viruses: Theory and Experience," Proc.

S.

Computer Security Second

"Protection of Call Detail

Edition, Butterworths, Boston,

Records Data in Federal Telecommunications," Proc. 5th Sec. Applicat. Conf. (4:

,

MA,

1987

Key Words: book, general, methods, guidelines,

IEE-89C), 1989. pp. 70-77.

techniques.

Key Words: government,

(2:

Computers

&

COH-87

CLA-86 Clark, R.

Security

,

March

1985, pp. 33-45.

"Risk Mangement ~ A New Approach," Proc. IHF/Sec. ;86,

Key Words:

Monte

Cohen, F. "Computer Viruses: Theory and Experiments," Computers & Security February 1987, pp. ,

22-25.

Carlo, 1986, (2:

Key Words:

GRI-89).

controls,

methods.

virus, techniques,

theory.

Key Words: risk, methods, management.

CHA-82

COH-88

Chambers, A.D.

Cohen.

Computer Auditing

CLY-87

,

Commerce

Clyde, A.R.

Inc.,

"Insider Threat Identification System," Proc. 10th Natl.

Clearing House, Chicago, 1982.

Key Words:

Comp.

auditing,

Conf

Sec.

.

(5:

NCS-

F.

"On the In-iplications of Computer Viruses and Methods of Defense,"

&

Computers

Security , April

1988. pp. 167-184.

87a), 1987, pp. 343-356.

methods.

Key Words:

Key Words:

CHA-85 "A Low-Cost Approach

COH-88a

to

Disaster Recovery Planning,"

Computer Security Journal

,

Winter 1985, pp. 57-61.

Key Words:

contingency,

COC-84 Cochrane,

Cohen,

"Automated Data Processing

Information Integrity,"

Security Accreditation

Computers

Program (A Composite

1988, pp. 489-494.

Guideline)," Proc. 7th

maangement.

Seminar, Progr. (5:

CHA-86

DoD Comp.

Sec

Differences Between Computer Security Practices

and Private

Sectors," Proc. 1986

Symp. on Security

&

IEEE Privacy

IEE-86), pp. 71-77. policy, methods,

management.

integrity,

methods.

F.

'Terminal Viruses," The Sciences Nov.-Dec. 1988, pp.

guidelines,

accreditation.

,

24-30.

COH-84 Cohen, F. "Computer Viruses: Theory and Experiments," Proc. 7th Seminar, DoD Comp. Sec .

Key Words:

Security . October

COH-88b Cohen,

Key Words:

&

Key Words:

.

DOD-84), 1984, pp.

351-363.

Chalmers, L.S. "An Analysis of the

F.

"Maintaining a Poor Person's

J.S.

recovery, methods,

in the Military

virus, threats,

methods.

threats, risk,

methods.

Chalmers, L.S.

(5:

virus, theory,

methods,

MJ.

"General Controls in Computer Systems,"

,

techniques.

techniques.

Cerullo,

'84 Toronto. 1984, FIN-85), pp. 143-158.

Key Words: threats, policy,

CER-85

mP/Sec.

Progr. (5:

DOD-84), 1984,

pp.

240-263.

Key Words:

virus, techniques.

COH-89 Cohen, F. "Computational Aspects of Computer Viruses," Computers & Security June 1989, pp. ,

CHA-88

Key Words:

Chantino York,

325-344.

theory.

Disaster Recovery

New

virus, techniques,

NY,

,

Key Words:

Elsevier,

1988.

Key Words: book,

recovery,

methods.

2-5

virus, techniques.

CRO-84

COU-85

COO-89 Cooper, J.A.

Courtney, R.H., and

Computer and Communications

M.A. Todd

"A Flow Charting Technique

"Problem Quantification: Importance of Cost-Effective

for Designing

Security," Proc. IFIP/Sec. '85 ,

March/April 1984, pp. 22-27.

Security-

Strategies for the 1990s,

McGraw-Hill,

New

York,

Dublin, 1985,

1989.

(2:

Croft, R.B.

Key Words:

CRO-85

Key Words: methods,

Cronhjort, B.T., and A. Mustonen "Computer Assisted Reduction of Vulnerability of Data

techniques.

COP-88 Copigneaux, F., and S. Martin "Software Security Evaluation Based on Top-Down McCallLike Approach," Proc. 4th Aerosp. Comp. Sec. Conf (4: IEE-88b). 1988, pp. 414-418. .

risk,

methods.

COU-86 Courtney, R.H. "Security Measures

Centers," Proc. IFIP/Sec. '84

Are

Inherently Undesirable,"

EDPACS March .

1986, pp. 9-

Coryen, G.C.

Methodology

for Assessing

Security Risks Associated

with Computer Sites and Networks UCRL-53292, Lawrence Livermore National ,

Laboratory, Livermore,

Key Words:

(2:

,

FIN-85),

risk,

Key Words: methods,

vulnerabilities,

management.

techniques.

methods,

CRO-86

Courtney, R.H.

Cronin, D.

"An Economically Feasible Approach to Contingency

Microcomputer Data

Planning," Proc. 9th Natl.

Communicat./Prentice-HaU, Englewood Cliffs, NJ, 1986.

Comp.

Issues

NCS-

Sec. Conf. (5:

&

Strategies ,

Security:

Brady

86), 1986, pp. 237-244.

Key Words: book, management, PC, techniques.

CA,

Key Words:

June 23, 1982.

Toronto, 1984, pp. 397-425.

12.

COU-86a

COR-82

A

risk, techniques.

general,

networks.

Key Words:

,

GRI-85),

pp. 55-63.

Key Words: book,

On-Line Data

Security," TeleSystems Journal

contingency,

recovery, methods.

Key Words:

risk,

COU-88

networks.

Crocker,

J.

"Source Code Security: A Checklist for Managers," Sec. Audit & Control Review , Spring 1987, pp. 12-

ACM

But Unclassified

Sensitive

Data," Computers

&

and

S.,

M. Pozzo

"A Proposal for VerificationBased Virus Filter," Proc. 1989 IEEE Symp. on Sec. &

Courtney, R.H. "Another Perspective on

COR-87 Corelis,

CRO-89

methods,

Security

,

Privacy

IEE-89b), pp. 319-

(5:

February 1988, pp. 19-23.

324.

Key Words:

Key Words:

policy,

virus, techniques.

requirements.

16.

CSC-85

Key Words:

software,

COU-89

PC

COU-84

Responsibility for Data

Age

Courtney, R.H., and

Security," Information

M.A. Todd

(U.K.) April 1989, pp. 83-87.

"Problem Definition:

An

Essential Prerequisite to the

Implementation of Security Measures," Proc. IFIP/Sec. 284, Toronto, 1984, (2: FIN85), pp. 97-106.

Security Considerations

,

NSSC-TG-002-85, National Computer Security Center, Ft. Meade, MD, 1985.

Courtney, R.H. "Proper Assignment of

guidelines.

,

Key Words:

guidelines, PC,

techniques.

Key Words: policy, management.

CSI-83

Computer Security Handbook Computer Seciffity Institute,

CRO-82 Crow, W. "Making the

Key Words: methods,

Secure,"

techniques.

Magazine

ATM

Northboro,

Jan./Feb. 1982, pp.

Key Words: book, general, techniques,

management.

70-74.

Key Words:

policy,

techniques.

2-6

1983.

More

The Bankers ,

MA,

,

guidelines,

DEM-85

CSI-87

Commercial EHsastCT Recovery Services," Computer Security Journal Volume IV, No. 2, 1987, pp.

DeMaio, H.B. "Controlling Advanced Information System Technology," Computer

49-64.

Security Journal

"A Guide

to

,

.

DON-84 Donovan,

and Contingency Planning," Proc.

mP/Sec.

Winter 1985,

pp. 63-67.

Key Words:

contingency,

(2:

'84. Toronto. 1984. FIN-85), pp. 401-406.

Key Words: contingency, management.

Key Words: management,

recovery.

J.F.

"Industrial Relations

control.

CWO-86 Hot Computerworld May

"Disaster Recovery Sites,"

,

12, 1986, p. 62ff.

Key Words:

contingency,

DOS-85

DEN-81

Doswell, R.T. "The Audit, Control and Security of the Project Life

de Boef, A. "Audit Monitoring of Production Data Files,"

EDPACS

,

Cycle

February 1981, pp.

1-16.

recovery.

DAV-87

pp. 277-281. auditing,

methods.

Key Words:

R.E. Gantenbein

Computer Virus Attack,"

Denning, D.E.

Journal of Systems and

"An

Software December 1987, pp. 253-258.

Model," IEEE Trans, on Software Engr. February 1987, pp. 222-232.

,

Key Words:

DPC-84

Intrusion-Detection

"Computer Security Administration and Staffing,"

Data Processing

,

Key Words:

threats,

&

Communications Security May/June 1984.

virus, recovery,

methods.

auditing,

management.

DEN-87

"Recovering from a

Pre-Implementation

Dublin, 1985, (2: GRI-85),'85,

Key Words:

Davis, F.G.F., and

~

Stage," Proc. IFIP/Sec. '85 ,

,

methods.

Key Words: management,

DAV-89

DES-88

persoimel.

Davida, G.I., Y.G. Desmet,

Desman, M.B.

and B.J. Matt "Defending Systems Against

Attention to Your People,"

"Physical Security for Data

Viruses through Cryptographic

Computer Security Journal

Processing Facilities," Data

Authentication," Proc. 1989

49-51.

Security

Key Words: policy, personnel, management.

Key Words:

IEEE Symp. on

Volume V, No. Sec.

&

Privacy (5: IEE-89b), pp. 312-318.

Key Words:



"Recovery Palnning

1,

Pay

1988. pp.

DEV-83

virus,

techniques, cryptography.

Computer Viruses:

Data Center," Computer

Proceedings, Invitational

Security Journal

Symposium October ,

10-11,

1988, Deloite Haskings

New

&

York, 1989.

Processing ,

&

Communications

Sept./Oct. 1984.

physical,

techniques.

DUG-86

DeVries, D.

"A Baker's Dozen: Security Suggestions for Moving a

DEL-89

Sells.

,

DPC-84a

,

Spring 1983,

Dugan, E. "Disaster Recovery Planning: Crisis Doesn't Equal Catastrophe," Computerworld

,

January 27, 1986, pp. 67-74.

pp. 91-95.

Key Words: Key Words:

guidelines,

contingency,

recovery, management.

physical.

Key Words: virus,

DUN-84

proceedings,

methods, management.

DOD-88

Dunmore, D.

Security Requirements for

"An EDP Risk Analysis

Automated Information

Model,"

Systems (AIS) U.S. Department of Defense, Washington, DC, March 1988.

1984. pp. 6-11.

,

Key Words: methods.

Key Words:

policy,

requirements, government.

2-7

EDPACS risk,

.

October

management,

EAS-82

FEU-88

ESS-85

Eason, T.S., and D.A. Webb Nine Steps to Effective EDP

Essen,

and B. Lindberg "The Bofors-Model for

Feuerlicht,

Loss Control Digital Press, Bedford, MA, 1982.

Working mP/Sec.

Information in Controlling

,

(2:

Key Words: book,

J., and P. Grattan "The Role of Classification of

J.,

ADP

Security," Proc. '85 , Dublin, 1985,

GRI-85), pp. 47-53.

control,

Data Proliferation in End-User PC Environment," Proc. IHP/Sec. '88 Australia, 1989, (2: CAE-89). pp. 167-176. .

Key Words:

policy, guidelines.

risk, threats,

methods.

Key Words: control, methods management.

EIC-89 Eichin,

FAK-83

M.Q.W., and

J.A. Rochlis

Fak, V.A. (Ed.)

"With Microscope and Tweezers: An Analysis of the

Security, Proc. of IFIP/Sec'83 .

November 1989 IEEE

Internet Virus of

1988," Proc.

Symp. on Sec.

&

Privacy IEE-89b), pp. 326-343.

Stockholm, Sweden,

(5:

FEU-89 J., and P. Grattan "The Role of Classification of

Feuerlicht,

North-HoUand Publishing Co., Amsterdam,

Information in Controlling

1983.

Data Proliferation in End-User Personal Computer

methods.

virus,

16-

19, 1983,

Key Words: Key Words:

May

proceedings,

general, international.

Environment," Computers & Security February 1989, pp. ,

59-66.

ENG-80

FAS-89

M.V.

Enger, N.L., and

Fastiggi,

P.W. Hoverton Computer Security: A Management Audit Approach

"Detection of Surreptitious

Anacom,

New

Insertion of Trojan Horse or ,

Viral

Code

in

Computer

AppUcation Programs,"

York, 1980.

Age

Information

Key Words: book,

Key Words: control, methods, management.

(U.K.),

,

January 1989, pp. 3-10.

auditing,

methods,

Key Words:

FIE-82 Fierello,

of Computer Security Standards & Guidelines," Proc. 5th Seminar, DoD Comp. Sec .

EPP-80

Prog

FED-85

Epperly, E.V.

M.

"Cost-Benefit Impact Analysis

.

DOD-82), 1982, pp.

(5:

177-201.

"The Department of Defense

Proceedings, Federal

Computer Security Initiative Program and Current and

Information System Risk

Key Words:

Analysis Workshop U.S. Air

methods, management.

Future Security Policies,"

Force Computer Security Program Office, San Antonio, TX, January 1985.

Proc.

,

DoD (5: DOD-

2nd Seminar,

Comp.

Sec. Prog.

Key Words:

EPP-82 Epperly, E.V.

Sec. Prog.

DoD (5: DOD-

82), 1982, pp. 99-137.

-

Computer

A

Sept., 1984,

Business," Proc. 10th Nad.

Company, Amsterdam, 1985.

Comp.

Global

North-Holland

Ferris,

Conf

Sec.

.

(5:

Publishing

NCS-

87a), 1987, pp. 266-272.

Key Words:

proceedings,

general, international.

Key Words:

cerification,

ns-89

policy.

Fish, T.

Key Words:

Security:

,

M., and A. Cerulli "Certification: A Risky

Proc. 5th Seminar,

Finch, J.H., and

Challenge. Proc, IFIP/SEC '84 Toronto, Canada, 12-12

FER-87

government.

Comp.

proceedings, risk.

policy,

"Computer Security Policies Challenges and Prospects,"

FIN-85 E.G. Dougall (Eds.)

80a), 1980, pp. J1-J34.

Key Words:

guidelines,

and

S.

Meglathery

"Professional Certification for

policy,

Computer Security

government.

Practitioners," Proc. 12th Natl.

Comp.

Sec.

Conf

.

(5:

NCS-

89), 1989. pp. 433-434.

Key Words: management.

2-8

personnel,

FRY-83

FIT-81 Fitzgerald,

"EDP Risk

GAO-81

W.F. Main "A Conceptual Methodology

Fry. B.G.P. and

J.

Analysis Using

Matrices,"

EDPACS

November

1981. pp. 1-7.

for Evaluating Security

,

risk,

methods,

management.

Security

&

Computers

November

.

to

1983. pp.

237-241.

Key Words:

FIT-89

Key Words: auditing, management, government.

requirements,

methods.

Fites, P.E.

GAO-81 a

Control and Security of

Computer Information Systems Computer Science ,

Press, RockvUle.

MD,

Key Words: book,

1989.

control,

methods.

FUG-84

Evaluating Internal Controls in

Fugini, M.. and C. Martella

Mangement

"Security

Office Information Systems." Proc. IFIP/Sec. '84 Toronto, .

1984,

Computer-Based Systems

,

AFMD-81-76, U.S. General

in

Accounting Office, Washington, DC, June 1981.

FIN-85), pp. 487-

(2:

Key Words:

498.

FLA-86 Flach,

Need

Still

Develop Greater Computer Audit Capabilities AFMD-827. U.S. General Accounting Office, Washington, DC, 16 October 1981. ,

Requirements for Data Assets."

Key Words:

Federal Agencies

control,

government.

Key Words: management,

J.

"Disaster Planning

--

Beyond

a Prayer," Computer Security Products Report Spring ,

GAR-87

policy.

Garcia, A.A. (Ed.)

Computer Security: A Comprehensive Controls

GAG-85

1986, pp. 9-11.

Gage, D.W. "Security Considerations for

Checklist

Key Words:

Autonomous Robots," 1986 IEEE Symp. on

Somerset, NJ, 1987.

contingency,

recovery.

Privacy

FRA-83

Proc.

Sec.

&

IEE-86), pp. 224-

(5:

,

Wiley

J.

Key Words:

&

Sons,

guidelines,

methods.

228.

Francella, K.

"Multiple Controls

Combat

Computer Crime," Data Management, July 1983, pp.

Key Words:

requirements.

GAL-85 Gallery, S.M.

21+.

Computer

Key Words:

crime, controls,

methods, management.

Security: Readings from Security Management Magazine Butterworths, ,

GAR-88 Gamett, P.D. "Selective Disassembly: A First Step Towards Developing Virus Filter," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 2-6.

Boston, 1987.

Key Words:

FRI-82 Friedman, S.D. "Contingency and Disaster Planning," Computers and Security January 1982, pp. ,

34-40.

Key Words:

contingency,

recovery, management.

FRI-84 Friedman, S.D. "Contingency and Disaster Planning in EDP," EDPACS . January 1984. pp. 4-9.

Key Words:

Key Words: book,

virus, techniques.

general,

GAR-89

methods.

Gardner, P.E.

GAO-80

"Analysis of Five Risk

Most Federal Agencies Have Done Little Plaiming for ADP Disasters AFMD-81-16, U.S. ,

Assessment Programs," Computers & Security October ,

1989, pp. 479-485.

General Accounting Office, Washington, DC, 18

Key Words:

December 1980.

techniques.

Key Words:

contingency,

recovery, government,

management.

contingency,

risk,

management,

GAS-86 Gascoyne, R.J.N. "Basic Protection for

Microcomputers," EDPACS June 1986, pp. 5-6.

,

recovery, management.

Key Words: PC, management.

2-9

techniques,

GRE-81 a

GIL-89

GIL-81 Gilhooley, I.A.

EDP EDPACS January

"Controlling the

Auditor,"

,

1981, pp. 1-7.

Key Words:

GUbert, I.E.

Green, G., and R.G. Farber

Guide for Selecting Automated Risk Analysis

Introduction to Security

Tools SP 500-174, National Institute of Standards and Technology, Gaithersburg, MD, October 1989.

World

Principles

,

auditing, control,

management.

&

Practices , Security

Publishing, Los

Angeles, 1981.

Key Words:

general, methods,

policy, techniques.

Gilhooley, I.A.

Key Words: risk, management, methods,

"Auditing System

guidelines.

GIL-84

GRE-89 J.L., and P. L. Sisson 'The 'Father Christmas

Green,

Development Methodology,"

EDPACS

July 1984, pp. 1-8.

,

Key Words:

Worm'," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-

GIN-89 Ginn, R. Continuity Planning: Preventing, Surviving and

auditing,

methods.

89), 1989, pp. 359-368.

Key Words:

Recovering from Disaster ,

GIL-84a Gillin, P.

Technology

'Tightening Controls on MicroBased Software,"

1989.

Computerworld, December

5,

1984, pp. 41-44.

Key Words:

control,

York,

NY,

Key Words:

Computer

book,

"The Impact of Current EDP Development on Separation

CQM-SAC.

of Duties,"

Computer

management.

World

Proc. IFIP/Sec '85, Dublin, Ireland, 12-15 August,

,

No.

2,

.

1985, North-Holland Elsevier

W. for

&

Key Words:

Viruses,"

Computers

Security

February 1989, pp.

,

Company, Amsterdam/New York, 1985 Publishing

proceedings,

general, international.

35-41.

GRI-89

Security, Auditing

Controls

The

Practical Issues in a Troubled

"A Mathematical Theory the Spread of Computer

Gilhooley, I.A.

Security:

contingency, recovery,

GLE-89

GIL-85

GRI-85 Grimson, J.B., H.J. Kugler (Eds.)

Gleissner,

&

New

PC,

software.

virus, techniques.

Advanced

Elsevier

1985, pp.

Key Words:

Grissonnanche,A. (Ed.)

virus, theory.

A7-A14.

Security Protection in

GOT-81

Information Systems

M.

Key Words: management,

Gottlieb,

methods.

"Audit Concerns About Minicomputers," EDPACS

GIL^86

,

Proceedings IFIP/Sec '86,

Monte

Carlo,

December 1986,

Oct. 1981, pp. 12-15.

North HoUand/Elsevier, Amsterdam, 1989.

Key Words:

Key Words:

,

Gilhooley, I.A. "Productivity and Control System Development,"

EDPACS

,

in

auditing,

methods.

July 1986, pp. 1-6.

GUA-87

GRE-81

Key Words:

control,

management.

GIL-86a

Greguras, P.M.

Guarro, S.B.

"DP Contingency Planning: The Legal Considerations,"

the

Assets Protection

,

May /June

1981, pp. 26-29.

Gilhooley, I.A.

"Principles and Procedures of

LRAM

,

Key Words:

contingency,

Approach

Analysis and Management,"

&

Security

December 1987,

,

pp. 493-504.

laws.

Key Words:

Key Words:

to

Information Systems Risk

Computers

"Controlling End-User

Computing," EDPACS October 1986, pp. 1-9.

proceedings,

general, international.

control,

management.

2-10

risk,

methods.

GUA-88

Key Words:

Guano, S.B.

HAR-80a

auditing,

methods.

Hardenburg, K.L. "Auditing the MVS Operating Systems," EDPACS June

"Analytical and Decision

Models of

the Livermore Risk Analysis Methodology," Proc. Comp. Sec. Risk

Manag. Model Builders Workshop 1988 (2: NBS.

HAL-88

.

Habne, L.R., and B.L. Kahn "Building a Security Monitor with Adaptive User Work

Key Words:

Profiles." Proc. 11th Natl.

techniques.

Comp.

88), pp. 49-71.

Sec. Conf. (5:

methods.

risk,

GUI-89

auditing,

techniques.

Guinier, D.

Design for Security, 2nd Ed. John Wiley & Sons, New

,

York. 1983.

"Biological Versus

&

HEA-83 Healy, R.J

Key Words:

Viruses,"

auditing,

NCS-

88), 1988, pp. 374-383.

Key Words:

1980, pp. 1-10.

ACM

Computer

Sec.,

Audit

Summer

HAM-82 Hammer, C.

Key Words: book, physical, methods, techniques.

1989. pp. 1-15.

"Managing Computer Security." Computer Security Journal Winter 1982, pp. 17-

Key Words:

21.

Heaton, Y.

Key Words: management,

Auditor's Point of View,"

Control Rev. ,

.

virus, general.

HEA-86 "The

GUS-88 M.E. "Personal Computer

methods.

Gustoff,

Security," Information

Age

,

Hansen, J.V. and

195-202.

W.F. Messier

Key Words: PC,

"Scheduling the Monitoring of EDP Controls in Online Systems," Intematl. Journal of

HAE-84 Haeckel, D.A., and

B.B. Johnson

Risks

- An

The Computer Law and Security Report, Sept.-Oct. 1986, pp. 21-23.

HAN-83

(U.K.), October 1988, pp.

techniques.

Human

Key Words:

risk,

persormel.

HEA-87 Hearden, K.

Computer and Information

A

Sciences, February 1983, pp. 35-46.

Security

Key Words:

Key Words: book, general, methods, guidelines,

Handbook of Computer Kogan Page. London, ,

1987.

"Complete the Cycle of Information Security

control, methods.

Planning," Security

Management May 1984, .

pp.

management.

HAN-83a

54-59.

Hansen, J.V.

Key Words: management,

Distributed Processing

Hebbard. B.,

methods.

Systems," Communications of

"A

"Audit Considerations in

the

HAH-88

ACM

,

August 1983, pp.

562-569.

Hahn, M. Proc. IFIP/Sec. '88 (2:

,

MVS,"

Australia,

Key Words:

auditing,

methods.

HAR-80

HAL-86

,

Henrion, M., and

M. G. Morgan, "A Computer Aid

1-24.

Van Home

Key Words:

control,

management.

(5:

Comp.

for Risk and Other Policy Analysis," Risk Analysis September 1985. pp. ,

195-208.

Key Words:

Trails for Security Purposes,"

Proc. 9th Natl.

HEN-85

January 1980, pp.

Halme, L.R., and

"Automated Analysis of Computer System Audit

vulneabilities,

Activities,"

Programming

EDPACS

20.

threats.

Hardenburg, K.L. "Controlling Systems

auditing,

methods.

Conf.

Michigan Terminal System," ACM Operating Systems Review January 1980, pp. 7-

Key Words:

CAE-89), pp. 407-

Key Words:

J.

et al.

Penetration Analysis of the

,

"Auditing Changes to 1989, 424.

HEB-80

risk,

policy, methods.

Sec.

NCS-86), 1986, pp.

71-74.

2-11

management,

HER-84

HIG-85

HIG-88C

and R. Paans "The Programmer's Threat: Cases and Causes," Computers & Security

"Microcomputer Security: Data Protection Techniques," Computers & Security June

Fantasy," Computers

November 1984,

1985, pp. 123-134.

367-370.

Key Words: PC,

Key Words:

Herschberg,

I.S.

,

Key Words:

pp. 263-272.

threats,

Highland, H.J.

,

techniques.

Highland, H.J. "The Brain Virus: Fact and Security

,

&

August 1988, pp.

virus, techniques.

persoimel, management.

HIG-87 HIG-83

HIG-89

Highland, H.J.

Highland, H.J. "The Mibiet/Arpanet Attack,"

Highland, H.J. "Impact of Microcomputers on Total Computer Security,"

"Data Physician - A Virus Protection Program,"

Computers

Computers

February 1989, pp. 3-10.

Proc. IFIP/Sec. '83 ,

February 1987, pp. 73-79.

Stockholm, 1983, 83), pp. 119-129.

(2:

FAK-

&

Security

,

&

Key Words: Key Words:

Security .

virus, techniques.

virus, techniques.

HIG-89a

Key Words: PC,

techniques,

management.

HIG-87a

Highland, H.J. "A Macro Virus" Computers Security May 1989, pp. 178-

Highland, H.J.

"How HIG-83a Highland, H.J.

"Impact of Microcomputers

to

Evaluate

Microcomputer Encryption Software and Hardware," Computers & Security June ,

on Total Computer Security," Computers & Security June

1987, pp. 229-244.

1983, pp. 171-183.

Key Words: PC,

techniques,

management.

cryptography.

"Operational Security for

Security April 1988, pp. 122.

Microcomputers," Proceedings, 1983

Key Words:

CQMPCON Computer

Fall ,

,

,

1

369-373. 17-

virus, techniques.

IEEE

virus, techniques.

techniques.

HIG-84

April 1989, pp. 91-94.

'The Anatomy of a Virus Security

Highland, H.J. "Data Protection in a Microcomputer Environment,"

,

&

Key Words: HIG-89d

150.

Highland, H.J.

Key Words:

virus, techniques.

"Anatomy of Three Computer Virus Attacks," Computers

HIG-88b

Security

,

&

October 1989, pp.

461-466.

Highland, H.J.

531.

virus, techniques.

April 1988, pp. 145-

Proc. IFIP/Sec. '84 . Toronto,

FIN-85), pp. 517-

Highland, H.J. Virus,"

Attack," Computers

(2:

Key Words:

'The ItaUan or Ping-Pong Computers & Security

HIG-88a Highland, H.J.

1984,

Highland, H.J.

HIG-89C

Society, 1983.

Key Words: PC,

virus, techniques.

Revisited,"

"Computer Viruses: A Post Mortem," Computers &

Highland, H.J.

Key Words:

"The Marijuana Virus Computers & Security August 1989, pp.

HIG-88 Highland, H.J.

HIG-83b

182.

HIG-89b

,

Key Words: PC,

&

,

"An Overview of 18 Virus

Key Words: PC,

techniques.

HIG-84a

Key Words:

Protection Programs,"

Computers

&

Security

,

virus, techniques.

April

1988, pp. 157-163.

HIG-89e Highland, H.J.

Highland, H.J.

Your Microcomputer System J. Wiley & Sons, New York, Protecting

Key Words:

virus, techniques.

"Secure File Storage and Transfer," Computers

,

Security

,

466-474.

1984.

Key Words: book, PC,

Key Words:

techniques.

techniques.

2-12

&

October 1989, pp.

database,

,

HIR-89

fflG-89f Highland, H.J. "Secret Disk



11

&

Administrator," Computers Seciirity ,

HOF-86a

Hirst,

November 1989,

pp.

563-568.

Hoffman,

J.

"Rotten to the Core: Bombs, Trojans. Worms, and Viruses,"

New

Scientist,

March

4,

1989,

pp. 40-41.

Key Words:

Key Words:

virus,

Key Words:

HOA-82

Handbook

Elsevier

,

Technology,

New

"Controls and Risk in Data

Hoffman,

The Bankers Magazine May/June 1982, pp.

"A Prototype Implementation

Processing,"

Advanced

York,

NY,

,

49-52.

Key Words:

Key Words: book, virus, methods, techniques,

HIG-89h

HJ.

"Datacrime Virus and Anti -Virus Products,"

&

Computers

Security

December 1989.

management.

New

Key Words:

Hoebeke. L. "Computer Security — Prevention: Lessons from the Operation of a Nuclear Power Plant," Computers & Security June 1986, pp. 122-127. .

.

Key Words:

pp. 659-661.

virus,

Security

.

December 1989,

Key Words: risk, PC, management, techniques, L.J.,

and

methods.

L.A. Neitzel "Inexact Analysis of Risk,"

Computer Security Journal

.

Spring 1981. pp. 61-72.

pp. 669-674.

Key Words: Key Words:

risk,

techniques.

HOF-85

and K. Jackson

Hniska,

J.,

The PC

Security Guide 88/89

Elsevier

Advanced Technology,

New

York,

NY.

HI 1^83

"A Survey:

J.

Security and Private

July 1983, pp.

76.

18-1-.

contingency,

recovery.

Practices."

Journal

.

Winter 1985. pp. 69-

(Eds.),

York, 1988.

Key Words: book, general, methods, techniques,

management.

guidelines.

IBM-84 Good

L.J.

Computerworld, March 26.

Computer Security Risk Analysis: Problems and

1984. pp. ID/9-16.

Issues

Disaster,"

al.,

Computer Security Handbook McMillan Pubhshing Co.. New

Key Words: methods,

Hoffman,

Hiller, E.

Hutt. A.E.. et

.

Computer Security

HOF-86

HIL-84

guidelines.

HUT-88

Office Automation

"Records Retention: Management's Involvement is Critical," Data Management,

,

Security Practices for

Dial-Up Systems G320-0690,

0,

GWU-nST-86-04. The

IBM

Plains,

Corporation, White

NY, March

1984.

George Washington

Key Words: recovery.

.

1988.

Key Words: PC,

Hoffman, L.J., and A.F. Westin

Key Words:

HRU-88

virus,

techniques.

Hildebrand.

Hoffman, L.J. "Smoking Out the Bad Actors: Risk Analysis in the Age of Microcomputer," Computers & Security June 1989, pp. 299-

management.

Hoffman,

"VCHECKER - A Virus Search Program," Computers

HOF-89

,

HOF-81 Highland, H.J.

risk, techniques.

302.

techniques.

HIG-89i

.

NBS-88), pp. 135-

(2:

144.

Key Words: methods,

"Up from

of a General Risk Model," Proc. Comp. Sec. Risk Manag.

1988

risk,

HOE-86

guidelines.

&

L.J.

Model Builders Workshop

1989.

Highland.

management.

risk,

HOF-88

Hoar, T.

Highland, H.J.. (Ed.) The Computer Virus

Gap," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86). 1986, pp. 156-161.

virus, threats.

techniques.

HIG-89g

L.J.

"Risk Analysis and Computer Security: Bridging the Cultural

contingency,

University. Washington,

March 1986.

Key Words: risk, management.

2-13

DC,

Key Words: methods.

techniques,

IBM-84a Good

JAE-84

ISA-83 Security Practices for ,

IBM

Corporation,

White

Plains,

NY, March

Jaehne, E.M.

"A Guide

"Security and Productivity," Proc. IFIP/Sec. '84 Toronto,

Commercial BackupServices," Computer

Personal Computers G320-

9280-0,

Isaacson, G.I. to

Security Journal

.

Spring 1983,

pp. 51-69.

1984.

Key Words: PC,

(2:

FlN-85). pp. 107-

111.

Key Words:

techniques.

.

1984.

Key Words: management,

contingency,

methods.

recovery.

IBM-85 Information Systems Security

Executive Checklist, GX202430, IBM Corporation, White Plains, NY, 1985.

:

JAN-81

JAC-81

Jancura, E.G.. and R.

"Analyzing the Limits of

Establishing Controls and

Government Data Systems Nov. -Dec, 1981. pp. 28-29.

Auditing the Computerized Accounting System Van Nostrand, New York, 1981.

Key Words: risk, management.

Key Words: book, auditing, methods, management.

Risk,"

,

Key Words:

guidelines,

Boos

Jacobson, R.V.

.

methods.

IBM-86 Control Planning for Catastrophic Events in Data Processing Centers G320,

IBM

6729,

White

Corporation,

NY,

Plains,

Key Words:

JAR-83

JAC-81 a

Jarvis,

"Optimizing Disaster Recovery

"Designing Security into the Computer Environment," Assets Protection March/April

Planning," Proceedings,

1986.

Honeywell Computer Security and Privacy Symposium April

contingency,

,

recovery, management.

M.

Jacobson, R.V.

.

1983, pp. 9-12.

1981. pp. 95-100.

Key Words: management, IEE-87

COMPASS

Proceedings.

Key Words: contingency, '87:

Computer Assurance Washington. DC, June 1987,

methods.

recovery.

JOH-80

,

IEEE

New

JAC-86

Johnson, K.P. and

Jackson. C.B.

Publishing Service.

"Making Time

York, 1987.

for

Analysis." Security

Key Words:

March 1986.

proceedings,

DP

Risk

World

.

pp. 68-70.

general.

Key Words: IEE-88

COMPASS

Proceedings.

Computer Assurance

Key Words: book,

'88:

control,

methods.

JAC-86a

.

June 1988, IEEE PubUshing Service. New York, 1988.

Key Words:

.

risk,

management.

MD,

Gaithersburg,

R.H. Jaenicke Evaluating Internal Control: Concepts, Guidelines, E)ocumentation J. Wiley & Sons. New York, 1980.

proceedings,

JOH-83a

Jackson, C.B.

"Dau

Processing Risk

"Auditing

Unnecessary?" ISSA Newsletter July/August/ September 1986, pp. 6-8.

Software."

,

general.

Johnson. T.W.

Analysis: Beneficial or

DOSA'SE System EDPACS January ,

1983, pp. 1-14.

Key Words: IEE-89

COMPASS

Proceedings.

Key Words: '89:

risk,

JOH-88

management.

4th Annual Conference on

Computer Assurance. Gaithersburg,

1989,

IEEE

Service.

MD.

June

Publishing

New

York, 1989.

Johnson, H.L., and J.D. Layne

JAC-88

"IST/RAMP and CRITICALC: Risk Managemnt Tools," Proc.

Key Words: general.

proceedings,

"Modeling Security Risk in Networks," Proc. 11th Natl.

Jacobson, R.V.

Comp.

,

pp. 73-87.

Key Words:

risk, techniques,

2-14

Sec.

Conf

.

(5:

88), 1988, pp. 59-64.

Sec. Risk

Manag. Model Builders Workshop 1988 (2: NBS-88),

methods.

Comp.

Key Words:

NCS-

KAR-88

JOH-88a Johnson, H.L.

KOC-84

Karrent, D.T.

"Security Protection

Based on

Koch. H.S. "Auditing On-Line Syitems:

'Typical System Access

Mission Criticality," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 228-

Control Problems and Solutions," Information Aec (U.K.), January 1989, pp.

An

232.

41045.

Security. February 1984. pp. 9-

Evaluation of Paraileil v>. Continuous and Intermittent Simulation,''

A

Compulert

20,

Key Words:

Key Words:

risk,

KEA-86

JOS-88 Josej^ M.K., and Avizienis

"A Fault-TolCTance Approach to

Computer Viruses," Proc.

1988 IEEE Svmp. on Sec. Privacy .

(5:

Key Words:

methods.

requirements.

AA.

guidelines,

&

IEE-88a). pp. 52-

auditing, methnds.

KRA-80

Kearby, D.B. "Personnel Policies Procedures and Practices: Key to

SAFE:

Computer

Facilities

Security,"

Computer

Krauss. L.I. Security Audit and

Field Evaluation for Comnrpater

Security Journal . Vol. 4, No. 1. pp. 63-68, 1986.

Systems. 1980.

Key Words: policy, personnel, management, methods.

methods.

and Information

Amacom, New

York,

58.

Key Words:

virus,

Key Words:

book, auditing,

techniques.

KUH-86

KEE-88 JUD-87

Keenan, T. "Emerging Vulnerabilities in Office Automation Security,"

Judd, T.C., and

H.W. Ward,

Jr.

Stockholm, 1983,

Contingency Planning."

Proc. 10th Natl.

Comp.

(2:

FAK-

.

Key Words:

vulnerabilities.

Key Words: Kinnon, A., and R.H. Davis "Audit and Security Implications of Electronic

JUI-89

Fimds Transfer," Computers

D.

Through System Management," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS089), 1989. pp. 418"Security Assurance

Security,

March 1986,

KUO-82 Kuong,

&

pp. 17-

23.

Key Words:

J.F.

Audit and Control of Computerized Systems, Management Advisory Publications, Wellesley

MA,

,

Hills,

1983.

auditing,

Key Words: book,

requirements.

422.

auditing, methods.

KIN-86

contingency,

recovery, management.

Juitt,

(5:

204-208

Conf.. (5: NCS-87a). 1987, pp. 379-383.

Key Words:

Comp. Sec. NCS-86A 1986. pp.

Proc. 9th Natl.

Conf

83), pp. 139-145.

Sec.

J.

"Research Toward Intrusion Detection Through Automated Abstraction of Audit Data,'

Proc. IFIP/Sec. '83 ,

"Return to Normalcy: Issues in

Kuhn.

auditing,

control

KNE-83

Key Words: methods,

Kneeer, D.C., and J.C.

management.

Lampe

"Distributed Data Processing:

KAR-85 Karabin.

Internal Control Issues

Safeguards,"

S.J.

"Data Classification for

EDPACS

.

and June

.

1985.

pp. 1-20.

Key Words: management.

J.F.

Line/Database Systems,

Management Advisory

Key Words:

MA,

Publications, Wellesley Hills, control, methods.

1983.

Key Words: book,

KOB-89 guidelines,

Kuong,

Controls for Advanced/On-

1983. pp. 1-14.

Security and Control."

EDPACS December

KUO-83

Kobus. P. Jr., and G.H. Rovin "C -Guard Computer Security Systems." Information Age, (U.K.), January 1989, pp. 4145.

Key Words:

policy,

techniques.

2-15

general.

concrol,

KUO-86b

KUO-85 Kuong, J.F. "What to Look for

When

Auditing Your Company's EDP Contingency and Recovery Plan for Business Continuity,"

LAN-85

Kuong,

COM-AND.

Computer Audit News & Developments September-

Lane, V., and

J.F.

"What Are

EDP

Audit Test

How to Them," COM-AND,

Objectives, and

Develop

If

Not

1986.

1984,

,

,

FIN-85), pp. 361-

(2:

369.

Key Words:

auditing, policy,

Key Words:

contingency,

recovery, management.

auditing,

guidelines, contingency,

KUO-86C Kuong,

recovery.

KUO-85a Kuong,

-

-

Developments July -August,

methods, management.

Key Words:

Insurmountable

Organizational Problems in Disaster Recovery Planning," Proc. IFIP/Sec. '84 Toronto.

&

Computer Audit News

,

October, 1985.

Step

J.

"The Formidable

LAP-86

J.F.

"Pinpointing Areas of High

Lapid, Y., N. Ahituv,

Exposure for Effective

and S. Neumann "Approaches to Handling Trojan Horse' Threats," Computers & Security September 1986. pp. 251-256.

COM-SAC,

Safeguards,"

J.F.

"Evolution of Information

Computer

Security, Auditing

Processing Technology, and

&

Controls,

Deficiencies in the Present

1,

1986, pp. A1-A4.

Volume

No.

13,

.

Internal Control

Methodologies," Computer Audit

COM-AND,

Key Words:

News

vulnerabihties, methods,

&

Developments NovemberDecember, 1985. ,

Key Words:

risk,

management.

LEC-83

KUO-88 Key Words:

control, methods.

KUO-86 Kuong, J.F. "Reducing Your Audit Risk Level and Improving Audit Option Reliability when Auditing Computer Based Systems,"

COM-AND,

Computer Audit News & Developments January-

Lechter,

Kuong, J.F. "Computer Viruses: Should the Audit and Security Professional

Be Concerned?,"

COM-AND, Computer

,

3, 1988, pp. 1-4.

Key Words:

Key Words:

virus, auditing,

methods.

KUO-86a Kuong, J.F. 'Towards a Unified View to the Building and Assessing of Internal Control in Computerized Systems," COM-AND, Computer Audit

News

&

Developments

,

March-April, 1986.

Key Words:

control, policy.

Firmware Development," IEEE Computer September 1983, ,

pp. 73-82.

Key Words: methods, management. LEE-88 Lee,

threats.

W.

"Automation of Internal

KUO-89

auditing, risk,

M.A.

"Protecting Software and

Audit

News and Developments No.

,

February, 1986.

threats,

techniques.

Kuong, J.F. 'Test Approaches and Techniques for Testing EDP Disaster Recovery Provisions," COM-AND. Computer Audit News and Developments No.

Control Evaluation," Proc. IFIP/Sec. '88 AustraUa, 1989, ,

(2:

CAE-89), pp. 391-406.

Key Words: control, management.

,

2,

Lrr-81

1989, pp. 1-7.

Litecky, C.R., and

Key Words:

contingency,

recovery, management.

L.E. Rittenberg

"The External Auditor's

Review of Computer Controls," Communications of

KUR-86

ACM May

Kurzban, S.A.

the

"Computer System Defenses"

295.

ACM

Security, Audit

Control Rev.

,

&

Winter 1986,

pp. 1-27.

Key Words: methods, techniques.

2-16

.

Key Words:

1981, pp. 289-

auditing, controls.

MAR-84

LOB-80 Lobel

Mar,

J.

"Risk Analysis in the 1980s," Proceedings, 1980 National Computer Conference, AFIPS Press, Reston,

VA,

1980, pp.

MEN-85a Menkus, B. "The Impacts of the Bell System Breakup on DP Disaster Recovery Planning," Computers & Security September 1985. pp. 219-222.

S.

"EDP Security & EDP Audit Team Work," COM-SAC. Computer

Security, Auditing and Control January 1984, ,

,

A1-A4.

831-836.

pp.

Key Words: risk, management.

methods.

Key Words:

Key Words:

auditing,

MAU-84

LOB-89

contingency,

recovery, management.

MEY-83

Lobel J. "Managing Information

Maude, T., and D. Maude "Hardware Protection Against

Meyer, M.M. "Checking References:

Security in the Space Age,"

Software Piracy,"

Worth

September 1989, pp. 195-198.

Communications of the ACM September 1984, pp. 950-959.

Key Words: management,

Key Words:

Age

Information

(U.K.),

,

software piracy.

It's

the Investment,"

Management, March

Security

1983, pp.

10-I-.

Key Words:

persormel,

methods, management.

policy.

MAY-87 LOT-80

Mayerfield. H.N., et

Lott,

Auditing the Data Processing Functions Amacom, New York, 1980. ,

Key Words:

MIC-83

al.

"M2 RX: Model Based

R.W.

Risk

Assessment Expert." AIAA No. 87-3080, Proc. 3d

"Microcomputers: A Checklist of Security and Recovery Considerations," Assets

Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 87-92.

Protection

Key Words: risk, management.

Key Words:

Aerosp.

May/June 1983, pp.

,

15-16.

auditing,

methods.

LUN-89

guidelines, PC,

MIG-87

MCA-89

Lunt, T.F.

"Real

Time

Detection," Proceedings,

IEEE Compcon

Spring

1989,

,

Migues,

McAfee, J.D. "Managing the Virus Threat,"

Intrusion

pp. 348-353.

Computerworld, February 13, 1989. pp. 89-96.

S.

"A Guide

to Effective

Risk

Management," AIAA No. 873078, Proc. 3d Aerospace Comp. Sec. Conf (5: lEE.

87b), 1987. pp. 66-86.

Key Words: virus, management.

Key Words: methods, techniques.

threats,

MCC-85

MAL-83

McCormack, W.G..

Malvik, C. "Security and the

Home

"The Audit of

EDP

Key Words:

m Backup."

EDPACS November

Computer," Information Age (UK), April 1983, pp. 87-90.

pp. 1-5.

Key Words:

Key Words:

.

1985,

MIL-85 Miller. J.E.

'Transaction Controls: Steps to

Take After the Equipment Has Been Secured," Computers & Security

requirements,

PC.

,

June 1985, pp. 139-

141.

auditing,

contingency.

Key Words:

MAR-83

MEN-85

Mar,

S.

"Long Range Plaiming

EDP

Audits,"

Computer

for

COM-SAC:

Security, Auditing,

and Control January 1983, ,

pp.

risk, guidelines.

Menkus, B. 'The EDP Auditor's Role in Computer Security," Computers & Security June

auditing,

MOE-88 MoeUer, R.

1985. pp. 135-138.

"Considering Security when Auditing Applications Under Development," Proc. IFIP/Sec.

Key Words:

:88, Australia, 1989, (2:

.

A1-A8.

Key Words:

control,

guidelines.

auditing,

CAE-

89), pp. 245-262.

methods.

management.

Key Words:

2-17

auditing, methods.

MUR-81

MOL-84

NAN-86

Molnar, L.

Murray,

"Disaster Recovery Testing,"

"Protecting Corporate Data

"Auditing

EDPACS November

with Off-Site Vault Storage,"

Security,"

Computerworld. March

1986, pp. 1-10.

.

1984,

pp. 1-6.

Nancekivell, B.D.

J.P.

16,

IBM System/38 EDPACS January ,

1981, pp. ID/l-ID/24.

Key Words:

Key Words:

contingency,

Key Words:

recovery.

NBS-81

recovery.

MOR-81

auditing, methods.

contingency,

ADP

Guidelines for

MUR-82

Morrison, R.M.

"Advanced Audit Concepts

A

for

Distributed System,"

Proceedings. Honeywell Security and Privacy

Symposium, April 1981, pp. 119-127.

Contingency Planning FIPS PUB 87, National Bureau of .

Murray, J.P. "Contingency Planning," Computerworld. May 10, 1982, pp. ID/36-ID/44.

Standards. Gaithersburg.

Key Words: Key Words:

contingency,

MD,

27 March 1981. contingency,

recovery, guidelines.

recovery.

Key Words:

NBS-83

auditing,

MUR-83

methods.

MOU-84 Moulton, R.T. "Data Security

Management

&

Computers

Is

Guidelines for Life Cycle

Murray, W.H.

Validation, Verification and

"Good Computer Security

Testing of Computer Software

Two

Practices for

A

Areas of

Current Concern: Personal

Responsibility,"

Security ,

February 1984, pp. 3-8.

Computers and Dial-Up Systems," Computer Security Journal

,

Fall/Winter 1983, pp.

77-88.

FIPS PUB 101, National Bureau of Standards,

MD,

Gaithersburg,

Key Words:

1983.

guidelines,

software.

Key Words: management, Key Words:

policy.

techniques,

MOU-84a

Security Certification and

MUR-83a

Moulton, R.T.

"A

NBS-83a Guidelines for Computer

methods, PC.

Practical

Approach

to

Accreditation

.

"Computer Security:

Gaithersburg,

Observations on the State of

27, 1983.

1984, pp. 93-100.

the Technology."

Key Words:

&

techniques,

PUB

102,

National Bureau of Standards,

System Security Devices," Computers & Security May ,

FIPS

Murray. W.H.

Security

,

MD,

September

Computers

January 1983, pp.

Key Words:

guidelines,

methods, certification.

16-23.

methods.

Key Words:

MOU-86

techniques,

Security Risk Management Model Builders Workshop

Moulton, R.T.

Computer Security Handbook: and Techniques for Preventing Data Loss or

MUR-84

,

Strategies

Murray,

Theft, Prentice-Hall, Inc.

"Surviving (and Profiting from) the Audit: Manager's View," Computerworld,

Englewood

Cliffs,

NJ, 1985

Key Words:

book, guidelines, techniques, methods.

J.P.

September 24. 1984, pp.

EDPACS

.

October 1980, pp.

1-6.

1988

Key Words:

proceedings, risk.

Nesbit, I.S.

"On Thin

management. Security Practices,"

26,

NES-85 auditing,

Murray, W.H.

"Good

National Bureau of Standards et al., Denver, CO, May 24-

ID/13-23.

Key Words:

MUR-80

NBS-88 Proceedings, 1988 Computer

methods.

Data

MUR-84a

Ice:

Micros and Datamation

Integrity."

November

1,

Murray, W.H. "Security Considerations for

Personal Computers,"

IBM

Key Words: methods,

Systems Journal Vol. 23. No.

techniques.

3,

.

1983. pp. 297-304.

Key Words:

requirements. PC.

2-18

Key Words:

.

1985. pp. 80-84. integrity,

PC.

,

NEU-82

PAS-86

Neugent, W. "Acceptance Criteria for

PER-81

Proceedings, 1982 National

A. "Contingency Planning Options Protect Corporate Data Assets," Computerworld.

Computer Conference. AFIPS

January 27. 1986. pp. 73-74.

Computer

Passori,

Security,"

Press, Reston,

VA,

EDP Security EDPACS April

"Optimizing the Function,"

,

1981, pp. 1-11.

Key Words: management,

1982, pp.

Key Words:

441-448.

Perley. E.H.

contingency,

policy.

recovery, management,

Key Words:

PER-81 a

methods.

guidelines,

Perry, W.E. Computer Control and Security J. Wiley & Sons,

methods.

PED-86

NOL-85 Nolan,

Pedigo,

M.

J.

,

Making Plans That Could Save Your Company." Computerworld, "Disaster Recovery:

"Disaster Recovery for

Online Systems," Proc. IFIP/Sec. '84 Toronto. 1984, (2: FIN-85), pp. 163-174. ,

May

contingency,

Perry,

Perry,

W.E.

"Computer Security:

Environment, Q.E.D.

Operational or Investment

Information Systems.

Cost," Proc. IFIP/Sec. '88 .

WeUesley

MA.

Hills.

1982, pp. 17 26.

Key Words: control, management.

1980.

CAE-89).

Key Words:

pp. 381-390.

PER-82a

book, control,

EDP

Key Words: management, PER-80a

methods.

Perry,

How

OTW-89 Otwell. K.. and B. Aldridge

"The Role of Vulnerability in Risk Management," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989. pp. 32-38. ,

Controls,

W.E. to

Test Internal Control

and Integrity in Computerized Systems Management Advisory Publications, ,

Wellesley

MA.

Hills.

ADP

Audit Areas

.

Auditors Foundation. Altamonte Springs. FL. 1980.

,

Publishing Co., Reston,

Key Words:

auditing,

guidelines.

Key Words: book,

risk,

PER-80C Management Guide Computer Security

management.

PAR-84

,

&

DB.

Parker.

"Safeguard Selection Principles."

Security

.

Computers

May

&

1984, pp. 81-

Sons,

New

to J.

Wiley

York. 1980.

Key Words: book, methods.

92.

Key Words:

Kuong

Effective

Computer Audit

Practices

- ECAP MAnual

MA.

.

1982.

Key Words: book, methods.

VA,

1981.

risk,

controls.

Publications, Wellesley Hills,

W.E.

EDP

Management Reston

Key Words: book,

1982.

Management Advisory

Selecting

Computer Security

MA.

Perry, W.E.. and J.F.

integrity.

Perry.

DB.

Hills,

PER-82b control,

PER-80b Parker,

WeUesley

1980.

risk.

PAR-81

Management

Advisory Publications,

Key Words: book, vulnerabilities,

W.E. and J.F. Kuong Risk Analysis and

Perry,

database.

Key Words:

W.E.

.

Controls in Data Base

Australia, 1989. (2:

control,

"Developing Computer Security and Control Strategy," Computers & Security January

PER-80 Orlandi, E.

Key Words: book,

PER-82

contingency,

recovery, management.

revovery.

ORL-88

York, 1981.

methods.

12. 1986. pp. 49-60.

Key Words:

Key Words:

New

guidelines,

methods.

2-19

guidelines,

auditing,

PRA-85

PER-82C and

Perry, W.E.,

J.F.

Kuong

Generalized Computer Audit Software: Selection and Application.

Management

Advisory Publications, Wellesley Hills. MA, 1982.

QUA-89

Prause. P.N.. and

Quant. H.

G.I. Isaacson

"Virus vs. Vaccine." Information Age . April 1989, pp. 138-143.

"Protecting Personal

Computers: A Checklist Approach." Computer Security Journal Winter 1985, pp. 13,

Key Words:

virus, techniques.

24.

Key Words: book,

How

Key Words: PRE-89

PER-82d Perry,

RAO-89

auditing,

software, guidelines, methods.

W.E. and

J.F.

Kuong

Test Internal Control

to

guidelines, PC.

Rao. K.N. "Security Audit for Embedded Avionics Systems." Proc. 5th

CM.

Preston,

Applied

Security Applicat. Conf. (4: IEE-89c), 1989, pp. 78-84.

Age

Key Words:

.

"Artificial inteUigence

and Integrity in Computerized Systems Management Advisory Publications, Wellesley Hills. MA, 1982.

217-221.

Key Words: book,

Key Words: methods,

"Security Controls in a

techniques.

Manufacturing AppUcations System." TeleSystems Journal March/April 1984, pp. 33-37.

,

to

Information System

Security." Information

RAT-84 Rattner.

control,

guidelines.

PER-83 Perry,

PRI-80

W.E.

Prichard,

Ensuring Data Base Integrity , J. Wiley & Sons, New York,

Key Words:

Key Words:

EDP Threat Assessment Concepts and Planning Guide SIP No.2, Royal Canadian Mounted Police. Ottawa, January 1982.

f)ersormel,

management.

PHE-86 'Top Management's Role Disaster Recovery," Data

in

&

Prigge, E.

Key Words:

"Security and Integrity Issues

threats, risk.

in

Communications Security

Summer

&

Security, Auditing

Controls

,

October 1984, pp.

A7-I-.

Key Words:

management.

requirements, integrity.

"EDP

awareness,

W.V.

Management

EDPACS

,

--

Yestingsmeier

A

Function,"

February 1984. pp.

Management -

A

to Security in Electronic

Key Funds

Transfer Systems," Computers

&

Security 135-140.

PRU-86 Benefits Control

Richards, R.M., and

"Risk

recovery, policy,

Pickard,

RIC-86 J.

contingency,

PIC-84

book, guidelines,

End-User Computing,"

Computer

,

1986, pp. 16-19.

Key Words:

,

PRI-84

Phelps, N.L.

Processing

controls, methods.

RCM-82

March 1980.

integrity,

methods.

.

Unionization," Information pp. 69-74.

Key Words: book,

J.

J.

"Computer Security and Privacy (UK),

1983.

auditing, methods.

(U.K.). September 1989. pp.

,

June 1986, pp.

Pryijm, R.A.M.

"The Audit of Software Maintenance," EDPACS

August 1986, pp.

Key Words:

risk,

management,

methods.

,

1-5.

RID-86

1-5.

Key Words: Key Words:

control,

software.

management, policy.

PWA-84 POR-81 and W.E. Perry EDP Controls and Auditing, 3d Ed. Kent Publishing, Porter, W.T.,

Managing Computer Risks: Guide for the Policymaker,

MA,

threats,

Key Words: book,

auditing,

,

1986, pp. A5-A6.

Key Words: book,

1981.

A

Price Waterhouse, Inc., 1984.

,

Boston,

C, and J. Austin "Updating Security, Auditing and Quality Assurance — The Dedicated On-Line Computer Security Monitor." COM-SAC. Computer Security, Auditing & Controls Volume 13, No. 1, Riddle.

auditing,

risk,

magagement,

guidelines.

methods, control, techiuques.

2-20

Key Words:

auditing, methods.

RUT-84

ROB-83 M.B.

Roberts,

EDP EDP

A

Guide for Auditors and Accountants J. Wiley & Controls:

,

Sons,

New

SCH-80

Ruthberg. Z.G., and

York. 1983.

Key Words: book,

"Policy Structure Gives the

Overview of Computer Security Certification and

Basis for

Accreditation .

auditing.

Schweitzer. J.A.

W. Neugent

SP 500-109,

"Auditor's

Computer Fraud," Commercial Law Journal

May

in

,

1984.

Key Words: policy, management. certification,

SCH-80a

methods.

Schweitzer, J.A.

RUT-86

.

1981. pp. 172-178.

Key Words:

Management December 1980, pp. 18-25.

Key Words:

Watchdog Role

Effective Security

National Bureau of Standards, Gaithersburg, MD, April

ROD-81 Rodgers, G.L.

An

Program," Security

"Personal Computing and Data

Ruthberg, Z.. and B. Fisher (Eds.)

Work

Security." Security World, June

1980. pp. 30-35.

Scheme for EDP Audit and Computer

auditing, crime.

RUB-85

Priority

Rubin, H. "Patient Auditing with Potent Results," Security Audit Control Review, Winter

&

NBSIR

86-3386, National Bureau of Standards, Gaithersburg, MD, March 1986. Security

PC.

guidelines,

SCH-81 Schweitzer, J.A.

"Computing Security Risk Analysis

Key Words:

1985, pp. 4-9.

Key Words:

Security

~ Is It Worth It?." Management, August

1981. pp. 104-106.

Key Words:

SAA-89

auditing,

methods.

RUL-80 RuUo, T.A. (Ed.) Advances in Computer Security Management, Vol.

Heyden

&

and D.B. Parker

Saari,

J.,

"New

Baseline Methodology

Applied to Reviewing Security Experiences from USA and

Age

Finland," Information 1,

Son. Philadelphia,

(U.K.), September 1989. pp.

195-198.

SAR-81 Sardinas, J.L.,

Ruthberg, Z.G. (Ed.) Audit and Evaluation of

EDP

Computer Security

1981.

11:

System

Jr.,

.

Wiley

&

Sons.

New

J.

York,

MD,

April

Key Words: book,

auditing.

SCH-82a Schmitt,

W.R.

Computer Security Journal

,

SAR-82 Sardinas, J.L., and

proceedings,

1982.

Winter 1982, pp. 23-29.

R.J.

auditing.

.

"Data Security Program Development: An Overview,"

National Bureau of Standards, 1980.

Age

Wobum, MA,

et al.

Auditing Primer .

Vulnerabilities and Controls

Workshop Report SP 500-57,

Key Words:

Schweitzer, J.A.

Managing Information Security - A Program for the

Key Words: book, policy, management, methods.

management.

RUT-80

management.

Electronic Information

Key Words: awareness, methods, international.

Key Words: book,

risk,

SCH-82

Butterworth.

1980.

Gaithersburg,

Key Words:

Asebrook

"Bridging the

DP

Gap Between

Professionals and

Auditors," Journal

,

Key Words: policy, management.

Computer Security

Winter 1982. pp. 91-

SCH-83 Schweitzer,

J. A.

Protecting Information in the Electronic Workplace:

97.

to the

Key Words:

auditing,

A

Guide

Managers Reston ,

Publish.. Reston,

VA,

1983.

persoimel.

Key Words: book, guidelines, methods, management.

2-21

SKU-84

SCH-83a Backup Data Mangement

Lackner "The Implementation of Concurrent Audit Techniques

"Evaluating Services,"

SOC-83

Skundra, V.J., and

Schmidt, P.

F.J.

,

July 1983, pp. 30+.

in

Key Words:

Advanced

EDPACS

contingency,

recovery.

April 1984, pp. 1-

,

Key Words:

auditing, methods,

SRI-81

auditing,

Srinivasan, C.A., and

techniques.

"Personal Workstation

P.E. Dascher

Automation Security Vulnerabilities," Computers

&

Security , February 1984, pp.

21-28.

Key Words:

pp. 5-15.

PC.

Key Words: JA.

December 1983,

Systems,"

10.

SCH-84 Schweitzer,

EDP

Socha, W.J. "The Auditor's Own Microcomputer," EDPACS,

vulnerabilities,

PC.

SMI-80

"Computer Security and Problems and

Smith, J.E.

Integrity:

"Risk Management for Small Computer Installations," in RuUo, T.A. (Ed.), Advances in Computer Security Management, Vol. 1 Heyden,

Prospects," Infosystems

integrity, requirements,

Philadelphia, 1980, pp. 3-32.

methods.

,

,

May

1981, pp. 116-123.

Key Words:

awareness,

SHA-82 Shaw,

J.K., and S.W. Katzke Executive Guide to ADP Contingency Planning , SP

500-85, National Bureau of Standards, Gaithersburg,

MD,

January 1982.

Key Words: risk, management, methods.

contingency,

St.Clair, L.

Computer

"Security for Small

SNO-84

EDPACS November

Systems,"

Snow, M. 'The First-Time

EDPACS Key Words:

STC-83

,

EDP

,

1983. pp. 1-10. Audit,"

February 1984, pp.

6-8.

Key Words: awareness, methods, PC.

guidelines, recovery,

Key Words:

management.

STE-84

auditing,

Steinauer, D.D.

guidelines.

SIL-83

SNO-87

Silverman, M.E.

"Contingency Planning: The Backup Site Decision," Computer Security Journal ,

Spring 1983, pp. 43-50.

Snow, D., and

R.J. Aguilar

"A Mission Driven Process for the Risk Management of

ADP

Systems,"

AIAA

contingency,

recovery, management,

Comp.

Sec.

Conf

.,

(5:

lEE-

Summer

1984, pp. 33-

Key Words: awareness, PC, methods, requirements, policy.

87b), 1987, pp. 184-154.

STO-80

methods.

Key Words: SIZ-89 Sizer, R.

"Computer Security — A Pragmatic Approach for Managers," Information Age (U.K.) January 1989, pp. 88,

management, techniques,

"How

methods.

Software,"

to

Audit Libray Control

EDPACS. May

1980, pp. 1-10.

SOB-84 Sobol, M.I.

Key Words:

"Data Communications Primer

guidelines.

EDPACS

March 1984,

pp. 1-5.

Key Words:

auditing,

policy,

guidelines.

Stokel, K.J.

risk,

for Auditors,"

97.

Key Words: management

Journal , 42.

No.

87-3077, Proc. 3d Aerospace

Key Words:

"Security of Personal Computers: A Growing Concern," Computer Security

networks, methods.

auditing,

,

STR-82 Streeter.

B.

"People.

More

than the

Technology Are

EFT

Security,"

Still

ABA

Key

to

Banking

Journal . July 1982, pp. 32-37.

Key Words:

2-22

jjersormel. threats.

TOM-86

TAL-81

VAN-87 Van Meter,

Talbot, J.R.

Tomkins, F.G., and R.Rice

Management Guide to Computer Security Halsted

"Integrating Security Activities

J.D. Veatch

into the Software

"Space Station Program Threat and Vulnerability Analysis," AIAA No. 87-3082. Proc. 3d Aerospace Comp. Sec. Conf..

Press/J.

,

&

Wiley

Sons,

New

York, 1981.

Key Words: book, management, guidelines. TEA-84 Teas, H.

Development life Cycle and the Software Quality Assurance Process," Computers & Security September 1986, pp. 218-242. ,

(5:

S.D., and

IEE-87b), 1987, pp. 104-

107.

Key Words: management,

Key Words:

software.

vulnerabilities.

threats,

"Self-Audit of Microcomputer

EDPACS

Controls,"

December 1984,

TOP-84

,

pp. 1-6.

VDB-84

Toppen, R.

The Audit of Communication "InFmite Confidence:

Key Words:

auditing,

PC,

Networks" Computers

methods.

Security

TIN-89

,

November

&

1984, pp.

,

1984, pp. 171-185.

303-313.

Key Words:

Ting, T.C. "Application of Information

Security Semantics: A Case of Mental Health Delivery," 11.3 (Data Proc. IFIP

WG

base)

vd Berg, B., and H. Leenaars "Advanced Topics on Computer Center Auditing," Computers & Security October

Workshop

(6:

M-89),

1989.

Key Words:

VOU-88

networks.

Vouitilainen, R.

TRO-84

"Experience in the Use of the

SBA

Troy, G. "Thwarting the Hackers,"

Improving Computer Security

Datamation July

in Finland," Proc. IFIP/Sec.

,

1,

1984.

Key Words: methods,

Vulnerability Analysis for

•88 , Austraha, 1988, (2:

Key Words:

database.

auditing, methods.

auditing,

hackers,

CAE-

89), pp. 263-271.

techniques.

TOD-89

Key Words:

Todd, M.A., and C. Guitian

Computer Security Training Guidelines

.

SP 500-172,

WAC-89

Troy, E.F. Security for Dial-Up Lines ,

National Institute of

SP 500-137,

Standards and Technology,

of St^dards, Gaithersburg,

Gaithersburg,

MD, November

MD,

National Bureau

,

500-166, National Institute of Standards and Technology,

Key Words: awareness,

Wack, J.P., and L.J. Camahan Computer Viruses and Related Threats: A Management Guide

SP

1986.

1989.

Key Words:

risk, international.

TRO-86

techniques,

network.

Gaithersburg,

MD. August

1989.

guidelines.

VAN-85 TOI-87

van Eck,

Key Words:

W.

Toigo, J.W.

"Electromagnetic Radiation

Disaster Recovery Planning:

from Video Display Units: An Eavesdropping Risk?," Computers & Security December 1985, pp. 269-286

Managing Risk and Catastrophe in Information

Systems, Yourdan Press,

Englewood

Cliffs,

,

risk,

recovery.

WAD-82 Wade.

J.R.

EDP Risk Assessment," Sectirity 'The Basics of

Management March 1982,

NJ, 1987

,

Key Words:

Key Words:

viruses,

guidelines.

threats,

pp.

56-70.

vulnerabilities.

Key Words:

risk,

management.

WAI-84 Wainwright, 0.0. "Security

Management of

Future," Security

March 1984,

pp. 47-51.

Key Words: management, policy.

2-23

the

Management,

WEB-81

WAR-81 Wardlaw, J. "Pattern Matching for Auditors,"

EDPACS March .

1981, pp. 1-12.

Key Words:

WIN-89

Weber, R.

EDP

EDP

Auditing: Conceptual

Winkler, J.R., and W.J. Page Detection in Trusted Systems," Proc. 5th Security Applicat.

Key Words: book,

Conf. , 39-45.

,

auditing,

techniques.

Anomaly

Foimdations and Practice McGraw-Hill, Highstown, NJ, 1981. auditing,

"Intrusion and

IEE-89c), 1989, pp.

(4:

methods, techniques,

WAR-83

&

Key Words:

,

risks, techniques.

WAR-83a Ward, G. "Micros Pose Mainframe Size Security Problems," Data Mangement, July 1983, pp.

38+

Key Words:

vulnerabilities,

PC.

WAR-84 Ward,

Key Words:

management.

Warren, A.D. "Evaluating Risks of Computer Fraud and Error," Computers Security June 1983, pp. 231-143.

WHI-89 White, S.R. and D.M. Chess Coping with Computer Viruses and Related Problems ,

RC

14405,

IBM Thomas

WOD-88 Woda, A. "Enstiring Reliability and Integrity of

J.

Data

in

EDP COM-

Watson Research Center,

Application Systems,"

Yorktown, NY, January 30, 1989

SAC, Computer

&

Sec. Auditing

Control. No. 2, 1988, pp.

A1-A6.

Key Words:

viruses,

Key Words:

guidelines.

integrity,

methods.

WOF-83

WIE-86 Wiesand, C.G. "An Audit Approach to Microcomputers," EDPACS

May

CM,

auditing, threats,

methods, techniques.

,

1986, pp. 1-18.

Wofsey, M.M. (Ed.) Advances in Computer Security Management, Vol. 2 J. Wiley & Sons, New York, 1983.

Key Words:

and

R.D. Paterson "Surviving (and Profiting from) the Audit: Auditors View," Computerworld,

auditing,

Key Words: book, general, methods, management,

methods, PC.

WIL-84

techniques.

Wilkes, M.V.

Management and

WON-85

September 24, 1984, pp.

"Security

ID/13-18.

Protection:

Key Words:

Approach," The Computer Journal (UK) February 1984,

Management and Computer

pp. 3-7.

Security,"

auditing,

A

Personal

,

management.

Wong, K. "Computer Crime

Security

WAR-84a

Key Words: management,

Warren, A. "Auditing Computer Systems," Information Resource Management (UK), ,

March 1984,

Key Words:

,

pp. 36-39. auditing,

methods.

WAR-86 Ward, G.M., and J.D. Harris Managing Computer Risk: A Guide for the Policymaker, J. Wiley & Sons, Inc., 1986.



Risk

Computers & December 1985, pp.

,

287-295.

policy, methods, guideUnes.

Key Words: WIN-83 Winters,

crime, risk,

methods, management.

CM.

"Auditing Data

WON-86

Commimications Networks," EDPACS August 1983, pp.

Wong. K.

1-9.

Computerization."

,

"The Risks Involved in

The Computer Law and Sec.

Key Words:

auditing,

networks.

Report, March-April 1986, pp. 15-18.

Key Words: laws.

Key Words: book, risk, methods, guidelines, management.

2-24

threats, risks,

WOO-86

WON-86a

YAR-84

Wong, K.

Wood. C.C.

Yarberry,

Computer Security Management," EDPACS July

"Establishing Internal

Technical System Security

1986, pp. 7-10.

Standards." Computers

the EDP Audit Fimction - A Practical Approach," EDPACS May

"Effective

,

Security

Key Words: management,

,

&

,

June 1986, pp. 193-

1984, pp. 6-8.

200.

Key Words: auditing, management, personnel.

methods.

Key Words:

WOO-83

guidelines,

Wood, C.C. "Enhancing Information Security with the Information Resource Management Approach," Computers & Security

,

November 1983,

W.A.

"Managing

pp.

policy,

management.

YAR-84a

WOO-86a

Yarberry,

Wood, C.C. "Quantitative Risk Analysis

System,"

and Information System Security," Data Processing

pp. 1-5.

Communications Security Winter 1986, pp. 8-11.

223-229.

W.A.

"Auditing the Change Control

&

EDPACS

Key Words:

,

,

June 1984,

auditing, methods,

techniques.

Key Words: management, Key Words:

methods.

YAR-84b

risk, techniques.

Yarberry,

WOO-87

WOO-84 Wood, M., and

T. Elbra

System Design

for

Protection

.

Data

National

Computer Centre (UK), J. Wiley & Sons, Chichester,

Wood, C.C,

Middle Man," EDPACS September 1984, pp. 1-4. the

et al.

Computer Security: A Comprehensive Controls Checklist J. Wiley & Sons.

Key Words:

,

Somerset, NJ, 1987

methods.

1984.

Key Words: book,

Key Words: book, controls, methods, guidelines.

techniques.

WYS-84

WOO-85

Wysong, E.M.. and

I.

DeLx)tto

Wood. C.C.

Information Systems Auditing

"Floppy Diskette Security Measures." Computers & Security September 1985. pp. 223-228.

Proceedings. International

Conference Milan, 1983, North-Holland, Amsterdam.

Key Words:

Key Words:

.

techniques. PC.

W.A.

"Audit Software: Eliminating

,

1984. proceedings,

auditing, methods,

management.

2-25

.

,

auditing, software,

3.

Foundations

This section cites publications that emphasize fundamental principles, concepts, and

models of computer

security.

ADK-89

BEN-89

Adkins, M.M.,

et al.

"The Argus Security Model," Proc. 12th Natl.

Conf.

.

(5:

Comp.

Sec.

NCS-89), 1989,

pp. 123-134.

BIS-89

Benson, G., W. Appelbe, and I. Akyildiz "The Hierarchical Model of Distributed Systems Security," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b),

M. "A Model of

Bishop,

Security

Modeling," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989, pp. 46-52 .

.

Key Words: models,

Key Words: models,

pp. 194-203.

theory.

description.

Key Words: model,

BAD-89

BOE-84 Boebert, W.E.

hierarchical, network.

"On

Badger, L.

"A Model

BER-87

for Specifying

Multi-Granularity in Integrity PoUcies," Proc. 1989

Symp. on Sec.

&

IEEE

Privacy

,

(5:

IEE-89b), pp. 269-277.

Key Words:

models,

D.M.

'Towards a Formal Basis for the Formal Development Method and the InaJo Specification Language," IEEE Trans, on Software Engr. .

February 1987, pp. 184-200.

integrity, policy.

BEL-88

Key Words:

BeU. D.E. "Concerning 'Modeling' of

Computer

Security," Proc.

1988 IEEE Symp. on Sec. Privacy

Berry,

.

(5:

13.

Key Words: modeling,

Bishop,

M.

Proc. 8th National

Systems," Proceedings, 8th

18-27.

take-

Sec.

&

Privacy

,

Bishop, (5:

(5:

Comp.

Sec.

NCS-85), 1985, pp.

Key Words:

policy, integrity,

methods.

BOE-85a C.T. Ferguson

"A

BIS-88

IEE-88a), pp. 212-216.

,

Boebert, W.E., and

"Security Policy Modeling for

IEEE

capability,

Symposium on

grant.

the Next-Generation Packet

(5:

Practical Alternative to

Conf.

Key Words: models,

BeU, D.E.

Symp. on

Key Words: models,

MLS

"Hierarchical Take-Grant

,

BEL-88a

,

Hierarchical Integrity Policies,"

Operating System Principles December 1981, pp. 109-122.

theory, policy.

Sec. Progr.

DOD-84), 1984, pp. 291-293.

Boebert. W.E., and R.Y. Kain

BIS-81

ACM

Switch," Proc. 1988

DoD Comp.

"A

&

-

Property," Proc. 7th Seminar,

BOE-85

formal,

specification.

IEE-88a), pp. 8-

the Inability of an

Unmodified Capability Machine to Enforce the

M.

Partial Solution to the

Discretionary Trojan Horse

'Theft of Information in the Take-Grant Protection Model,"

Problem," Proc. 8th Natl.

Comp.

Sec. Conf. . (5:

NCS-

85), 1985, pp. 141-144.

Key Words: models, poUcy,

Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),

network.

pp. 194-218.

Key Words: discretionary, method.

Proc.

,

Key Words: models,

take-

BOE-86

grant.

Boebert, W.E., R.Y. Kain, and

W.D. Young "The Extended Matrix Model of Computer Security," Software Engr. Notes August

ACM

,

1985, pp. 119-125.

Key Words: models,

3-1

technique.

BUR-89

BOS-89 S.H.

COH-89

Burrows, M., M. Abadi, and

Boshoff. W.H., and

von Solms

R.

"A Path Context Model for Addressing Security in Non-Secure Environments," Computers Security August 1989, pp. Potentially

Needham

"A Logic of

ACM &

Authentication,"

Operating Systems

Review December 1989, pp. ,

Cohen, F. "Models of Practical Defenses Against Computer Viruses." Computers & Security April .

1989. pp. 149-160.

1-13.

Key Words: models,

,

Key Words:

417-425.

authentication,

virus,

methods.

theory.

Key Words: models,

CSF-88

policy,

CAR-84

methods.

Proceedings,

BOT-83

Transnational Data Report,

Workshop Franconia, NH, June 1988, Report M88-37. The Mitre Corporation,

December 1984,

October 1988.

Problems in

"Intractable

Bottom, N.R.

Computer

Jr.

"An Informational Theory of

November

Security ,

&

Computers

Security,"

Security,"

pp. 472- 474.

,

1983, pp.

Key Words:

275-280.

theory, models,

Key Words: models,

Key Words:

proceedings,

models, theory, methods.

policy.

theory.

DAS-89

CHE-88 BRE-89

Cheng. P.-C. and V.D.Cligor

"A Model

Brewer, D.F.C., and M.J.

The Computer

Security Foundations

Carroll, J.M.

Nash

for Secure

Distributed Computation in

"The Chinese Wall Security Policy," Proc. 1989 IEEE Symp. on Sec. «fe Privacy (5:

Heterogenous Environment," Proc. 4th Aerospace Comp. Sec. Conf. (4: IEE-88b),

IEE-89b), pp. 206-214.

1988, pp. 233-241.

Key Words: models, poUcy,

Key Words: model,

,

.

networks.

Dasher. D.N. "Modular Presentation of

Hardware: Bounding the Reference Monitor Concept," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-89). 1989. pp. 591-600. ,

Key Words: models, methods,

MLS.

theory.

CLA-87

BUD-83

Clark. D.D., and D.R. Wilson

DIO-81

"A Comparison of

Dion, L.C.

Model," Proc. 1981 IEEE

International Journal of

Commercial and Military Computer Security Policies," Proc. 1987 IEEE Symp. on

Computer and Information

Sec.

Budd, T.A. "Safety in Grammatical Protection Systems,"

Sciences

,

Vol. 12, No.

&

Privacy

(5:

.

IEE-87a),

pp. 184-194.

6,

Key Words: models, poUcy,

Symp. on Sec.

&

Privacy

,

(5:

IEE-81), pp. 49-55. theory.

models. poUcy.

DIV-88

integrity.

DiVito. B.L.

safety.

CLA-88

BUR-88

"Derived Information

Clark, D.D. and D.R.

Burrows, M., R. Needham, and M. Abadi

Computer

"Authentication:

Postscript,

A

Sec. Conf.

for

Uth (5:

.

Natl.

Sensitivity as a

Comp.

CSF-88).

Key Words: models, techniques.

Key Words:

models, integrity.

Los Altos, CA,

1988, pp. 325-342.

proceedings,

theory, authentication,

methods.

3-2

Comp.

NCS-88a),

1988. pp. 14-27.

,

Modeling

Technique." Proc.

Sec.

Foundat. Workshop . 1988.

Integrity."

Morgan Kaufmann

Key Words:

WUson

Model

"Evolution of a

Practical

Study in Belief and Action," Proceedings, 2nd Conference on Theoretical Aspects of Reasoning About Knowledge Publishers,

Protection

Key Words: models,

1987, pp. 413-431.

Key Words:

"A Complete

(3:

DOB-89

FOL-89

Dobson,

and

J.E.,

JA. McDermid "A Framework for Expressing

&

Privacy

.

(5:

"A Model of Secure Information Flow," Proc. 1989

IEEE Symp. on

Models of Security Policy," Proc. 1989 IEEE Symp. on Sec.

GLA-87

Foley, S.N.

Sec.

&

Privacy (5: IEE-89b), pp. 248-258.

Multi-Level Secure System,"

,

IEE-89b),

ACM

pp. 229-239.

.

Key Words: models, methods, general.

theory,

Key Words:

DOB-89a J.

"Conversational Structures as

Means

of Specifying

Security Policy," Proc. IFIP

WG

,

No.2, 1987,

Freeman, J., R. Neely, and G. Dinolt "An Internet System Security Policy and Formal Model," Sec.Conf. .

(6: IFI-89),

1989.

formal,

specifications.

Proc. 11th Natl.

11.3 (Data Base)

Workshop

5.

pp. 151-184.

flow.

FRE-88

a

on Computing

Trans,

Systems Vol.

Key Words: models,

Dobson,

Glasgow, J.J., and G.H. McEwen 'The Development and Proof of a Formal Specification for a

(5:

Comp.

NCS-88), 1988,

pp. 10-19.

GLA-88 Glasgow, J.J., and G.H. MacEwen "Reasoning About Knowledge in Multi-level Secure Distributed Systems," Proc.

1988 IEEE Symp. on Sec.

Key Words:

Key Words: model,

specification,

methods.

Privacy

formal,

network.

Eloff. J.H.P.

Fugini, M., and G. Martella

Specification

"The Development of a Language for a

Model

Computer Security System," Computers & Sectirity June

Design," Computers

"ACTEN:

A

Conceptual Systems

for Security

&

1985, pp. 143-147.

Security , October 1984, pp. 196-214.

Key Words:

Key Words: model,

,

specification,

"A

al.

Unwinding

in

Proc.

Comp. Sec. Foundat. Workshop H 1989, (3: BEE-

Petri

Information Systems , Vol. 13, No. 1, 1988. control.

GAS -89

infCTence, methods.

M.

IEEE Cipher

Foley, S.N.

Analysis,"

"A Universal Theory of Information Flow," Proc.

1989, pp. 32-36.

&

Privacy (5: IEE-87a), pp. 116-121.

Key Words:

,

Jan.

flow.

theory,

,

89a), pp. 64-70. specification,

methods.

GOG-82

GLA-85

Goguen.

Glasgow, J.I., and G.H. MacEwen

"A Two-Level

Security

J.A.,

and

"Security Policies

Model

Secure Network," Proc. 8th Natl. Comp. Sec. Conf. for a

,

(5:

Comp. Sec. Foundat. Workshop E 1989. (3: lEE-

Key Words:

flow, techniques.

,

Key Words: models,

Glasgow, J.I., and G.H. MacEwen Integrity Specification," Proc.

"An Optimization for Automated Information Flow

1987 IEEE Symp. on Sec.

theory,

"Obligation as the Basis of

Gasser,

FOL-87

Key Words: models, MLS.

GLA-89 Key Words: model,

Key Words: models,

pp. 139-146.

Net Model of Access

.

89a), pp. 22-28.

GLA-88a

.

Control Mechanisms,"

LOCK,"

models, theory,

Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),

Fugini, M.G., and G. Martella

"Noninterference and

Key Words: MLS.

Distributed Systems," Proc.

theory.

FUG-87 Fine, T., et

&

IEE-88a), pp. 122-

Glasgow, J., G.H. MacEwen, and P. Panangaden "Reasoning about Knowledge and Permission in Secure

methods.

FIN-89

(5:

128.

FUG-84

ELO-85

,

J.

&

Meseguer, Security

Models," Proc. 1982 IEEE

&

Privacy Symp. on Sec. IEE-82), pp. 11-20.

,

(5:

NCS-85), 1985, pp. 56-63.

Key Words: models,

Key Words: models, network.

3-3

theory.

policy,

GOU-84

HAR-88a

HAI-84

Gougen, J.A., and J. Mesgeur "Unwinding and Inference Control," Proc. 1984 IEEE Symp. on Sec. & Privacy (5:

Haigh, J.T.

IEE-84), pp. 75-86.

Progr. , (5:

,

Security Policy Models," Proc.

Harkness, W., adn P. Pittelli "Command Authorization as a Component of Information

7th Seminar,

Integrity." Proc.

"Comparison of Formal

DoD Comp.

Sec.

DOD-84), 1984,

pp. 88-111.

Key Words: model,

Comp. Sec. Workshop 1988, (3:

Foundat.

,

CSF-88). pp. 201-226.

inference,

Key Words: models,

theory.

theory,

general.

Key Words:

integrity,

techniques.

GOV-85

Comp.

Sec. Conf.

.

(5:

HEA-89

HAI-86

Gove, R.A. "Modeling of Computer Networks," Proc. 8th Natl.

NCS-

Haigh, J. and W.D. Young "Extending the Noninterference Version of

85), 1985, pp. 47-55.

MLS

Key Words: models, methods, netowrks.

239.

SAT," Proc. 1986 IEEE Symp. on Sec. & for

Privacy ,

Heany,

et al.

J.,

Model Development

"Security

Environment," Proc. 5th Security Applicat. Conf. , (4: IEE-89c), 1989, pp. 299-307.

IEE-86), pp. 232-

(5:

Key Words: models, techniques.

Key Words: models, MLS,

GRO-84 Grove, R.A. "Extending the Bell & LaPadula Security Model," Proc. 7th Seminar, DoD

Herlihy, M.P.. and J.M.

HAI-87

Comp. Sec. Program (5: DOD-84), 1984. pp. 112-119. ,

Key Words: MLS.

HER-89

methods.

models, theory,

Wing

"Specifying Security

Haigh, J. and W.D. Young "Extending the Noninterference Version of

MLS

for

SAT," IEEE Trans,

on Software

Constraints with Relaxation

Comp. Sec. Workshop n 1989,

Lattices," Proc.

Foundat. (3:

,

IEE-89a), pp. 47-53.

Engr., February

Key Words:

1987, pp. 141-150.

specification,

methods.

Key Words: models, MLS,

GUT-87 Guttman,

IEE-89

methods.

J.

"Information Flow and Invariance," Proc. 1987

&

Privacy Symp. on Sec. IEE-87a). pp. 67-73.

Key Words: models,

The Computer

Proceedings,

IEEE ,

(5:

flow,

HAR-85 Harrison,

Franconia,

NH,

IEEE

Protection in Operating

Computer Society Press, Washington, DC, June 1989.

Systems," in M.C. Yovits,

Advances in Computers, Academic Press,

New

J., and M. Nadel "What Needs Securing," Proc.

11,

June 11-14, 1989,

Vol. 24

GUT-88

Workshop

M.A.

'Theoretical Issues Concerning

Ed.,

theory.

Security Foundations

.

York, 1985.

Key Words: proceedings, models, theory, methods.

Guttman,

Comp. Sec. Foundat. Workshop 1988, (3: CSF-

Key Words: models,

theory,

Key Words: models,

HAR-88 theory.

J.

"Security Specifications," Proc.

,

88), pp. 34-57.

JAC-88 Jacob,

general.

1988 IEEE Symp. on Sec.

Hartman, B.A. "A General Approach to

Privacy

,

(5:

&

IEE-88a), pp. 14-

23.

Tranquility in Information

GUT-89 Guttman, J.D. "The Second Computer Security Foundations Workshop," IEEE Cipher Fall 1989, pp. 15-26.

Key Words:

Flow Analysis," Proc. Comp. Sec. Foundat. Workshop ,

1988,

(3:

Key Words:

specification,

methods.

CSF-88).

JAC-88a ,

Key Words: models,

flow,

Jacob, J.L.

"A Security Framework." Proc. Comp. Sec. Foundat. Workshop 1988, (3: CSF-88).

methods.

awareness,

.

pp. 98-111.

models.

Key Words: models, general.

3-4

theory,

Jacob,

"On

KOR-88a

KAT-89

JAC-89 J.

the Derivation of Secure

Components," Proc. 1989 IEEE Symp. on Sec. &

Katzke, S.W., and

Korelsky, T., et

Z. G. Ruthberg (Eds)

"Security Modeling in the

Report of the 1987

Ulysses Enviroimient," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 386392.

Workshop on Integrity Policy in Computer Information System SP 500-

Invitational

Privacy (5: IEE-89b), pp. 242-247. .

,

al.

,

160, National Institute of

Key Words: models,

theory,

methods.

Standards and Technology, Gaithersburg,

Key Words:

JAC-89a Jacob,

MD,

1989.

techniques.

integrity, policy.

the

KEE-88

Use of

"A Model

Separability for Detection of

Keefe, T.F.. W.T. Tsai, and

Covert Channels," IEEE Cipher Summer 1989, pp.

M.B. Thuraisingham

25-33.

for Object-Oriented Systems,"

"A

,

covert channel,

methods.

Johnson, D.M., and F.J.

Model

Comp.

Sec.

Conf.. (5: NCS-88). 1988, pp. 1-9.

JOH-88

Trans, on .

&

IEE-80), pp. 9-17.

Key Words: models, methods. LAN-81

methods.

Security,"

for Computer Computing Surveys September 1981, pp.

ACM

247-278.

Keefe, T., and "Security

W.

Tsai

Model Consistency

in Secure Object-Oriented

6,

1989, pp. 290-298.

requirements,

methods.

Key Words: MLS.

JOH-88a

models, theory,

LAN-82 Landauer, C, and S. Crocker "Precise Information Flow Analysis by Program

Symp. on Sec.

FJ. Thayer "Security and Composition of Machines," Proc. Comp. Sec. Foundat. Workshop 1988, CSF-88), pp. 72-89. ,

(3:

"Security Properties of Ring

Key Words:

Comp. Sec. Foundat. Workshop H 1989,

methods.

Brackets," Proc.

Landwehr, C.E., C.L. Heitmeyer,

techniques.

and

KOR-88

FJ. Thayer

Korelsky, T., et

"Security Properties

Consistent with Testing

Semantics for Communicating Sec. (3:

al.

Enviroiunent." Proc. 11th Natl.

Comp.

Sec. Conf.

theory,

Key Words: modeling, techniques.

3-5

J.

McLean

Model for Military Message Systems," ACM Trans, on Computer Systems August 1984, pp. 198-222. Security

,

"ULYSSES: A ComputerSecurity ModeUng .

(5:

NCS-88). 1988, pp. 20-28

CSF-88), pp. 9-21.

Key Words: models,

verification,

Key Words: models,

"A

1988,

(5:

LAN-84

IEE-89a), pp. 41-46.

Johnson, D.M., and

,

,

Ko, H.-P.

theory.

Comp.

1982 IEEE

.

JOH-89

Foundat. Workshop

&

Privacy IEE-82). pp. 74-80.

KOH-89

(3:

Key Words: models,

formal,

general.

Verification," Proc.

Johnson, D.M., and

Processes," Proc.

Key Words: models,

Systems" Proc. 5th Security Applicat. Conf. , (4: IEE-89c),

methods.

(5:

,

,

Computer Systems Vol. No. 3, 1988.

Key Words:

Privacy

Landwehr, C.E. "Formal Models

KEE-89

Requirements with Tolerable

ACM

Describe

Key Words: models, MLS, Thayer

"Stating Sectirity Sets,"

to

Protection Problems," Proc.

1980 IEEE Symp. on Sec.

Multilevel Security

Proc. 11th Natl.

Key Words:

KRE-80 Kreissig, G.

J.

"A Note on

Key Words: modeling,

Key Words: models, techniques.

LAN-89 J.,

T.

Redmond,

and T. Benzel "Formal Policies for Trusted

Comp. Sec. Foundat. Workshop H 1989, Processes," Proc.

.

(3:

MAC-87

LIN-89a

Landauer,

IEE-89a), pp. 31-40.

R.P. Trueblood "Security Algebras and Formal Models - Using Net Theory." Proc. IFIP 11.3 (Data Base)

Workshop

,

MacEwen, G.H., V.Q.W. Poon, and J.I. Glasgow "A Model for Multilevel Security

Based on Operator IEEE Symp.

Nets," Proc. 1987

on Sec.

&

Privacy

,

lEE-

(5:

87a), pp. 130-160.

policy, formal,

Key Words: models, theory methods

models.

LAP-89 La

Petri

WG

1989.

(6: IFI-89),

Key Words:

and

Lin, T.Y., L. Kershberg,

*

Key Words: models, MLS, methods.

LIU-80

Padula, L.J.

"The 'Basic Security Theorem' of Bell and La

MAR-86

Liu, L.

Padula Revisited," IEEE Cipher January 1989, pp. 26-

"On Security Flow Analysis in Computer Systems," Proc. 1980 IEEE Symp. on Sec. &

31.

Privacy

,

,

IEE-80), pp. 22-

(5:

Marcus, L., and T. Redmond "Semantics of Read," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86), 1986, pp. 184-193. .

33.

Key Words:

Key Words: models,

awareness,

Key Words: models,

models, theory, formal.

MAR-88

methods, techniques.

LEI-83

LOC-82

Leiss, E.L.

theory.

flow,

Marcus. L.. and T. Redmond "A Model-Theoretic Approach to Specifying, Verifying, and

"On Authorization Systems With Grant-or -Controlled

Lockman,

"Unidirectional Transport of

Hooking

Propagation of Privileges,"

Rights and Take-Grant

Proceedings, 1983

Control,"

Comp. Sec. Foundat. Workshop 1988, (3: CSF-88),

COMPCON

N. Minsky,

A., and

IEEE

Trans, on

Up ,

pp. 127-138.

499-502.

Software Engr. December 1982. pp. 597-604.

Key Words: models,

Key Words: models,

policy.

authorization, techniques.

grant, techniques,

Spring

.

1983, pp.

,

Security Policies,"

Proc.

Key Words: models, take-

theory,

methods.

MAR-89 LUB-89

LIN-88

Marcus,

L.,

and T. Menas

Lin, T.Y.

Lubarsky. R.S.

"Safety via State Transition

"A Generalized Information Flow Model and the Role of

"Hook-Up Security and

Language Plus

Generalized Restrictiveness,"

Proc.

89a). pp. 71-77.

LAN-88), 1987. pp. 85-103.

Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 112-122.

Key Words: models,

Key Words: models,

the Security Officer," Proc.

IFIP

WG

11.3 Meeting

.

(6:

.

,

Key Words: flow,

theory.

Invariants,"

Comp. Sec. Foundat. Workshop H 1989. (3: lEE-

theory, methods,

safety.

methods.

MAR-89a

LUN-88 LIN-89

Lunt, T.F.

Lin. T.Y.

"Access Control Policies:

"Chinese Wall Security — An Aggressive Model." Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989. pp. 282-289.

Some Unanswered

Policy

,

,

Framework for Computer Security," IEEE Cipher Fall ,

1989, pp. 55-63.

pp. 227-245.

Key Words: Key Words:

Key Words: models,

Questions,"

Comp. Sec. Foundat. Workshop 1988, (3: CSF-88), Proc.

Marcus, L. 'The Search for a Unifying

policy, control.

policy,

theory.

3-6

general.

models, theory,

MCC-87

MCH-86

McCullough. D.M. "Specifications for Multilevel

Security and a

Hook-Up IEEE

Property," Proc. 1987

Symp. on Sec.

&

Privacy

,

(5:

IEE-87a), pp. 161-166.

MCL-87

McHugh, J., and A.P. Moore "A Security PoUcy and Formal Top Level Specification for a Multi-

Level Secure Local Area Network," Proc. 1986 IEEE Symp. on Sec. & Privacy (5: IEE-86), pp. 34-39 .

Key Words: MLS.

specification,

Key Words: MLS. LAN.

MCC-88 McCullough, DJ^. "Noninterference and the ComposabiUty of Security Properties," Proc. 1988 IEEE Symp. on Sec. & Privacy (5: ,

IEE-88a). pp. 177-186.

specification,

McLean,

J.

"Reasoning About Security Models," Proc. 1987 IEEE

&

Symp. on Sec. Privacy IEE-87a), pp. 123-131

Key Words: models,

(5:

,

theory,

general.

MCL-88 McLean,

J.

'The Algebra of Security," Proc. 1988 IEEE Symp. on

MCH-87 McHugh,

Sec.

J.

&

Privacy

,

(5:

"Active vs. Passive Security

pp. 2-7.

Models: The Key to Real Systems," Proc. 3d Aerosp^ice Comp. Sec. Conf. (5: lEE-

Key Words: models,

IEE-88a),

theory.

.

Key Words:

inference,

MCL-89

87b), 1987, pp. 15-20.

theory.

Key Words: models,

MCC-88a

theory,

general.

McCullough, D.M. "Covert Channels and Degrees of Insecurity," Proc.

Properties,"

MCH-88 McHugh, J. "A Formal Definition

Key Words: models,

Information Flow Analysis,"

88), pp. 1-33.

Proc.

Comp.

covert channel,

(3:

CSF-88),

theory.

MEN-81 Mennie, A.L., and G.H. MacEwen Using an Intermediate Code

Key Words:

MCC-88b

formal, models,

flow.

Program Representation," IEEE on Software Engr.

Trans,

,

November 1981,

McCullough, D.M. Foimdations of Ulysses: The

Theory of Sectirity RADCTR-87-222, U.S. Air Force Rome Air Development ,

Rome, NY, July

1988.

MCL-84 McLean, L, C.E. Landwehr,

Key Words:

and C.L. Heitmyer "A Formal Statement of the Security Model," Proc. 1984 IEEE Symp. on Sec. &

verification.

MMS

Privacy

Key Words: verification, theory, MLS.

,

IEE-84), pp. 188-

(5:

194.

Key Words:

MCD-89

formal, models,

pp. 594-607.

flow, techniques,

MIL-81 MiUen, J.K. "Information Flow Analysis of Formal Specifications." Proc. 1981 IEEE Symp. on Sec. &

Privacy .

(5:

IEE-81), pp. 3-8.

network.

McDermid, E.

Fall

"Information Flow Certification

pp. 147.

theory.

Center,

,

for

Sec. Foundat.

Workshop. 1988,

Key Words:

IEEE Cipher

1989, pp. 27-36.

Comp. Sec. Foundat. Workshop 1988, (3: CSF,

McLean, J., and C. Meadows "Composable Security

J.,

MCL-85

"Security Policies for Integrated Project Support

Environments," Proc. IFIP 11.3 (Data Base) Workshop (6: IFI-89), 1989.

WG

,

Key Words: techniques.

Key Words:

and

Hocking

specification,

formal, flow, methods.

McLean, L "A Comment on the Basic Security Theorem of Bell and LaPadula," Information Processing Letters February 1985, pp. 67-70. ,

MIL-84 MiUen, J.K. "Al Policy Modelling," Proc. 7th Seminar, DoD Comp. Sec Progr. (5: DOD-84), 1984, pp. .

,

137-145.

policy,

Key Words: models,

formal,

Key Words: models, MLS,

theory.

methods.

3-7

MIN-84

MIL-87 MiUen, J.K. "Covert Channel Capacity," Proc. 1987 IEEE Symp. on Sec.

&

PAG-89

Minsky. N.. "Selective and Logically

Privacy. (5: IEE-87a),

pp. 60-66

Controlled Transport of Privileges."

Comp.

ACM Trans, on Programming Languages and ,

covert channel,

et al.

J.

"Evaluation Security Model Rule Base." Proc. 12th Natl.

Systems Vol.

Key Words:

Page.

No.

6,

Sec. Conf.

.

(5:

NCS-

89). 1989. pp. 98-111.

1984.

4,

Key Words: models,

pp. 573-602.

models.

theory,

methods.

Key Words: models, MIL-87a

take-

methods.

grant,

PIT-87

MiUen, J.K.

P.A.

Pittelli,

"Interconnection of

AIAA

MOR-88

'The Bell-LaPadula Computer

Morgenstem, M.

Security

No. 87-3075, Proc. 3d

"Spiral Classification for

a Special Case of the

Aerosp. Comp. Sec. Conf., (5: IEE-87b). 1987, pp. 60-

Multilevel Data and Rules."

Hairison-Ruzzo-Ullman Model," Proc. 10th Natl.

65.

Conf. (5: NCS-88). 1988. pp. 270-273.

Accredited Systems,"

Proc. 11th Natl.

Comp.

Sec.

.

Comp.

Model Represented

Sec. Conf.

,

(5:

as

NCS-

87a), 1987, pp. 118-121.

Key Words: models, Key Words: models,

techniques.

techniques,

Key Words: models,

MLS.

theory,

methods.

MIL-89

MOS-87

MiUen, J.K. "Finite-State Noiseless Covert

Comp. Sec. Foundat. Workshop H 1989.

Channels," Proc.

,

(3:

Computer Systems," Proc. 1987 IEEE Symp. on Sec.

IEE-89a), pp. 81-86.

Key Words:

PIT-88

Moser, L.E. "Graph Homomorphisms and the Design of Secure

covert channel,

Privacy

.

&

"Formalizing Integrity Using Non-interference." Proc. 11th

National

Comp.

Sec. Conf.

(5:

.

NCS-88). 1988. pp. 38-42.

IEE-87a). pp. 88-

(5:

Key Words:

96

models.

PitteUi, P.A.

formal, integrity,

theory.

Key Words: models,

MIL-89a

theory,

RAN-88

methods.

Millen, J.K.

Rangan. P.V. "An Axiomatic Basis of Trust

"Models of Multilevel

Computer

Security," in

MOS-89

M.

Yovits, (Ed), Advances in Computers Academic Press. .

New

York, 1989, pp. 1-40.

Key Words: models, MLS. general.

Moser. L.E. "A Logic of Knowledge and Belief for Reasoning about

in Distributed Systems," Proc.

Computer Security." Proc. Comp. Sec. Foundat. Workshop n 1989. (3: lEE-

211.

89a), pp. 57-63.

network.

.

1988 IEEE Symp. on Sec. Privacy

,

(5:

&

IEE-88a), pp. 204-

Key Words: models,

theory,

MIN-83 Minsky, N.H.

Key Words:

"On

general.

the Transportation of

Privileges," Proc. 1983

Symp. on Sec.

&

grant,

methods.

,

take-

(5:

ROS-88 Rosenthal. D.

IEEE

Privacy IEE-83a), pp. 41-48.

Key Words: models,

theory, methods,

"An Approach to Increasing Automation of Verification of

NEU-83

Comp.

Neumann, P.G.

Security." Proc.

"Experiences with Formality

Foundat. Workshop . 1988, CSF-88), pp. 90-97.

Development," in

in Software

D. Ferrari et al (Eds.), Theory and Practice of Software Technology North-Holland, ,

Amsterdam, 1983.

Key Words:

formal, software,

methods.

3-8

Key Words: techniques.

Sec.

verification,

(3:

SAN-88a

ROS-88a Roskos, I.E. "Minix Security Policy Model," Proc. 4th Aerospace Comp. Sec. Conf. . (4: lEE88b). 1988. pp. 393-399.

SNY-81

Sandhu, R.S. "Expressive Power of the Schematic Protection Model," Proc. Comp. Sec. Foundat. Workshop 1988, (3: CSF-88). ,

Snyder. L.

"Formal Models of CapabilityBased Protection Systems." IEEE Trans, on Computers .

March 1981.

pp. 172-181

pp. 188-193.

Key Words: models,

Key Words:

policy,

Key Words: models,

decription.

formal, models,

capability.

description.

RUS-84

SNY-81b SAN-89

Rushby. J. "The Security Model of

Enhanced HDM," Proc. 7th Seminar,

DoD Comp.

Progr. . (5:

Sec.

Snyder, L.

Sandhu. R.S. 'Transformation of Access Rights." Proc. 1989 IEEE

&

Symp. on Sec.

DOD-84), 1984,

Privacy

pp. 120-136.

IEE-89b), pp. 259-268.

Key Words: models,

Key Words:

description.

techniques.

,

'Theft and Conspiracy in the Take-Grant Model." Joumal Comp. and System Sciences .

(5:

December 1981.

Key Words: control,

pp. 333-347.

models, take-

grant, threats.

SOR-83

SAN-89a

SAN-85 Sandhu, R.S. "Analysis of Acyclic Attenuating Systems for the SSR Protection Model," Proc. 1986 IEEE Svmp. on Sec. & Privacy (5: ffiE-86), pp. 197-206.

Sorkin. A., and C.J.

Buchanan

Sandhu, R.

"Measurement of

"Currrent State of the Safety

Cryptographic Capability

Problem

Access Control," IEEE Cipher Fall 1989. pp.

Computers

37-46.

November

in

.

Protection Algorithms,"

&

Security 1983. pp. 101-116. .

,

Key Words:

control, safety,

Key Words:

capability,

techniques.

general.

Key Words: models, SAY-86

description.

STO-81

Saydjari. O.S..

SAN-86

T.

Sandhu, R.S., and M.E. Share

"Some Owner Based Schemes With Dynamic Groups in the Schematic Protection Model," Proc.

1986 IEEE Symp. on Sec. Privacy

,

(5:

and

Kremann

"A Standard Notation in Computer Security Models." Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86), 1986, pp. 194-203. .

&

IEE-86). pp. 61-

70

Key Words: models,

Sandhu, R.S. "The Schematic Protection Model: Its E>efinition and Analysis of Acyclic Attenuation Schemes," Journal of the No. 2, 1988. pp. 404-432.

ACM

Protection

Control and Information Flow." Proc. 1981 IEEE Symp. on Sec. & Privacy (5: lEE81). pp. 9-18. .

Key Words: models, control.

flow,

SUT-86 Sutherland, D.

"Reflections on the

"A Model of

Verification of the Security of

Proc. 9th National

an Operating System,"

Sec. Conf. , (5: NCS-86). 1986.

Proceedings, 9th

pp. 175-183.

ACM

Information,"

Computer

Symposium on Operating Systems Principles October

Key Words: models,

1983, pp. 143-154.

general.

,

,

Key Words:

verification,

description.

Key Words:

A

Integrates Access

general.

Silverman, J.M.

SAN-88

Model which

Key Words: models, methods,

SIL-83

methods.

Stoughton. A. "Access Flow:

models,

description.

3-9

theory,

TSA-87

SUT-89 Sutherland,

I.,

S. Perlo,

and

WIL-88

V.D. Gligor. and C.S. Chandersekaran "A Formal Method For the Identification of Covert Storage Chaimels in Source Code," Proc. 1987 IEEE Symp. on Sec. & Privacy (5:

Tsai, C.-R,

R. Varadarajaan "Deducibility Security with

Dynamic Level Assignments," Proc. Comp. Sec. Foundat. Workshop H 1989, (3: lEE.

89a), pp. 3-8

,

IEE-87a), pp. 74-86

Key Words: models,

Profiles," Proc. 11th Natl.

Comp.

Sec. Conf. . (5:

NCS-

88). 1988. pp. 257-266.

Key Words: models, methods, MLS.

theory,

Key Words:

general.

covert channel,

formal, methods, techniques.

TAY-84

WIT-89 Wittbold, J.T..

"Controlled Signalling Systems

TSA-88

Taylor, T. I

Williams, J.C. and M.L.Day "Security Labels and Security

"Comparison Paper Between the Bell-La Padula Model and the SRI Model," Proc. 1984 IEEE Symp. on Sec. & Privacy

,

(5:

IEE-84), pp.

195-202.

Privacy

Key Words: models,

and Covert Channels," Proc.

and V.D. Gligor "A Bandwidth Computation Model for Covert Storage Chaimels and Its Applications," Proc. 1988 IEEE Symp. on Sec. &

Tsai, C.-R.,

.

(5:

IEE-88a), pp.

108-121.

theory,

Comp. Sec. Foundat. Workshop n 1989, (3: lEE.

89a), pp. 87-104.

Key Words:

WRA-89 Wray,

general.

Key Words:

TAY-87

covert channel,

models, techniques.

Taylor, T., and B.

Hartman

"Formal Models, BellLaPadula, and Gypsy," Proc. 10th Natl. Comp. Sec. Conf. (5: NSC-10), 1987, pp. 193-

WEB-89 ,

Hook-Up

Proc. 3d Aerospace

Key Words: models,

formal,

general.

J.C.

"An Optimization for Information Flow Analysis," Proc. Comp. Sec. Foundat. Workshop H 1989. (3: lEE.

Weber, D.G., and R. Lubarsky "The SDOS Project Verifying

200.

covert channel,

methods, techniques.

89a), pp. 105-110.

-

Key Words: models,

Security,"

methods.

Comp.

Sec. Conf. . (5: IEE-87b), 1987, pp. 7-14.

flow,

WUM-81 Wu. M.S. "Hierarchical Protection

Key Words:

TER-89 Terry,

P.,

and

"A 'New'

Wiseman

S.

verification,

description.

&

Model," Proc. 1989 IEEE

WIL-87 Williams. J.C. and

Key Words: models,

IEE-89b), pp. 215-228.

G.W. DLnolt "A Graph-Theoretic

hierarchical.

Key Words:

Formulation of Multilevel Secure Distributed Systems: An Overview" Proc. 1987

Symp. on Sec.

Privacy

,

(5:

models, theory.

TRU-86 Trueblood, R.P., and

IEEE Symp. on

A. Sengupta "Dynamic Analysis of the Effects Access Rule Modifications Have Upon

Privacy

IEEE

general.

Security,"

.

IEE-81). pp. 113-123.

Security Policy

&

Systems." Proc. 1981 IEEE Symp. on Sec. Privacy (5:

Trans, on

.

(5:

Sec.

&

IEE-87a). pp. 97-

YOU-89 Young. W.D. 'Toward Foundations of Security."

IEEE Cipher

.

Fall

1989. pp. 47-54.

103.

Key Words: models, Key Words:

theory, models,

Software Engr. August 1986, pp. 866-870. ,

Key Words: models, techniques.

3-10

general.

theory,

4.

This

section

cites

Access Control

publications

on

identification

and authentication methods

(e.g.,

passwords, biometrical identifiers), traditional access control methods (such as memory and file protection), the use of capabilities and access control lists, and add-on software packages for discretionary access control.

BAC-89

AHI-87 Ahituv, N., Y.Lapid, and S.

BOU-83

Bacic, E.

Neumann

"Process Execution Controls

Mechanism

Ensure

"Verifying Authentication of an Information System User,"

Consistency," Proc. 5th

Journal

Computers

Security AppUcat. Conf. (4:

97-103.

&

Security , April

as a

Bound, W.A.J. "Securing the Automated Office," Computer Security

to

1987, pp. 152-157.

IEE-89c), 1989, pp. 114-120.

Key Words:

Key Words:

,

Fall/Winter 1983. pp.

Key Words: authentication,

controls,

OS,

techniques.

techniques.

BOW-88

BAN-84

ALV-88 Alvare, A., and E. Schultz

"A Framework

Password

for

USENIX UNIX

Banton, B.F. and M.S. Barton "User-Friendly Password

Methods for ComputerMediated Information Systems," Computers &

Selection," Proceedings,

Security

Workshop August 1988. ,

Security

Key Words:

authentication,

,

October 1984, pp.

AND-88

authentication,

methods, passwords.

Anderson, L. "UNIX Password Security,"

USENIX UNIX

Workshop August ,

authentication,

Signatvires,"

Age

(U.K.) January 1988, pp. 20-22. ,

BON-83 Bonyun, D.A. "The Use of Architectural Principles in the Design of

1983, pp. 16-24.

Certifiably Secure Systems," Proc. IFIP/Sec. '83 ,

Key Words:

Stockholm, 1983,

techniques.

authetication,

management.

Brown, R.L. "Computer System Access Control Using Passwords,"

and

"Language Features for Access Control," IEEE Trans. on Software Engr. January

control.

Key Words:

methods, passwords,

BRO-84

control,

mandatory.

M. Boari

,

"Secure Access Control and

Key Words:

ANC-83a

Brand, S.L., and M.E. Flaherty "Password Management in

Comp. Sec. Progr. (5: DOD-84), 1984, pp. 264-269.

methods, passwords.

,

control,

general.

POD

Beker, H.

Information

Ancilotti, P., N.Lijtmaer,

Key Words: book,

Practice," Proc. 7th Seminar,

BEK-88

MAC-Based

1988.

Key Words:

,

Butterworths, Boston, 1988.

BRA-84 Key Words:

Security

Bowers, D.M. Access Control and Personal Identification Systems

186-195.

methods, passwords.

Proceedings.

control.

techniques.

(2:

FAK-

83), pp. 81-94.

Key Words:

architecture,

design.

4-1

Proc. IFIP/Sec. '84 . Toronto,

1984,

(2:

FIN-85), pp. 129-

142.

Key Words: passwords.

control,

COM-84

CAR-88a

BUN-87 Bunch, S. "The Setuid Feature in UNIX and Security," Proc. 10th

Comp.

Natl.

Sec. Conf., (5:

Carlton, S.F., J.W. Taylor,

and

Comer, M. (Ed.)

"How Passwords

Wyszynski

J.L.

Computer Fraud and Security

Mechanisms," Proc. 11th Natl.

Bulletin (U.K.)

NCS-

NCS-87a), 1987, pp. 245-

Comp.

253.

88), 1988, pp. 333-338.

Sec. Conf. , (5:

Key Words:

authentication,

methods.

November

threats,

passwords.

authentication,

CON-83

techniques.

Connolly, W. "Bypassing the Passwords,"

CHA-85

BUR-89

,

1984, pp. 1-10.

Key Words: Key Words:

are Cracked,"

"Alternate Authentication

Burk, H., and A. Pfitzmann

Chaum, D.

Computer Fraud and Security

Payment Systems Enabling Security and Unobservability," Computers & Security August 1989, pp.

"Security Without

Bulletin, July 1983, pp. 1-7.

"Digital

,

399-416.

Identification: Transaction

Systems

Make Big

to

Brother

the

ACM

October 1985, pp.

,

1030-1044.

Key Words:

COO-84 ,

Lexington Books, Lexington,

MA,

1984.

CHA-86

Carlsson, A.

"The Active Card and Contribution to

Chang, C.C. "On the Design of a Key-

its

EDP

Stockholm, 1983,

Key Words: book,

general,

methods.

Lock-Pair Mechanism in

Security," Proc. IFIP/Sec.

Information Protection

(2:

FAK-83), pp. 69-72.

CSC-85

Systems," BIT, July 1986, pp. 410-417.

Department of Defense Password Management

Key Words:

Guideline CSC-STD-002-85, National Computer Security

control,

,

techniques.

control,

Center, Ft. Meade,

techniques.

CAR-87

MD,

12

April 1985.

CLE-87

Carroll, J.M.

Computer

passwords.

Computer Security Technology general, methods.

CAR-83

Key Words:

threats,

Cooper, J.A.

control, methods.

Key Words:

_;83,

Key Words:

Obsolete," Communications of

Security,

2nd

Edition, Butterworths, Boston,

1987.

Key Words:

Clements, P.C. "Engineering More Secure Software Systems," Proc.

COMPASS Assurance

book, general,

,

'87: (2:

Comp.

IEE-87), 1987,

guidelines,

CSC-88 Trusted Unix Working Group

(TRUSIX)

pp. 79-81.

methods, techniques.

Key Words: passwords.

Rationale for

Selecting Access Control

Key Words:

CAR-88 Carroll, J.M., et

al.

'The Password Predictor — Training Aid for Raising Security Awareness," Computers & Security October 1988, pp. 475-481. ,

Key Words:

authentication,

passwords, awareness,

A

architecture,

Features for the Unix System,

NCSC-TG-020-A,

design.

National

Computer Security Center, Ft. Meade, MD, 18 August 1988.

COH-88 Cohen, F. "Designing Pro v ably Correct Information Networks with Digital Diodes," Computers & Security June 1988, pp. 279,

Key Words:

control,

guidelines.

CUS-80 Gushing, S. "Software Security and

286.

techniques.

Key Words:

design, network,

hardware.

How

Handle It," in Rullo, T.A. (Ed.), Advances in Computer Security Management, Vol. 1

Heyden

&

Son, Philadelphia, 1980, pp. 79-105.

Key Words: guidelines.

4-2

software,

to

,

DEH-89

DAV-81 and

Livesey "The Design of Secure CPUMultiplexed Computer Systems: The Master/Slave Approach," Proc. 1981 IEEE Symp. on Security & Privacy (5: IEE-81), pp. 133-139.

Davida,

G.I.,

J.

DPC-83

Dehnad, K. "A Simple Way of Improving the Login Security." Computers & Security ,

November 1989,

"Special Issue

Comm.

&

Security . SeptA^cU

1983, pp. 8-29.

pp. 607-611.

Key Words:

Key Words:

on Access

Control." Data Processing

control, methods,

general.

authentication,

methods.

Key Words:

DUC-85

design, control,

DEN-86

methods.

du Croix,

DAV-85

"An

Intrusion Detection

Model," Proc. 1986 IEEE

Davida, G.I. and B.J. Matt "Crypto-Secure Operating

Symp. on Security

Systems," Proceedings, 1985 National Computer

Conference AFIPS Press, Reston. VA, 1985. pp. 575.

(5:

&

A.J.

"Data Sharing and Access Protection in Business System

Denning, D.E.

Computers

12,"

Privacy

,

&

Security

,

December 1985, pp. 317-323.

IEE-86), pp. 118-131.

Key Words: Key Words:

control,

techniques.

auditing,

techniques.

DUP-86

581.

DES-86

Key Words:

control,

OS.

Deswarte, Y., et

DAV-88 Davida,

and

G.I.,

"UNIX

CP8

Card," Proc. IFIP/Sec.

Tolerate Faults and

'86,

Monte

Intrusions," Proceedings, 5th

GRI-89).

"A

techniques.

Matt

B.J.

Dupy, M., et al. "About Software Security with

al.

Satuj-ation

Network

to

IEEE Symposium on Reliability in Distributed

Key Words: techniques.

Protection," Proc. 4th Aerosp.

Software and Database Systems, January 1986, pp.

Comp.

74-81.

Guardians: Active

User Intervention in Data Sec. Conf. , (4: lEE-

Key Words:

IFIP/Sec. '88. Australia, 1989,

DOB-86 DEB-85

(2:

Dobson,

"Signature Verification Using

and B. Randell "Building ReUable Secure Computing Systems out of

Holistic Measures,"

Unreliable, Insecure

de Bruyne,

P.

&

Security

December 1985,

,

pp. 309-315.

Key Words:

authentication,

.

Key Words:

VAX Systems Equipment Corporation, Maynard, MA, Key Words: book,

control,

November

Key Words:

DOW-84

guidelines.

Downs. D.D.

Mechanisms." Electronics

March

8.

,

1984, pp. 122-127.

Key Words: OS,

4-3

techniques.

&

1983, p.

256.

architecture,

"Operating Systems Key Security with Basic Software

1989.

,

design.

,

Digital

"Selection Process for Security

Packages," Computers

193

Security

DEC-89

authentication,

Eloff, J.H.P.

IEE-86), pp. 187-

(5:

Key Words: methods.

ELO-83

methods, techniques.

Security for

CAE-89), pp. 479-481.

J.E.,

Components," Proc. 1986 IEEE Symp. on Sec. & Privacy

general.

as

Identity Verification," Proc.

techniques.

Computers

S., et al.

"Use of Fingerprints

architecture,

design.

control,

software,

DUV-88 Duval,

88b). 1988, pp. 199-204.

Key Words:

Carlo, 1986, (2:

software,

FAR-86

ELS -88 Ekbury,

ns-88

Farrow, R.

J.

"Personal Authentication

Fish, T.

"Security for Superusers,

Or

"A Model for Mainframe Access Control Software

Devices: Data Security Applications," Proc. IFIP/Sec.

How

•88

AustraUa, 1989. (2: CAE-89), pp. 471-478.

1986, pp. 65-70.

Key Words: OS,

Key Words:

Key Words:

vulnerabilities.

methods.

.

authentication,

to

UNIX UNIX/Worid May

Break the

System,"

Selection,"

.

EDPACS May .

1988, pp. 1-5.

model,

control,

methods, techniques.

FAY-86

ENG-87 Engelman. P.D. "The Application of 'Orange Book' Standards to Secure a Telephone Switching System." Proc. 10th Natl. Sec. Conf. (5: NCS87a), 1987. pp. 282-287.

Comp.

.

Key Words:

FIT-88

Fray, J.-M., and J.-C. Fraga

Fitzgerald, K.

"Fragmented Data Processing: An Approach to Secure and

"Choosing a Logical Access Control Strategy," Proc.

Reliable Processing in

MP/Sec.

Distributed

Computing

(2:

Systems," Preprints,

244.

Working Conference on Dependable Computing for Critical

Key Words:

International

,

techniques.

FRA-86

137.

Fray, J.M., Y. Deswarte, and

EST-89 Estrin, D.,

control,

guidelines.

AppUcations Santa Barbara, CA, August 1989, pp. 131-

control,

'88 . AustraUa, 1989,

CAE-89), 1988, pp. 235-

D. Powell

Key Words:

and G. Tsudik

"Security Issues in Policy

Routing," Proc. 1989

Symp. on Sec.

&

"Intrusion-Tolerance Using

architecture,

design.

Fine-Grain Fragmentation

IEEE

Privacy

.

(5:

FEI-86

IEE-89b). pp. 183-193.

Feinstein, H.

Key Words:

Sensitive

Scattering," Proc.

1986 IEEE

Symp. on Sec.

Privacy

&

,

(5:

IEE-86), pp. 194-201.

"Security in Unclassified control,

Computer Systems,"

Proc. 9th Natl.

requirements.

Conf.

EVA-83

,

(5:

Comp.

Key Words:

Sec.

NCS-86), 1986, pp.

81-90.

FRI-88 Friedman,

"Evaluating Security Software," Assets Protection, July/August 1983, pp. 9-13.

Key Words:

architecture,

design.

Key Words:

M.

"Access-Control Software,

control,

Information Age, (U.K.), July 1988, pp. 157-161.

techniques.

FIL-86

guidelines,

software.

Filipski, A.,

"Making

FAK-84

and

UNIX

J.

Hanko

Key Words:

Secure," Byte

control, software.

,

FUG-88

April 1986, pp. 113-128.

Fugini, M., and R. Zicari

Fak, V. "Characteristics of

Good

Key Words:

One- Way Encryption Functions for Passwords



Some Rules

and

for Creators

control,

OS,

"Authorization and Access

Control in the Office-Net Systems," Proc. IFIP/Sec. '88

design.

ns-84

AustraUa, 1989, pp. 147-162.

Evaluators," Proc. IFIP/Sec.

Fisher, R.P.

:84, Toronto, 1984, (2: FIN-

Information Systems Security

85), pp. 189-191.

Prentice-Hall,

New

York,

1984.

(2:

,

CAE-89),

,

Key Words:

control,

techniques.

Key Words: passwords, techniques.

Key Words: book, general, methods, techniques.

GON-89 Gong, L.

"A Secure Identity-Based Capability System," Proc. 1989

IEEE Symp. on Privacy

.

(5:

Sec.

&

IEE-89b), pp. 56-

63.

Key Words: capabiUty.

4-4

architecture,

GON-89a

HAG-86

Gong, L.

"On Security of Based Systems',

Capability-

ACM

Operating Systems Review April 1989, pp. 56-60.

Key Words:

,

HEN-87

Hagopian. G. "Planning and Implementing a Security Package, Part I." Computer Security Products Report. Winter 1986, pp. 18-

Security: A Workable Compromise." Proc. 10th

22.

Comp.

control,

,

Natl.

NCS-

(5:

control, software,

Key Words:

design.

GRA-84

control, integrity,

design.

HAG-86a

Grampp, F.T., and R.H. Morris "UNIX Operating System

Hagopian. G. "Planning and Implementing a Security Package. Part 11." Computer Security Products Report, Spring 1986, pp. 18-

System Technical Journal August Security," Bell

.

1984. pp. 1651-1971.

Key Words:

control.

OS.

Key Words:

design.

"On the Need for a Third Form of Access Control," Proc. 12th Natl. Comp. Sec. ,

(5:

"Pass-Algorithms:

A

Algorithms." Communications

ACM

.

August 1984.

GRE-81

Herlihy, M.P.. and J.D. Tygar

HAY-88

Introduction to Security Practices

World

"Implementing Distributed

Haykin, M.E.. and

,

R.B.J.

Publishing,

Warner

Los Angeles, CA. 1981.

Smart Card Technology: New Methods for Computer Access

Key Words:

Control

book, general,

SP 500-157, National

Institute

MD,

GRO-84 Grossman, G. "Gould Software Division's Security Program," Proc. 7th Seminar, E)oD Comp. Sec.

DOD-84), 1984.

control,

techniques.

,

CA, Aug.

1989, pp.

113-120. capabilities,

Key Words:

control, methods.

HIG-85

HEB-80

Highland, H.J.

Hebbard, B.,

et al.

Penetration of the

"Microcomputer Security: Data Protection Techniques."

&

Michigan Terminal System," ACM Operating Systems Review January 1980, pp. 7-

Computers

20.

Key Words:

Security

,

June

1985, pp. 123-134.

,

Key Words:

S.

Computer

Software," Security Audit

Control Review

.

&

vulnerabilities,

OS.

Winter

1985. pp. 31-35.

Key Words:

Applic Santa

for Critical

Barbara,

general.

"Security of

Working

Kernel." International

Conf on Dependable Comp.

Key Words: OS,

1988.

GUY-85 Guynes.

Capabilities Without a Trusted

design.

"A

pp. 180-187.

Key Words:

,

of Standards and Technology, Gaithersburg,

methods, techniques.

control, software.

HER-89

techniques.

Progr. , (5:

104.

control,

Green. G.. and R.G. Farber

Security

.

Key Words: Key Words:

&

"A Comparison of Data Access Control Packages: Part n," Computer Security Journal Vol. V, No. 1. 1988, pp. 67-

pp. 777-781.

control,

requirements.

Principles

control, software.

Henderson, S.C.

User

Vahdation Scheme Based on

of the

Key Words:

,

HEN-88

Haskett. J.A.

Knowledge of Secret

NCS-89). 1989.

pp. 296-303.

"A Comparison of Data Access Control Packages: Part I," Computer Security Journal

Key Words:

HAS -84

Graubart, R.

Henderson, S.C.

control, software,

design.

GRA-89

HEN-87a

Vol. IV, No. 2, 1987, pp. 75111.

20.

Conf.

Sec. Conf.

87a), 1987, pp. 334-339.

Key Words:

capability.

Henning, R.R., and S. A. Walker "Data Integrity vs. Data

control,

software, design.

4-5

control,

PC,

IBM-83

fflG-86 Highland. H.J.

"How

Modify a Microcomputer Operating System for Added Security," Computers & Security December 1986, pp. 340-343. to

System Security Guide, IBM System 36 FSC 219042, IBM Corporation, White Plains, ,

NY,

JOH-83 Johnston, R.E.

"Comparison of Access Control Software Packages,"

Computer Security Journal

1983.

Key Words:

,

Fall/Winter, 1983, pp. 19-58.

,

control,

Key Words:

guidelines.

control, software.

Key Words: OS, PC, IBM-88 AS/400 Programming:

guidelines.

HIG-88

JOH-83a Johnston, R.E.

Security Concepts and

Planning

Highland, H.J. "Program Aids for Office

Automation Security," Computers & Security

.

SC2 1-8083, IBM

"Security Software Packages for

CICS," Computer Security

Corporation. White Plains,

Journal

NY, June

41.

1988.

,

Spring 1983, pp. 19-

,

Key Words:

February 1988, pp. 37-43.

Key Words:

control,

control, software.

guidelines.

Key Words:

JOH-83b

control,

ISR-83

software.

HOG-88 Hogan, C.B.

The of Some Computing

Johnston, R.E.

and T.A. Linden

"Authentication in Office

"Comparison of Access Control Software for IBM

System Internetworks,"

Operating Systems:

Israel, J.E.

ACM

"Protection Imperfect:

Trans, on Office Infor. Syst.,

Security

July 1983, pp. 192-210.

Environments,"

ACM

Operating Systems Review

Journal ,

Key Words:

ACF2,

RACE, SAC, SECURE, TOP SECRET," Computer Security .

FallAVinter 1983, pp.

19-58.

July 1988.

JOB -89 Key Words:

control, general,

HOS-88 Hosmer, H.H. and

M. Merriman

CASE

Johnson, H.L., and C. Arvin

to

Embedded

Mechanisms: Weaknesses and Potential Improvements, Part " Computers & Security 1,

Tactical Systems," Proc. 12th

November

NCS-89). 1989. pp. 339-348.

,

Tools

control, software.

JOH-89

A.E. Oldenhoeft "A Survey of Password

design.

"Using

Key Words:

Jobush, D.L., and

1989, pp. 587-604.

"Security for Natl.

Comp.

Sec. Conf. . (5:

Improve the Security of Application Systems," Proc. 4th Aerosp.

Comp.

Sec.

Conf. (4: IEE-88b), 1988, pp. 205-208.

Key Words:

Key Words:

control,

passwords.

control,

requirements.

,

Key Words:

control,

techniques, methods, design.

JON-80

JOB-89a Jobush, D.L., and

Jonekait,

A.E. Oldenhoeft "A Survey of Password

"Gnosis:

Mechanisms: Weaknesses and Potential Improvements. Part " 2, Computers & Security

HOV-83 Hovig, P.L.

.

'To Install an Access Control System: Activities and

December 1989,

Checklists," Proc. IFIP/Sec.

Key Words:

;83, Stockhohn, 1983, (2:

passwords.

guidelines.

,

Key Words:

control,

OS,

capabiHty.

control,

JON-86 JOH-81

control,

Secure Capability

Based 370 Operating System." Proc. 3d Seminar, DoD Comp. Sec. Progr. (5: DOD-80a), 1980, pp. G1-G16.

pp. 675-689.

FAK-83), pp. 57-67.

Key Words:

J.

A

Jones,

Johnston, R.E. "Security Software Packages,"

Computer Security Journal

,

Spring 1981, pp. 15-38.

Key Words:

control, software.

R.W.

"The Design of Distributed Secure Logical Machines," ICL Technical Journal (UK) November 1986, pp. 291-308. ,

Key Words: network.

4-6

control, design,

JON-89

KAI-86

R.W.

KIE-88

M.

Kain, R.Y., and

Kielsky,

"Security Classes and Access

C.E. Landwehr

"Security and Access Control

Rights in a Distributed System," Report, Invitat.

Capability-Based Systems,"

Workshop on Data

Proc. 1986

Jones,

NIST,

"On Access Checking

Integrity ,

RUT-89), 1989,

(4:

Sec.

&

in

IEEE Symp. on

Privacy ,

pp. A.6.1-27.

pp. 95-101

Key Words:

Key Words:

IEE-86),

(5:

Features of the VAXA'MS Operating System," Information Age (U.K.) October 1988, pp. 203-210. .

Key Words: control, network,

control,

OS,

methods.

control,

c^abiUty.

design.

KNO-87 JOS-89

KAI-87

Joseph,

M.K.

Kain. R.Y., and

"Integration Problems in

C.E. Landwehr

Fault-Tolerant Secure

"On Access Checking

Computer Design," Preprints, International Working

Capability-Based Systems,"

IEEE

Conference on Dependable

Engr.

Computing

for Critical

Santa Barbara, 1989, pp. 141-147.

Applications

CA, Aug.

F.,

"A Least

Privilege

and

Bunch Mechanism

S.

for Unix," Proc. 10th Natl.

Comp.

in

Sec. Conf.

.

(5:

NCS-

87a). 1987. pp. 257-262.

Trans, on Software

Key Words:

February 1987, pp. 202-207. ,

control, technique.

KNO-88

,

Key Words:

Knowles,

Key Words:

Knox. M.J.. and E.D. Bowden "Unix System Security Issues."

KAR-88 Karger, P.A.

Information Age (U.K.) April 1988, pp. 67-72.

Juenemann, R.R.

"Implementing Commercial Data Integrity with Secure Capabilities," Proc. 1988

methods.

architecture,

design.

JUE-88

,

"Integrity Controls for

IEEE Symp. on

Military and Commercial

Privacy

Applications," Proc. 4th

130-139.

Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 298322.

(5:

,

Sec.

Key Words: OS,

&

KOE-84

IEE-88a), pp.

Koehring, J. "Automatic Identity Verification," Information Age (UK), April 1984, pp. 103-110.

,

Key Words:

control, integrity.

Key Words:

integrity,

,

capability.

KAR-88a

Key Words:

authentication,

methods.

Karren, D.T.

JUE-89

techniques,

'Typical System Access

Jueneman, R.R.

Control Problems and

"Integrity Controls for

Solutions," Information

Military and Commercial

(U.K.)

AppUcations,

32.

Invitat.

11,"

Report,

,

KON-81 Age

January 1988, pp. 23-

NIST,

(4:

RUT-89),

Key Words:

,

Spring 1981, pp. 45-60.

control,

techniques.

1989, pp. A.5.1-61.

Key Words:

"Developing Standards for Operating System Security,"

Computer Security Journal

Workshop on Data

Integrity ,

Konigsford, w.L.

Key Words:

control, integrity.

KAR-89

control,

OS,

methods.

Karger, P.A.

KAH-88

"New Methods

Kahane, Y., S.Neumann, and C.S. Tapiero "Computer Backup Pools, Disaster Recovery, and

Communications of

ACM

,

Symp. on Sec.

the

&

IEEE

Privacy ,

(5:

KRA-88 Krayem, R. "Smart Cards:

A New

Identification and

Tool for Access

Protection," Information capability,

Age

Key Words:

control,

techniques, authentication.

83.

contingency,

risks.

4-7

.

(U.K.). April 1988. pp. 85-88.

methods.

January 1988, pp. 78-

Key Words:

Immediate

IEE-89b), pp. 48-55.

Key Words:

Default Risks,"

for

Revocation," Proc. 1989

KUR-85

LAN-89

LEG-88

Landau, C.R. "Security in a Secure Capability-Based System," Operating Systems Review October 1988, pp. 2-

Legge, J. "Rendering a Commercial Operating System Security."

85). 1985. pp. 86-90.

4.

289.

Key Words:

Key Words: control, c^abiUty, techniques.

methods.

Kurth, H.

"Paper Output Labeling in a Dedicated System Running

Under MVS." Proc. 8th

Comp.

Sec. Conf.

(5:

,

Natl.

NCS-

techniques,

methods.

KUR-85a

ACM

,

"Easily

Remembered

Passphrases

— A Better ACM

Approach," Sec., Audit & Control Review FallWinter 1985. pp. 10-21. ,

passwords.

'88 . Australia,

CAE-89), pp. 273-

control,

OS,

LEV-83 Leveson, N.G., and

"Granting and Revoking

P.R. Harvey

"Analyzing Software Safety," Trans, on Software Engr. . September. 1983, pp. 569-579.

Discretionary Authority."

IEEE

Information Systems (U.K.). Vol. 13. No. 1. 1988. control,

Key Words:

discretionary, methods,

control,

(2:

Larson. J.A.

Key Words: Key Words:

1989,

Key Words:

LAR-86

Kurzban, S.A.

MP/Sec.

Proc.

software, safety.

techniques.

LIP-82

KUR-89

LEE-84

Kurzban,

S.

'Toward a Model for Commercial Access Control," Report, Invitat. Workshop on Data Integrity NIST, (4: RUT-89), 1989. pp. A.9.1-6. ,

Lipner, S.B.

Lee, T.M.P.

'Tlondiscretionary Controls for

"Future Directions of Security

Commercial Applications," Proc. 1982 IEEE Symp. on

for Sperry Series 1100 Computers," Proc. 7th Seminar, DoD Comp. Sec

Sec.

Key Words:

control, models.

J.Y.

on Newton's Interpolating Polynomial," IEEE Trans, on Software Engr. September ,

1989. pp. 1135-1137.

Key Words:

"Secure System Development

Lee, T.M.P.

at E)igital

"Using Mandatory Integrity Enforce 'Commercial' Security," Proc. 1988 IEEE

Symp. on

&

Sec.

Privacy

,

to

(5:

IEE-88a), pp. 140-146.

Key Words:

control,

control, integrity,

LAM-81

Legrand, S. "Access Control for a Safety

With Insecure Communication." Communications of

Critical Distributed

ACM. November

Interface Set,"

1981. pp.

770-772.

Commercial and Government Customer Base," Proc. 9th Natl.

Comp.

Key Words: developemnt,

System No. 87-

AL^

3083, Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b). 1987. pp. 108-113.

Key Words:

authentication,

Wong

Lipton, D.L. and H.K.T.

"Modem

Trends in

Authentication,"

ACM

Security

Audit & Control Review Winter 1985, pp. 35-42.

,

.

Key Words: general.

methods, passwords, network.

Sec. Conf. , (5:

NCS-85), 1985, pp. 120-123.

LIP-85a

LEG-83

Lamport, L. "Passwords Authentication

the

Equipment:

Targetting the Needs of a

description.

methods.

techniques.

controls, methods,

Lipner, S.B.

LEE-88

"On the Design of a SingleKey-Lock Mechanism Based

IEE-82),

LIP-85

Ham. and

Lee

(5:

control, design,

methods.

Laih. C.S., L.

,

techniques.

Key Words: LAI-89

Privacy

DOD-84), 1984,

Progr. , (5:

pp. 161-168.

Key Words:

&

pp. 2-10.

.

Key Words:

control,

techniques.

4-8

authentication,

MEN-88

LIP-86

MON-84

Lipton, D.L.

Menkus, B.

Montini, G., and F. Sirovich

"Logical Authentication

Audit & Control Review Spring 1986,

"Understanding the Use of Passwords," Computers & Security April 1988, pp. 132-

Office Structures," Proc. mP/Sec. '84 Toronto, 1984,

pp. 9-20.

136.

(2:

Study,"

ACM

Sec., ,

Key Words:

authentication,

.

Key Words:

"Access Control Models and .

FIN-85), pp. 473-485.

Key Words:

awareness,

control, models.

passwords.

methods.

MOR-86

MEN-88a

LOP-84

Morshedian, D.

"How

Menkus, B.

Lopriore, L.

"Capability Based Architectures,"

Tagged

IEEE

Trans,

"Understanding Password

Compromise," Computers Security

1984, pp. 786-803.

549-552.

Key Words:

Key Words:

,

,

&

December 1988, pp.

on Computers September

Passwords and Win," IEEE Computer January 1986, pp. to Fight

Pirates

,

104-105.

Key Words: architecture,

awareness,

control,

passwords.

passwords.

capability.

MUR-84 LUK-84

MIL-89

Luke, L.R. "Password Security Systems," EDPACS October 1984, pp. ,

1-6.

Murray, W.H.

MiUer, D.V., and

"Security Considerations for

R.W. Baldwin

Personal Computers,"

IBM

"Access Control by Boolean Expression Evaluation," Proc. 5th Security Applic. Conf. (4: IEE-89c), 1989. pp. 131-139.

Systems Journal No.

3,

,

1984,

pp. 297-304.

,

Key Words:

control,

Key Words:

LUN-89

Password Usage FIPS-PUB 112, National Bureau of .

MIN-84

"Access Control Policies:

Some Unanswered

&

Questions," Computers

February 1989, pp.

43-54.

Key Words:

control, policy.

MAR-87

Minsky. N.H. "Selective and Locally Controlled Transport of

May

Privileges."

ACM Trans, on Programming Languages and

Key Words:

Systems October 1984.

management.

.

Key Words:

Maria, A. "RACE Implementation

control,

control,

software,

MD,

1985.

passwords,

guidelines, techniques,

NBS-85a Authentication ,

at

,

Standards, Gaithersburg,

Standard on Computer Data

techniques.

Pudget Power," Proc. 10th Nad. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 91-97.

Key Words:

PC,

NBS-85

Lunt, T.F.

,

control,

control,

techniques.

Security

Key Words: methods.

passwords.

MOF-88 Moffett, J.D. and

M.S. Sloman "The Source of Authority for Commercial Access Control," IEEE Computer February ,

FIPS-PUB

113.

National Bureau of Standards, Gaithersburg. MD. May 1985.

Key Words:

authentication,

methods, guidelines, techniques.

1988, pp. 59-69.

MAR-88

NES-83

Martin. D.F., and J.V.

"Adding

ADA

Cook

Key Words:

control,

management.

Program

Nati.

Comp.

Sec. Conf.

,

(5:

NCS-88). 1988, pp. 139-146.

Key Words: verification, methods.

in

LINCS," Proc. 6th Seminar,

DoD Comp.

MOL-84

System (SDVS)," Proc. 11th

D.M. Mechaiusms

"Security

Verification Capability to the State Delta Verification

Nessett,

Molloy, C. "Improving Security Controls within CICS." TeleSystems Journal . March/April 1984, pp. 3-11.

Key Words:

control, methods.

4-9

Sec. Progr. , (5:

DOD-83a), 1983, pp. 60-64.

Key Words: description.

control,

NEW-86

PAA-86

Newsome, R.M. "Access Controls Within an IBM System/34 Environment," EDPACS ,

December 1986,

Key Words:

POZ-89

Paans, R.

pp. 1-6.

Close Look at MVS Systems: Mechanisms, Performance and Security North-Holland Elsevier, New York, 1986.

A

,

"Work-in Progress: Transformation Procedure (TP) Certification." Report. Invitat.

Workshop on Data NIST.

(4:

Key Words:

book, control,

Key Wprds:

methods.

NEW-88

certification,

methods.

Newberry, M., and J. Seberry "Experience in Using a Type Signature Password for User

PAA-86a Paans. R.

Authentication in a Heavily

"Performance Aspects of Access Control," Proc.

Used Computing

IFIP/Sec. '86 .

Environment," Proc. IMF/Sec.

1986.

'88 . Australia, (2:

(2:

Monte

MVS

Carlo,

GRI-89).

Key Words:

Information for Security, Load Balancing, and Fault

ACM

,

348.

PAA-86b

Key Words:

Paans, R.. and I.S. Herschberg

OPA-86 Opaska, W.P. "Access Control Systems for Personal Computers,"

"How to Control MVS User Supervisor Calls." Computers

&

Security

March 1986,

,

pp.

Key Words:

6-8.

RAJ-82 Rajunas, S.A.

Systems," Proc. 5th Seminar,

control,

DoD Comp.

description. control,

control, design,

methods.

"Meeting Policy Requirements Using Object-Oriented

46-54.

August 1986, pp.

Key Words:

M.O.

control,

passwords.

,

Rabin,

Tolerance," Journal of the AprU 1989. pp. 335-

control,

description.

Key Words:

RAB-89 "Efficient Dispersal of

CAE-89).

1989, pp. 303-307.

Sec. Progr.

.

(5:

DOD-82), 1982. pp. 227-232.

PC,

POS-87

methods.

G.V. "Improving Operating System

Post,

OPA-86a Opaska, W.P. "Closing the

VAX

Security."

Default

Computers

&

Security . October 1987. pp.

417-425.

pp. 6-9.

Key Words:

control,

OS,

Underwood

"CRACK; A

Proceedings.

control,

POW-87

,

Paans, R., and G. Bonnes

Key Words:

"Surreptitious Security

Computers

passwords.

Violation in the

February 1987, pp. 41-48.

MVS

&

Security

,

&

Security . June

1983. pp. 144-152.

1988.

Key Words:

authentication,

methods.

Randell. B.. and J.E.

threats,

OS,

Dobson

and Security Issues Distributed Computing

"Reliability in

Key Words:

control,

RAN-86

Operating System,"

Computers

USENIX UNIX

Workshop August

Security

Power, J.M., and S.R. White "Authentication in a Heterogenous Environment,"

PAA-83

Distributed

Password Adviser,"

methods. passwords, vulnerabilities.

requirements,

RAL-88 R.

,

Key Words:

Key Words: policy.

Raleigh, T.. and

Password 'Backdoor'," EDPACS September 1986,

methods.

Integrity .

RUT-89). 1989, pp.

A.8.1-15.

control,

description.

EDPACS

P0ZZ0.M.. and S. Crocker

POZ-86

Systems," Proceedings, 5th

Pozzo. M.M.. and T.E. Gray

IEEE Symposium on

"Managing Exposure

Reliability in Distributed

to

Potentially Malicious

Programs," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS86). 1986, pp. 75-80. .

Software and Database Systems January 1986, pp. 113-118. ,

Key Words: Key Words:

threats,

management.

4-10

methods.

control, design,

RUT-89

REE-84 Weinburger "File Security and the UNIX System Crypt Command,"

Reeds,

AT&T

and

J.,

P.

SAT-88

Ruthberg, Z.G., and W.T. Polk Report of the Invitational

M.

Satyanarayanan,

"Integrating Security in a

Large Distributed System," Postscript, 11th

Journal October 1984, pp.

Workshop on Data Integrity SP 500-168, National Institute

1673-1684.

of Standards and Technology,

1988, pp. 91-108.

Bell Lab. Technical .

,

Gaithersburg,

Key Words:

MD,

Sept. 1989.

Key Words:

control,

Key Words:

techniques.

Nad. Comp.

Sec. Conf. , (5: NCS-88a),

proceedings,

control, design,

network.

integrity.

SCH-83

REI-86 Reid, B.

"Lessons from the UNIX Breakin at Stanford," Software Engineering Notes, October 1986, pp. 29-35.

ACM

SAN-88 'Transaction Control

"Computer Security: Make Your Passwords More

Expressions for Separation of

Effective,"

Duties," Proc. 4th Aerosp.

1983. pp. 6-11.

Comp.

Key Words: OS.

Schweitzer, J.A.

Sandhu, R.

.

control,

SCH-88

DA.

Schokley. W.R.

(U.K.). July 1988. pp.

162-168.

SAN-88a Sandhu, R.S. "The N-Tree: A Two Dimensional Partial Order for Protection."

Key Words:

Key Words:

integrity,

techniques.

"Access Control Methods of VAXA'MA." Information

Age

February

passwords, methods.

Key Words: Reisinger.

,

Sec. Conf. . (4: lEE-

88b). 1988. pp. 282-286.

vulnerabilities.

REI-88

EDPACS

ACM

Trans, on

Computer Systems May 1988.

control,

.

"Implementing the Clark/Wilson Integrity Policy Using Current Technology." Postscript, 11th

Sec. Conf.

.

(5:

Nad. Comp. NCS-88a).

1988, pp. 29-37.

pp. 197-222.

descriptions.

Key Words: Key Words:

RID-89

control, methods.

intgerity, policy,

methods.

Riddle. B.L.. M.S. Miron,

and J.A. Semo "Passwords in Use in a University Timesharing Environment," Computers Security,

November

SHA-87

SAN-88b

&

1989, pp.

Sandhu, R.S. "Nested Categories for Access

Shannon, T.C.

Control," Computers

Mechanisms and Techniques," Computer

Security

,

&

December 1988, pp.

599-605.

569-579.

"An

Introduction to

VAX/VMS

Security

Security Journal

,

Vol. IV, No.

2, 1987, pp. 39-47.

Key Words:

Key Words:

control,

control, methods.

Key Words:

passwords.

SAN-89

ROW-87 Rowe,

K.E., and

Sandhu, R. 'Terminology, Criteria and System Architectures for Data

CO. Ferguson, Jr. "ADA Technology/Compusec

Integrity," Report, Invitat.

Insertion Status Report,"

Workshop on Data

Proc. 10th Nad.

Comp.

Sec.

Conf. (5: NCS-87a). 1987, pp. 357-360. .

NIST,

(4:

control,

Integrity ,

RUT-89). 1989, pp.

SHE-89 Sherizen, S., and F. Engel "Striving for Unix Security," Computerworld, March 20,

1989, pp. 85-93.

A.4.1-14.

Key Words: Key Words:

Key Words:

control,

description.

control, general,

methods, guidelines.

requirements.

4-11

description.

control,

SIM-81 Simmons, GJ. "Half a Loaf Is Better than None: Some Novel Integrity Problems," Proc. 1981 IEEE Symp. on Sec. & Privacy (5: IEE-81), pp. 65-69. ,

STO-89

TEN-88

and R. Furuta "Access Control and

W.

Stotts, P.S.,

Tener,

Verification in Petri-Net-Based

"AI and 4GL: Automated Detection and Investigation

Hyperdocuments," Proc.

Tools," Proc. IFIP/Sec. '88.

COMPASS Assurance

Comp.

'89: (2:

,

IEE-89), 1989,

Australia, 1989, (2:

CAE-89),

pp. 23-29.

pp. 49-55.

Key Words:

Key Words: methods,

integrity, design,

methods, requirements.

Key Words:

control,

verification,

methods.

THO-82

SIN-85

SUM-84

Singh. K.

"On Improvements

Password Security," ACM Operating Systems Review

Thom, A.B.

Summers, R.C. "An Overview of ComjHiter

to

,

January 1985, pp. 53-60.

Security,"

IBM

Systems

control,

THO-88

awareness, general.

SMI-87

SYM-84

Smith, S.L. "Authenticating Users by

Symons, C.R., and

Word

JA. Schweitzer "A Proposal for an Automated

Association," Security ,

December 1987,

control, methods,

architecture.

Key Words:

&

pp. 105-107.

Key Words:

control,

passwords.

Computers

"Hardware Security," Computer Security Journal , WintCT 1982,

Journal, Vol. 23, No. 4, 1984,

pp. 309-325.

Key Words:

techniques.

pp. 464-470.

Logical Access Control

Thomas, T. "A Mandatory Access Control Mechanism for the UNIX File System," Proc. 4th Aerosp. Sec. Conf. (4: EEE88b), 1988, pp. 173-177.

Comp.

.

Standard," Proc. IFIP/Sec. '84.

Key Words:

authentication,

methods.

Key Words:

SOL-88 K.R. "Cascaded Authentication," Proc. 1988 IEEE Symp. on Sollins,

Sec.

Toronto, 1984, pp. 115-127.

&

Privacy, (5: IEE-88a).

pp. 156-163.

Key Words:

authentication,

(2:

FIN-85),

control,

TAN-82

Proc. 9th Nad.

Comp.

Sec.

Conf. (5: NCS-86). 1986. pp. 138-142. .

Computer

Interactive

Key Words:

control, design,

methods.

USA-80

Computer Users

(Tokens)," Computers

&

Security , October 1987, pp.

Key Words:

control,

techniques.

Proceedings. Third Automation Security

Workshop U.S. Army .

Computer Systems Command, December 1989.

TEN-87 Tensa, D.

385-395. authentication,

methods.

'Typical Weaknesses in Operating Systems Software," Information Age (U.K.), April 1987, pp. 74-78.

Key Words:

proceedings,

control.

,

STE-83

VAC-89 Vaccaro, H.S., and

Steinauer, D.D.

Key Words: OS,

'Technical Security Issues in

vulnerabilities.

Small Computer Systems," Proceedings, 1983 CQMPCQN Fall, September

G.E. Liepins "Detection of Anomalous Computer Session Activity," Proc. 1989

Sec.

&

IEEE Symp. on

Privacy .

(5:

pp. 289-289.

1983.

Key Words:

Habibi

70.

with Authentication Devices

Key Words:

J.

the Interactions of

Security and Fault-Tolerance,"

Tangney, J.D., and P.S. Tasker "Safeguarding Today's

Spender, J.-C. "Identifying

TUR-86 "On

.

SPE-87

control,

Turn, R., and

guidelines.

Systems," Computer Security Journal Winter 1982, pp. 57-

methods.

Key Words:

mandatory, description.

control,

Key Words:

PC,

methods.

techniques.

4-12

control,

IEE-89b),

WAG-88

VAN-83 Van de

Riet, R.R.,

and

M.L. Kersten "Privacy and Security in Information Systems Using Language Features," Information Systems (U.K.), Vol. 8, No. 2. 1983, pp. 95,

103.

WIL-81

Wagner, D.A. "System Security

in

Space

Flight Operations Center,"

Proc. 4th Aerosp.

Comp.

Sec.

Key Words:

Key Words:

control,

vulnerabiUties,

Developments on System Security," Computers &

November 1984,

WON-85

Walsh, M.E. "Software Security," Journal of Systems Management, October 1981, pp. 6-13.

Goor, A.J. "Effects of Technical

Key Words:

control, design,

methods.

Key Words:

VAS-83

Security Aspects,"

Information Privacy (U.K.), March 1981, pp. 68-74. ,

Vasak, J.M. "Issues in Secure System

No. 87-

3089, Proc. 3d Aerosp. Comp. Sec. Conf. (5: lEE87b), 1987, pp. 114-117.

control,

passwords.

Wattam, K.W. "Virtual Machine Enviromnent



AIAA

R.

"One-Time Passwords Fortify System Security," Computerworld, December 23,

control, software.

WAT-81

Acquisition,"

Wong,

1985, pp. 31-32. pp.

315-322.

Key Words:

,

threats, description.

WAL-81

,

Review January 1981, pp. 1425.

control, methods.

VAN-84 Van de

Security

Burroughs Large Systems," ACM Operating Systems

Conf. . (4: IEE-88b), 1988, pp. 426-430.

description.

Key Words:

Wilkinson, A.L., et al. "Penetration, Analysis of the

WON-89 Wong, R.M. and Y.E. Ding "Providing Software Integrity

Using Type Managers," Proc. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 287-

4th Aerosp.

Key Words:

control,

.

298.

architecture.

,

WEI-88

Key Words:

Key Words:

control, design,

methods.

VET-80

E.G. Amoroso "Ensuring Software Integrity," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 323-330. .

Vetter, L.L.

"Computer Access Control Software,"

EDPACS

Key Words:

,

February 1980, pp. 1-12.

Key Words:

Vinter, S.T.

Password Techniques." in RuUo. T.A.. (Ed.). Advances in

Computer Security Management Vol. ,

1,

Heyden

Key Words:

control,

passwords, general.

,

pp. 128-130.

IEEE Symp. on

Key Words:

(5:

Wood. H.M. "A Survey of Computer-Based

Son, Inc. Philadelphia, PA, 1980, pp. 140-167.

"Extended Discretionary Access Controls," Proc. 1988 ,

WOO-80

&

WeUs, P. "On-Chip Hardware Supports Computer Security Features," Electronics March 8, 1984,

VIN-

Privacy

integrity,

software,

WEL-84

control,

software.

integrity, software,

techniques, methods.

Weiss, J.D., and

Sec.

&

IEE-88a), pp. 39-

Wood, C.C. control,

control,

With Password

Controls," Computers

WEL-88 discretionary.

"Effective Information Systems

Security

architecture.

49.

Key Words:

WOO-83

&

Security , January 1983, pp. 5-

WeUs, C. "A Note on

10.

'Protection

ACM

Operating Systems Review October

Imperfect',"

,

1988.

Key Words:

control, methods.

4-13

Key Words:

control passwords.

WOO-84

WUM-84

WOO-87

Wood. M., and

T. Elbra

System Design

for

Woodcock, M.E. "The Use of ADA

Data

Wu, M.L., and T.Y. Hwang in Secure

Computer Centre (UK), J. Wiley & Sons, Chichester,

and Reliable Software," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 362-

1984.

365.

Protection

,

National

,

"Access Control with Single Key-Lock," IEEE Trans, on Software Engr. May 1984, pp. ,

185-191.

Key Words: Key Words: book,

general,

control, design, methods.

Key Words:

YEO-85

methods.

Yeo. O.K.

WOO-88

WOO-85

"Incorporating Access Control

Wood, C.C.

Wood, C.C.

"Floppy Diskette Security Measures," Computers & Security September 1985, pp. 223-228.

"Extended User

&

The Next Major Enhancement to Access

109-122.

Packages," Proc. IFIP/Sec.

Key Words:

,

in

Authentication:

'88 , Austraha, (2:

Key Words:

control,

PC,

authentication,

methods.

System Security

Hayden Publishing

Lines:

WOR-85 "IBM Dynamic

Verification," Proc. IFIP/Sec.

control,

85), pp. 129-154.

methods, description.

Key Words:

WOO-86

authentication,

methods.

Wood, C.C, and H.M. Zeidler "Security Modules: Potent

Information Security System

Components," Computers

&

June 1986, pp. 114-

121.

Key Words:

Can They Be

&

Secured,"

Security

,

al.

Signature

284, Toronto, 1984, (2: FIN-

Key Words: book,

Jr.

February 1988, pp. 35-36.

Worthington, T.K., et

,

Co.,

control, methods.

"Dial-Up Communication

Computers

Hasbrouck Heights, NJ, 1985.

,

June 1985, pp.

,

Zajac, B.P.,

Wood, P.H., and S.G. Kochan

Security

Security

ZAJ-88

1989, pp. 223-234.

Key Words:

UNDC

Forms Systems," Computers

CAE-89),

methods.

WOO-85a

control, technique.

control, software,

control,

techniques.

4-14

Key Words:

control, network.

5.

This

section

cites

architecture research

Trusted Systems

publications

on trusted operating systems and trusted systems

and development, formal evaluation

criteria,

implementation of the

reference monitor concept, design of trusted operating systems, descriptions of specific systems,

correcmess proof methods and techniques for trusted systems, and certification AME-81

ABR-86

Security Tutorial

,

S.R.,

Jr.

"Security Kemels:

Anderson, E.R.

A

"ADA'S

Solution

IEEE Symp. on

IEEE

&

Sec.

Privacy. (5: IEE-81), pp. 141150.

book, general,

Key Words: kemels,

Privacy

"Cryptographic Solution to a Multilevel Security Problem,"

and R.R. Schell "Security Kernel Design and

Proc. Crypto '82, Santa

Implementation:

CHA-83b), 1982,

Jr.,

Arnold, T.S.

Gasser,

"The

Seminar,

July 1983, pp. 14-22.

Key Words: MLS,

Key Words:

cryptography.

general.

,

Key Words: MLS,

"Accelerating

Distributed Systems,"

Security Innovations," Proc.

J.P.

Computer

1982 IEEE Symp. on Sec. Privacy

,

"Multilevel Security from a

&

IEE-82), pp. 91-

(5:

trusted,

methods,

AME-80

Anderson,

,

design,

methods.

TCB

Security Kernel," Proc. 1980

Proc. 1983

IEEE Symp. on

Sec.

&

IEE-80), 145-

"Security Approach for Rapid

to

Identification of

"Demonstrating Security for Trusted Applications on a

Minimum

requirements for Various

Threat/Risk Environments," Sec.

&

IEEE Symp. on

Privacy

,

(5:

pp. 102-104.

Prototyping in Mutlilevel

Secure Systems," Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989, pp. 328-334. ,

IEE-83a),

Key Words: MLS, methods.

156.

Key Words: TCB, Key Words:

Sec. Conf.

Asby, V.A., T. Gregg, and A. Lee

J.P.

"An Approach

and

J.G. Keeton-Williams

(5:

Comp.

NCS-85), 1985, pp. 43-46.

ASH-89

AND-83

,

(5:

general.

criteria,

networks.

Privacy

8th Natl.

Key Words: MLS, Key Words:

S.R.,

Practical Point of View," Proc.

97.

127.

Ames,

design,

Arnold, T.S.

"Criteria Extension for

Key Words:

.

ARN-85

Anderson,

,

Sec

DOD-84), 1984, pp.

methods.

AND-82

No. 87-3095. Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 122-

DoD Comp.

Progr. . (5:

30-37.

kernel, design,

Albert, S.B.

AIAA

Practical Aspects of

Multi-level Security," Proc. 7th

An

IEEE Computer

Introduction,"

pp. 237-249.

ALB-87

trusted,

ARN-84 M.

Ames, S.R.

(9:

&

IEE-85), pp. 184-

requirements.

Akl, S.G., and P.D. Taylor

Barbara,

(5:

Key Words:

general,

AME-83

AKL-82

,

189.

methods.

methods.

Suitability for Trusted

Computer Systems," Proc. 1985 IEEE Symp. on Sec.

or a Problem," Proc. 1981

Computer Society Press, Washington, DC. 1986.

Key Words:

AND-85

Ames,

Abrams, M.D., H.J. PodeU (Eds.). Computer and Network

criteria.

tusted, kernel,

requirements, risk.

methods.

5-1

design,

BAR-84

BEN-84

BEV-89

Bames, D. "Secure Communications

Benzel, T.V.

Bevier,

W.R.

"Analysis of a Kernel

"Kit:

Study in Operating

Processor Research," Proc.

Verification," Proc.

DoD Comp.

7th Seminar, Sec. Progr.

,

(5:

IEEE Symp. on

DOD-84),

Privacy ,

1984, pp. 312-318.

Key Words: MLS,

(5:

1984

Sec.

&

IEE-84), pp. 125-

design,

Key Words:

verification,

November 1989,

pp. 1382-

Key Words:

verification,

OS,

case.

kernel.

BAR-88

System Verification," IEEE Trans, on Software Engr., 1396.

131.

network.

A

BEN-85

BIR-86

Barker, W.C., P. Cochrane,

Benzel, T.C.V. and

Birrell,

and M. Branstad "Embedding Cryptography into a Trusted Mach System," Proc. 4th Aerosp. Comp. Sec. Conf.. (4: IEE-88b), 1988, pp. 379-383.

D.A. Travilla,

"A Global Authentication

'Trusted Software

Service Without Global Trust,"

Case Study," Proc. 1985 IEEE Symp. on

Proc. 1986

pp. 14-31.

Key Words: OS,

Key Words:

Verification:

Sec.

&

A

Privacy

,

(5:

IEE-85),

A.D., et

&

Sec.

IEEE Symp. on

Privacy. (5: IEE-86),

pp. 223-230.

Key Words: design,

cryptography.

verification,

al.

authentication,

methods.

software.

BLA-81

BAR-89

-BEN-89

Blakely, G.R., G.

Ma,

Benzel, T.C.V.

and L. Swanson

"Use of Privacy-Enhanced Mail for Software

"Developing Trusted Systems Using DOD-STD-2167A,"

Information Protection

Distribution," Proc. 5th

Proc. 5th Sec. Applicat. Conf. ,

Systems," Proc. 1981

Barker,

W.C.

Security AppHcat. Conf.

,

(4:

IEE-89C), 1989, pp. 344-347.

(4:

IEE-89C), 1989, pp. 166-

176.

Key Words: methods,

Key Words:

software.

methods.

BAX-86

trused, design,

"Security Proofs for

Symp. on Sec.

Key Words:

S., K. Lynch, Lipner

Blotcky,

"A Layered

"Security and Protection of

and

1986,

(2:

GRI-89).

Key Words: MLS,

IBM

Data in the

Proceedings, 7th

System/38,"

IEEE

Comp.

86), 1986, pp. 47-54.

Key Words:

7th Seminar, Sec. Progr.

,

DoD Comp.

(5:

DOD-84),

Key Words: MLS, design.

design, methods,

trusted,

Key Words: MLS,

design,

BOE-85

BER-88 Berch, R.,

et al.

"Use of Automated Software Development Methodology," Proc. 11th Natl.

NCS-

Sec. Conf. , (5:

case.

Verification Tools in a Secure

1984, pp. 24-29.

"SEA^MS: Implementing Mandatory Security in VAXA'MS," Proc. 9th Nad.

252.

case.

BeU, D.E. "Working Toward Al," Proc.

S.

Conference on Computer Architectures, 1980, pp. 245-

architecture.

BEL-84

verification,

BLO-86

Berstis, V.

,

(5:

methods.

BER-80

Multilevel Security," Proc. IFIP/Sec. '86 Monte Carlo,

IEEE

Privacy , IEE-81), pp. 75-88.

Baxter, M.S.J.

Architecture for

&

Comp.

Sec. Conf. , (5:

NCS-88). 1988, pp. 284-289.

Key Words:

verification,

software.

5-2

Boebert, W.E., R.Y. Kain,

and W.D. Young "Secure Computing: The Secure Ada Target Approach," Scientific Honeyweller July ,

1985, pp. 1-17.

Key Words: MLS, methods.

design,

BON-89

BOE-85a Boebert, W.E., et

BRA-88a

Bondi, J.O., and M.A. Branstad

Branstad, M., H. Tajalli,

"Architectural Support of

"Security Issues of the Trusted

Mach

176-183.

Fine-Grained Secure Computing," Proc. 5th Security Applicat. Conf. (4: IEE-89c). 1989. pp. 121-130.

Key Words: MLS,

Key Words:

policy, case.

verification, design.

design.

"Secure

Ada

al.

Target: Issues,

System Design, and 1986

Verification," Proc.

IEEE Symp. on Privacy

.

Sec.

&

IEE-86), pp.

(5:

and

F.

Mayer

System," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 362-367. ,

,

Key Words: architecture,

Boebert, W.E. Demonstration," 'The

Branstad, M., et

1988, pp. 73-88.

Brand. S.L. "Environmental Guidelines for Using the DoD Trusted Computer Systems Evaluation Criteria," Proc. 7th Seminar.

Key Words: TCB.

DOD-84), 1984, pp. 17-23.

LOCK

Postscript, 11th Natl.

Comp.

Sec. Conf. , (5: NCS-88a),

OS,

BRA-89

BRA-84

BOE-88

trusted,

DoD Comp.

al.

"Access Mediation in a Message Passing Kernel," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b), ,

pp. 66-72.

Sec. Progr. , (5:

Key Words:

architecture, design.

control, kernel,

design.

Key Words: BOE-88a

criteria,

BRA-89a

guidelines.

M„ and J. Landauer "Assurance for the Trusted Mach Op>erating System," Proc.

Boebert, W.E.

Branstad.,

"Constructing an Infosec

System Using the LOCK Technology," Postscript, 11th Natl. Comp. Sec. Conf. (5: NCS-88a), 1988, pp. 89-95. ,

Key Words: TCB,

BRA-86 Branstad, M.A., et 'Trust Issues of Proc. 9th Natl.

al.

MACH-1,"

Comp.

COMPASS-89. Comp. Assurance

Sec.

Conf. (5: NCS-86), 1986. pp. 209-212.

103-108.

Key Words:

case.

,

Key Words:

design,

techniques.

(4.

,

trusted,

OS,

IEE-89), pp.

verification,

OS,

policy, case.

BON-83

BRI-85

Bonyun. D.A. 'The Use of Architectural Principles in the Design of

BRA-87

Britton, D.E.

Branstad, M.. et

'Trusted

Mach

"Verlangen:

al.

Design," Proc.

Certifiably Secure Systems."

3d Aerosp. Comp. Sec. Conf.

Computers

(5:

&

Security

,

June

.

IEE-87b). 1987. pp. 24-29.

Key Words: OS,

Bonyun, D.A. "Formal Verification: Its Purpose and Practice." Proc.

mP/Sec. (2:

'84 Toronto, 1984, FIN-85), pp. 217-223.

Key Words: general.

.

verification,

Verification

Secure Systems," Proc. 8th Natl.

Comp.

Sec. Conf. , (5:

design, case.

Key Words:

BRA-88

verification,

methods.

Branstad, M., and F.L.

BON-84

A

for Designs of

NCS-85), 1985, pp. 70-81.

1983, pp. 153-162.

Key Words: architecture, TCB, design.

Language

Mayer

"Access Mediation in ServerOriented Systems: An Examination of Two Systems," Proc. 11th Natl. Comp. Sec. Conf. , (5: NCS88). 1988. pp. 309-318.

Key Words:

control, design,

BRO-88 Brown, G.L. "Interdependence of Evaluated Subsystems," Proc. 11th Natl. Comp. Sec. Conf. , (5: NCS88), 1988, pp. 330-332.

Key Words: general.

methods.

5-3

trusted, design,

COX-81

CAS-89

BUS-83 Bussolati, U.

and G. Martella

"The Design of Secure Distributed Systems,"

Proceedings, 1983

Delivery," Proc. 5th Security

IEEE

Compcon

Spring Conf. pp. 492-498.

Casey, T., et al. "Secure Automated Document

,

Applicat. Conf.

1983,

IEE-89c),

(4:

Privacy

Key Words: Key Words:

,

1989, pp. 348-355.

Cox, L.A., and R.R. Schell 'The Structure of a Security Kernel for a Z8000 Multiprocessor," Proc. 1981 IEEE Symp. on Sec. &

trusted,

methods.

,

(5:

IEE-81), pp. 124-

129.

trusted, design,

CHE-81

general.

Key Words:

Cheheyl, M.H., et

CAR-86

al.

"Verifying Security,"

ACM

kernel, design,

case, architecture.

CRA-84

Carlson, R.A., and T.F. Lunt,

Computing Surveys

"The Trusted Domain Machine: A Secure Commimications Device for Security Guard Applications," Proc. 1986 IEEE Symp. on

September 1981, pp. 279-339.

Craigen, D.,

Key Words:

"Ottawa Euclid and EVES: Status Report," Proc. 1984

Sec.

&

Privacy

IEE-86),

(5:

.

pp. 182-186.

Key Words:

trusted,

network,

,

verification,

IEEE Symp. on

general.

Privacy

COO-88

(5:

Sec.

&

IEE-84), pp. 114-

124.

Cook, J., and D.F. Martin "Adding Ada Program

Key Words:

Verification Capability to the

design, case.

verification,

State Delta Verification

design.

System (SDVS)," Proc. 11th Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 139-146.

CAR-87

,

Carson, M.E., et

"From B2

to

al.

CMU:

Building

a Compartmental Mode Workstation on a Secure

Comp.

Aerosp.

Sec. Conf.

Craigen, D.

"m-EVES," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-

verification,

87a), 1987, pp. 109-117.

methods.

Key Words: ,

IEE-87b), 1987, pp. 35-

COR-84

design,

case.

CAR-88

Comwell, M.R. and

CRO-88

"Structure of a Rapid

Crocker, S.D., et

Prototype Secure Military

"Reverification of a

Message System," Proc. 7th

DoD Comp.

Microprocessor," Proc. 1989

Seminar,

IEEE Symp. on

Program

(5:

,

Sec.

DOD-84), 1984,

pp. 48-57.

Carroll, J.M.

verification,

design, case, methods.

R.J.K. Jacob

43.

Key Words: MLS,

CRA-87

,

Key Words:

Xenix Base," Proc. 3d (5:

.

A

Privacy

.

(5:

al.

Sec.

&

IEE-89b), pp. 166-

176.

"Implementing Multilevel Security

Key Words: MLS,

Privilege,"

case, network.

by Violation Computers & Security December 1988, pp.

design,

COR-89 Comwell, M.R.

Key Words: MLS,

design,

methods.

CAS-88 Casey, T.A., et al. "A Secure Distributed Operating System," Proc. 1988 IEEE Symp. on Sec. & Privacy (5: IEE-88a), pp. 27,

verification,

architecture, techniques,

methods, case.

,

563-573.

Key Words:

"A Software Engineering Approach

to

Designing

Trustworthy Software," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b). pp. 148-156 .

Key Words:

trusted, software,

CRO-88a Crow,

J.S., et al.

"EHDM

Verification

Environment

38.

Key Words: MLS, OS, network, design.

5-4

Overview,"

Comp.

Sec.

Conf. (5: NCS-88), 1988, pp. 147-155. ,

Key Words: design, case.

design.

— An

Proc. 11th Natl.

verification,

CSC-88a

CRO-89

CSC-89a

Crocker, S.D., and E.J. Siarkiewics

A

"Software Methodology for Development of a Trusted

NCSC-TG-001, National

MBS,"

Understanding Audit inTrusted Systems,

Proc. 5th Security

ApplicaL Conf.

,

Guide

to

Rating Maintenance Phase

Computer Security Center, Ft Meade, MD, 1 June 1988.

Program Document NCSCTG-013, National Computer Security Center, Ft. Meade, MD, 23 June 1989.

Key Words:

Key Words:

,

IEE-89c),

(4:

1989, pp. 148-165.

guidelines,

gtiidelines, design.

auditing.

Key Words:

CUM-87

trusted, software,

CSC-88b

methods.

Cummings,

CSC-85 Computer

Security

Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria ,

CSC-STD-003-85. National Computer Security Center, Ft. Meade, MD, 25 June 1985.

Interpretation of the Trusted

Computer System Evaluation

Prototyping," Proc. 1987

NCSC-TG-009,

Criteria,

Symp. on Sec.

National Computer Security

Ft Meade, September 1988.

Center,

MD.

IEEE

Privacy

,

(5:

16

Key Words: MLS,

design,

case, methods.

Key Words:

guidelines,

TCB,

CUT-88

criteria.

CSC-88C

guidelines,

&

IEE-87a), pp. 2-12.

M.

Cutler,

Key Words:

P.T., et al.

"Compartmented Mode Workstation: Results Through

Computer Security Subsystem

"Verifying Implementation

A

Guide to Understanding Design Documentation in Trusted Systems NCSC-TG-

Correctness Using the State

Technical Rationale Behind

007, National Computer

Comp.

CSC-STD-(X)3-85: Computer Security Requirements CSCSTD-004-85, National

Security Center, Ft. Meade,

88), 1988, pp. 156-161.

Computer Security Center, Ft. Meade, MD, 25 June 1985.

Key Words:

criteria.

CSC-85a

,

,

Key Words:

MD, 2

Key Words: guidelines,

A

Understanding Discretionary Access Control in Trusted Systems NCSCto

,

Understanding

to

52.

15

NCSC-TG-

Meade, December 1988.

design.

Key Words:

guidelines,

Verification Systems ,

A

Guide

to

Understanding

Configuration

Management

Trusted Systems

,

in

Davida,

NCSC-

G.I., et al.

"A System

Architecture to

Support a Verifiably Secure Multi-Level Security System,"

MD,

Proc. 1980

1

AprU 1989.

NCSC-TG-

Sec.

Key Words:

Security Center, Ft. Meade,

verification.

guidelines,

&

IEEE Symp. on

Privacy

,

(5:

design. guidelines,

design.

5-5

IEE-80),

pp. 137-144.

Key Words: MLS,

28 March 1988.

Key Words:

verification,

TG-014, National Computer Security Center, Ft. Meade,

006, National Computer

MD,

Key Words:

DAV-80

Guidelines for Formal

CSC-88

,

methods.

CSC-89

guidelines,

Ernst

MD,

Key Words:

control.

G.W.

Security Center, Ft.

,

008, National Computer

MD,

June 1988.

verification,

design, case.

"Formal Program Verification Using Symbolic Execution," IEEE Trans, on Software Engr. January 1982, pp. 43-

TG-003. National Computer Security Center, Ft. Meade, 1

NCS-

Dannenberg, R.B., and

Guide

Trusted Systems

Guide

(5:

DAN-82

Trusted Distribution in

CSC-87

,

design.

A

guidelines.

Sec. Conf.

October 1988.

CSC-88d

criteria,

Delta Verification System (SDVS)," Proc. 11th Natl.

architecture,

DOD-82

DIT-82 Dittrich, K.R., et al.

Proceedings. Fifth Seminar on

"Protection in the

Computer Security Initiative Program Department of Defense, Washington, DC,

OSKAR

the

Operating System: Goals, Concepts, Consequences," Sec.

&

,

IEEE Symp. on

Proc. 1982

Privacy

,

(5:

DoD

May

1982.

Key Words: proceedings, MLS, design.

Key Words: OS,

policy,

Proceedings, Sixth Seminar on

DIV-87

the

Di Vito, B.L., and L.A. Johnson

"A Gypsy

DoD

Initiative ,

Computer Security National Bureau of

Standards,

November 1983.

Verifier Assistant,"

Proc. 10th Natl.

Comp.

Sec.

Conf. (5: NCS-87a), 1987, pp. 183-192. .

Key Words:

Key Words: proceedings, MLS, design.

DOD-83a

methods.

Evaluation Criteria,

DOD-80

DoD

onthe

DoD

Computer

Security Initiative Program

,

Department of Defense, Washington, DC, January

Key Words: MLS,

1980.

design.

policy, verification,

TCB,

onthe

DoD

Computer Security Initiative Program

DoD Computer Security DoD Computer

Security Center, Ft.

MD,

Meade,

September 1984.

Key Words: proceedings, MLS, design.

DOD-85

Proceedings, Fourth Seminar

DoD

Computer Security Initiative Program

on

the

,

ELO-85 Eloff, J.H.P.

'The Development of a Language for a

Specification

Computer Security System," Computers & Security June ,

1985. pp. 143-147.

FAR-86 Farmer, W.M.,

DM.

Johnson,

and F.J. Thayer 'Towards A Discipline for Developing Verified Software," Proc. 9th Nad. Comp. Sec. Conf., (5: NCS-86), 1986. pp.

verification,

software.

FEL-87 Fellows,

J.,

et al.

Base," Proc. 10th Natl. Sec. Conf. , (5:

Department of Defense

Key Words: network.

Comp.

NCS-87a).

architecture.

1985.

Key Words: MLS, TCB,

1981.

criteria.

FET-88 Fetzer, J.H.

"Program Verification: The Very Idea," Communications of the ACM September 1988. ,

Key Words: general.

DOW-85 Downs, D.D.

et al.

"Issues in Discretionary

Access Control," Proc. 1985

IEEE Symp. on Privacy

,

Sec.

&

IEE-85), pp. 208-

(5:

218.

Key Words:

discretionary,

control.

5-6

TCB,

DoD

5200.28-STD, U.S. Department of Defense, Washington, DC, December

Department of Defense, Washington, DC, August

Key Words: proceedings, MLS, design.

specification,

methods.

Trusted Computer System Evaluation Criteria,

DOD-81

verification,

1987, pp. 68-77.

1980.

Key Words: proceedings, MLS, design.

Key Words:

"The Architecture of a Distributed Trusted Computing

,

Department of Defense, Washington, DC, November

Flow

1987, pp. 175-182.

Key Words:

Initiative ,

Proceedings, Third Seminar

FDM

91-98.

Proceedings, Seventh Seminar

DOD-80a the

criteria,

DOD-84

Key Words: proceedings, MLS, design.

on

CSC-STD-

Computer Security Center, Ft. George G. Meade MD, 15 August 1983. 001-83,

Proceedings, Second Seminar

The

Key Words:

Department of Defense Trusted Computer System

verification,

"InaFlo:

Tool," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a).

methods.

DOD-83

methods, case.

Eckman, S.T.

.

IEE-82),

pp. 46-56.

ECK-87

verification,

GAS -88

FRA-83 Fraim, L.J.

A

"SCOMP:

MLS

GLI-84

M.

Gasser,

Solution to the

Gligor. V.D.

Building a Secure Computer

System Van Nostrand

Problem," Proc. IFIP/Sec. '83 . Stockholm, 1983. (2: FAK-83), pp. 275-

Reinhold,

286.

Key Words: book,

,

MLS, Key Words: MLS,

New

-

"The Challenge After Al the Security

Key Words:

1984, pp.

denial, threats,

al.

'The Digital Distributed System Security Architecture," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-89), 1989, pp. ,

Market," Proc. 9th Natl. Comp. Sec. Conf. , (5: NCS86), 1986, pp. 41-46.

May

design.

Gasser, M., et

Fraim, L.J.

.

design.

GAS-89

FRA-86

View of

Software Engr. 320-324.

general,

design,

network, case.

A

York, 1988

"A Note on Denial-of-Service Problem in Operating Systems," IEEE Trans, on

GLI-85 Gligor. V.D.,

"Analysis of the Hardware Verification of the

SCOMP,"

305-319.

Key Words:

Honeywell

Proc. 1985

IEEE

Symp. on Sec. & Privacy IEE-85), pp. 32^4.

architecture,

,

(5:

design, case.

Key Words:

Key Words:

trusted, design,

Glasgow,

FRE-88 Freeman, L.

verification, case.

GLA-84

general.

J.,

R. Neely, and

Megalo

GLI-86

J.L, et al.

"Specifying Multilevel

Gligor, V.D., et

Security in a Distributed

"On

System," Proc. 7th Seminar,

"Developing Secure Systems: Issues and Solutions," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988,

DoD Comp.

pp. 183-190.

specification, design.

,

Sec.

Program

,

(5:

DOD-84). 1984. pp. 319-340.

Implementation of Secure

Xenix Workstations," Proc. 1986 IEEE Symp. on Sec. Privacy

Key Words: MLS,

al.

the Design and the

,

117.

Key Words: MLS, Key Words: MLS,

design,

GLI-83

"A Note on

GAB-86

the Denial of

Service Problem," Proc.

IEEE

"Smart Terminals for Trusted

Symposium on Security and Privacy AprU 1983, pp. 139-

Computer Systems,"

149.

Natl.

policy,

design, case.

Gligor, V.D.

general.

Gabriele,

&

IEE-86), pp. 102-

(5:

M.

Comp.

Proc. 9th

Sec. Conf.

,

.

GUgor, V.D., and C.S. Chandersekaran 'Toward the Development of Secure Distributed Systems," Proc. IFIP/Sec. '86

(5:

NCS-86), 1986, pp. 16-20.

GLI-86a

Key Words:

denial, threats,

,

Monte

Carlo, 1986, (2: GRI-89).

design.

Key Words:

trusted,

Key Words: MLS, network,

MLS, GLI-83a

design, network.

design.

Gligor. V.D.

GAM-88

GLI-86b

'The Verification of

Gambel,

Mechanisms of High-Level Language

and S. Walter "Retrofitting and Developing

Protection

Applications for a Trusted

NCS-88), 1988, pp. 344-346.

Machines." International Journal of Computer and Information Sciences August 1983, pp. 211-246.

Key Words: TCB,

Key Words:

D.,

Computing Base," Proc. 11th Natl.

Comp.

Sec. Conf.

,

(5:

,

Ghgor, V.D.,

et al.

"A New Security Testing Method and Its Application the Secure

Proc. 9th Natl.

Conf.

,

(5:

Comp.

Sec.

NCS-86), 1986, pp.

40-59 techniques.

design,

verification,

Key Words:

methods.

design, case.

5-7

to

Xenix Kemel,"

verification,

GRA-88

GLI-87 Gligor, V.D., et

HAI-87

Graubart., R.D.

al.

"Design and Implementation of Secure Xenix," IEEE Trans, on Software Engr. February 1987. pp. 208-221.

"Dual Labels Revisited," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp.

Key Words: MLS,

Key Words: MLS,

,

policy,

,

167-172. design,

Haigh, J.T, et al. "An Experience Using Two Covert Channel Analysis Techniques on a Real System Design," IEEE Trans, on Software Engr., February 1987, pp. 157-168.

techniques.

design, case.

Key Words:

GRE-89

GLI-87a Gligor, V.D., et

al.

Grenier, G.-L., R.C. Holt, and

"A New Security Testing Method and Its Application

M. Funkenhauser

Secure Xenix Kernel," IEEE Trans, on Software Engr. February 1987, pp. 169-183.

Secure

to

Key Words:

"Policy vs.

HAI-87a

Mechanism

TUNIS

in

Operating

System," Proc. 1989 IEEE Symp. on Sec. & Privacy

,

,

(5:

IEE-89b), pp. 84-93.

Key Words:

verification,

caase.

covert channel,

case.

Haigh, J.T. and W.D. Young "Extending the Noninterference Version of MLS for SAT," IEEE Trans, on Software Engr. February 1987, pp. 141,

policy, design,

Key Words: MLS, model,

case.

case.

GOL-81

GUS-87

Golberg, D.L.

"The

SDC

Guspari, D.,

Communications

Kernel," Proc. 4th Seminar,

DoD Comp.

Sec. Progr.

,

(5:

DOD-81), 1981, pp. P1-P33.

Key Words:

CD.

HAL-85

Harper,

and N. Ramsey

Haley, C.J., and F.L.

"An

"Issues

ADA

Verification

Environment," Proc. 10th Comp. Sec. Conf. (5: NCS-87a). 1987. pp. 366-371. Nati.

.

Security Related Functional Tests," Proc. 8th Natl.

Sec. Conf.

(5:

,

Key Words:

verification, case.

Key Words:

HAD-88

GOL-84 Gold, B.D., R.R. Linde, and P.F.

Hadley.

S.. et al.

"KVM/370

in Retrospect,"

Library," Proc. 11th Natl.

Proc. 1984

IEEE Symp. on

Comp.

Sec.

&

Privacy

,

(5:

IEE-84),

Sec. Conf.

,

(5:

HAL-86 Halpem,

NCS-

88), 1988, pp. 246-249.

J.D., et al.

"MUSE - A

Proc. 1986

Key Words: kernel, design,

Computer-

Assisted Verification System,"

pp. 13-23.

Key Words:

verification,

design.

"A Secure SDS Software

Cudney

Comp.

NCS-85), 1985,

pp. 82-85.

kernel, network,

case.

Mayer on the Development of

trusted, software,

Sec.

&

IEEE Symp. on

Privacy

,

(5:

IEE-86),

pp. 25-32

case.

case.

Key Words:

HAI-86

GOO-88 Good,

Haigh. J.T., et al., "An Experience Using

D.I.

Two

"Producing Secure Digital Information Systems," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 180-182.

Covert Chaimel Analysis Techniques on a Real System Design." Proc. 1986 IEEE

Key Words: MLS,

Key Words:

.

&

Symp. on Sec. Privacy IEE-86), pp. 14-24.

.

(5:

verification, case.

HAL-87 Halpem,

J.D., et al.

"MUSE ~ A

Computer-

Assisted Verification System,"

IEEE

Trans, on Software Engr ., February 1987, pp. 151156.

techniques.

design,

covert chaimel,

Key Words:

case.

5-8

verification, case.

HAR-89a

HAL-87a

IEE-81

and S. Owre "Specification and Verification Tools for Secure

Harrison, L.J.

Runtime Support," Proc. 5th

Privacy Oakland,

Distributed Systems," Proc.

Security Applicat. Conf.

27-29, 1981,

Halpem,

J.D.,

Comp.

10th Natl. (5:

Sec. Conf. ,

Proceedings. 1981

"Security Issues and

Ada ,

Symposiumon (4:

IEE-89C), 1989, pp. 177-183.

,

IEEE

Security and

CA, April IEEE Computer

Society Press, Washington,

DC, 1981.

NCS-87a), 1987. pp. 78-

Key Words: MLS. methods,

83.

Key Words:

case.

Key Words:

HEN-85

general.

HAL-87b

M.W.

Hale,

proceedings,

research.

verification,

"Using the Computer Security Subsystem Interpretation," AIAA No. 87-3097. Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b). 1987. pp. 128,

Henning. R.R. "Multilevel Application Development," Proc. 8th Nad. Comp. Sec. Conf. (5: NCS85), 1985, pp. 137-140. ,

IEE-82 Proceedings. 1982

Symposium on

CA, April IEEE Computer Society Washington, DC. 1982.

Privacy Oakland, ,

1982, Press,

Key Words: MLS,

IEEE

Security and

design,

Key Words:

methods.

130.

proceedings,

research.

HEN-88 Key Words: TCB,

criteria,

general.

Henning, M., and A. Rhode "On the Suitability of Z for the Specification of Verifiably

HAR-84

Computer February 1983.

Secure Systems," Proc.

Hartman.

BA.

mP/Sec.

"A Gypsy-Based Kernel," IEEE Symp. on

,

'88 , Australia, 1989,

Key Words: MLS,

CAE-89). pp. 197-221.

(2:

Sec.

&

Privacy

,

(5:

IEE-84),

Key Words:

specification,

IEE-83a

case.

Proceedings. 1983

Key Words:

verification,

kernel, case.

HAR-85

ACM

Architecture,"

Operating Systems

CA, April IEEE Computer

Privacy Oakland,

"The Trusted Server Approach

25-27, 1983,

.

Multilevel Security." Proc. .

IEE-89C). 1989. pp. 335341.

IEEE

Security and

Hinke. T.H. to

"KeyKOS

Symposium on

HIN-89

5th Security Applicat. Conf.

Hardy, N.

networks,

methods, design, cryptogr^hy.

Proc. 1984

pp. 219-226.

IEE-83 "Data Security in Computer Networks, Special Issue," IEEE

Society Press, Washington,

DC, 1983.

(4:

Review October, 1985.

Key Words:

proceedings,

research.

,

Key Words: MLS. methods,

Key Words:

architecture,

IEE-83b "Computer Security

design.

kernel, case.

Technology, Special Issue,"

IEE-80

HAR-89

Proceedings, 1980

Symposium on

Harrold, C.L.

"An

Introduction to the

SMTTE Approach

to

Secure

Computing," Computers & Security October 1989, pp. ,

IEEE

,

July 1983.

Privacy Oakland,

Key Words: MLS, methods,

14-16, 1980,

design, kernel, research.

,

CA, April IEEE Computer

Society Press. Washington,

IEE-84

DC, 1980.

Proceedings. 1984

495-505.

Key Words:

Key Words: MLS, methods,

IEEE Computer

Security and

proceedings,

Symposium on

IEEE

Security and

Privacy Oakland, CA, April 29-May 2, 1984, IEEE Computer Society Press, Washington. DC. 1984.

research.

,

design, case.

Key Words: research.

5-9

proceedings,

JAN-89

IEE-88

IEE-85 Proceedings. 1985 ffiEE

Proceedings, 1988

Symposiumon

Symposiumon

Security and

CA. April IEEE Computer

CA, April IEEE Computer

Privacy Oakland,

Privacy Oakland, 18-21, 1988,

,

Society Press, Washington,

Society Press, Washington,

DC, 1985.

DC, 1988.

Keywords; proceedings,

Key Words:

research.

research.

IEE-85a

.

Key Words:

proceedings,

IEEE

verification,

methods.

JOH-89

IEE-88a

Proceedings. 1985

J.VA., J.S. Barlas, and L.L. Chang "Adding CASE Technologies to Formal Verification"* Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89), 1989, pp. 52-64.

Janieri,

Security and

22-24. 1985,

.

IEEE

LA.

Proceedings, Fourth Aerospace

Johnson,

Aerospace Computer Security Conference IEEE Computer Society Press. Washington

Computer Security Conference IEEE Computer Society Press, Washington,

"Formal Specification Verification: Fundamental Concerns," IEEE Cipher Aixil

DC. March 1985.

DC, December 1988.

1989. pp. 25-33.

Key Words:

Key Words:

.

Key Words:

proceedings,

design, methods, case.

,

,

proceedings,

design, methods, case.

IEE-86

Symposium on

Security and

Privacy , Oakland, 7-9. 1986,

IEEE CA,

April

IEEE Computer

verification,

general.

JOS-87

IEE-89

Proceedings, 1986

&

Proceedings, 1989

Symposium on ,

CA. May

M.K.

Joseph,

'Toward the Elimination of

Security and

Privacy Oakland, 3, 1989,

IEEE 1-

IEEE Computer

the

Effects of Malicious Logic:

Fault Tolerance Approaches,"

Comp.

Society Press, Washington,

Society Press, Washington,

Proc. 10th Natl.

DC, 1986.

DC. 1989.

Conf. (5: NCS-87a). 1987. pp. 238-244.

Key Words:

proceedings,

research.

Sec.

.

Key Words:

proceedings,

Key Words:

research.

denial, design,

methods.

IEE-86a

IEE-89a

KAR-84

Proceedings, Second

Proceedings, Fifth Security

Aerospace Computer Security Conference IEEE Computer Society Press, Washington,

Applications Conference ,

Karger, PA., and A.J. Herbert

IEEE Computer Society Press, Washington, DC, December

Architecture to Support Lattice

DC. 1986.

1989.

,

Key Words:

proceedings,

design, methods, case.

IEE-87

Key Words:

proceedings,

Symposium on

IEEE

Security and

CA, April IEEE Computer

A

Secure Message Preparation Workstation Development," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp.

Multilevel

,

Key Words:

proceedings,

architecture,

"Genesis of a Secure

27-29. 1987.

DC, 1987.

&

capabihty.

al.

Application:

Society Press, Washington,

Security and Traceability of Access," Proc. 1984 IEEE Privacy . (5: Symp. on Sec.

Key Words:

Irvine, C.E., et

Privacy Oakland, ,

Capability

IEE-84), pp. 2-12.

design, case.

IRV-88

Proceedings, 1987

"An Augmented

16-29.

KAR-87

PA.

Karger,

"Limiting the

Damage

Potential of Discretionary

Trojan Horses," Proc. 1987

IEEE Symp. on

Sec.

&

Privacy (5: IEE-87a), pp. 32-

research.

,

Key Words: MLS, IEE-87a

policy,

37.

design, case.

Proceedings, Third Aerospace

Key Words:

Computer Security

vulnerabilities,

Conference IEEE Computer Society Press, Washington,

discretionary.

,

DC, 1987.

Key Words:

proceedings,

design, methods, case.

5-10

threats,

methods,

KAU-87

KIN-88

KUH-88

Kaufmann, M., and

King, G., and B. Smith

W.D. Young

"INFOSEC IRAD

"Comparing Specification Paradigms for Secure Systems: Gypsy and the Boyer-Moore Model," Proc.

Magnavox: The Trusted Military Message Processor

10th Natl. (5:

Comp.

Sec. Conf. .

NCS-87a), 1987, pp. 122-

(TRUMMP) &

Kuhn, D.R. "Static Analysis Tools for Software Security

at

Certification," Proc. 11th Natl.

Comp.

the MiUtary

Key Words:

Comp.

Key Words:

NCS-

Sec. Conf. , (5:

Key Words:

specification,

methods, design, case.

design, network,

LAM-85 Lampson, B.W. "Protection,"

KIN-88a

Kemmerer, R. "FDM: A Formal Methodology for Software Development," Proc. 3d Seminar,

DoD Comp.

Progr. , (5:

Sec.

DOD-80b), 1980,

pp. Ll-19.

ACM

Operating

Systems Review December ,

King, G., and

"An

certification,

software.

case.

KEM-80

NCS-

88), 1988, pp. 290-298.

88), 1988, pp. 250-256.

128.

Sec. Conf. , (5:

Message Embedded Executive (ME2)," Proc. 11th Nad.

W. Smith

1985, pp. 13-24.

Alternative

Implementation of the Reference Monitor Concept," Proc. 4th Aerosp. Comp. Sec. Conf. , (4: IEE-88b), 1988, pp. 159-166.

Key Words:

policy, models,

general.

LAN-81 Landwehr, C.E. "Assertions for Verification of

Key Words:

Key Words: MLS, model,

specification,

methods, case.

ACM

design.

KEM-82

KOR-84

Kemmerer, R.A. "A Practical Approach

Timing Chaimels," Proc. 1982 IEEE Symp. on Sec. Privacy

&

IEE-82), pp. 66-

(5:

73.

Key Words:

,

Vol. 5, No.3, July 1980.

Korelskiy, T., and to

Identifying Storage and

covert chaimel,

methods.

KEM-86

D. Sutherland

Key Words:

"Formal Specification of a Multi-Level Secure Operating System," Proc. 1984 IEEE

methods.

&

verification,

LAN-82

IEE-84). pp. 209-218.

Landauer, C, and S. Crocker "Precise Information Flow Analysis by Program

Key Words: MLS,

Verification." Proc.

specification, case.

Symp. on Sec.

Symp. on Sec.

Privacy

,

(5:

1982 IEEE

Privacy IEE-82), pp. 74-80. «fe

(5:

,

KRA-83

Kemmerer, R.A. Verification Assessment Study Final Report C3CROl-86, National Computer Security Center, Ft. Meade, ,

MD,

Multi-Level Secure MUitary Message Systems," Software Engineering Notes

1986.

Key Words:

Kramer, S.M., and D.P. Sidhi "Security Information

Flow

verification,

LAN-83

,

Landwehr, C.E. "The Best Available Technologies for Computer

Key Words: MLS, models,

Security,"

flow.

July 1983. pp. 89-100.

Ketcham, L.R. "Program Containment in a Software-Based Security

Kramer, "Linus

general.

S.

IV~An

Computer

Experiment in

Security," Proc.

Architecture," Proc. 11th

1984 IEEE Symp. on Sec.

Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 299-308.

Privacy

Key Words:

Key Words: MLS, OS,

,

design, methods,

IEEE Computer

Key Words:

KRA-84

KET-88

Key Words: verification, methods, flow.

Multidimensional Arrays,"

IEEE Trans, on Computers December 1983, pp. 11881190.

general.

software.

in

,

(5:

&

IEE-84), pp. 24-

32.

design, case.

5-11

.

design, methods,

LUM-89 Lu, M.M.

LEV-89

LAN-83a Landwehr, C.E. "Requirements for Class Al Systems and Major Differences between Division A and Division B Systems," Proc. 6th Seminar,

DoD

Comp.

Sec. Program (5: DOD-83a), 1983, pp. 27-32

Levin, T, S.J. Padilla, and

C.E. Irvine

"A Formal Model

for

IEEE

Setuid," Proc. 1989

Symp. on Sec.

UNIX

&

Privacy IEE-89b), pp. 73-83.

"Guidelines for Formal Verification Systems: Overview

and Rationale," Proc. 12th ,

(5:

Natl.

Comp.

Sec. Conf.

,

(5:

NCS-89), 1989, pp. 75-82.

,

Key Words:

models, OS, case.

Key Words:

verification,

guidelines.

Key Words: MLS,

LEV-89a

criteria,

MAC-83

Levin, T.E., S.J.Padilla,

general.

MacEwen, G.H.

and R.R. Schell

LAN-84

"Engineering Results from the

Landwehr, C.E., and J.M. CarroU "Hardware Requirements for

Al Formal

Secure Computer Systems:

89), 1989, pp. 65-74.

A

Verification

Process," Proc. 12th Natl.

Comp.

Sec. Conf.

Framework," Proc. IEEE Sympos. on Security and

Key Words:

Privacy April 1984, pp. 34-

design, case.

,

,

(5:

NCS-

verification,

"The Design for A Secure System Based on Program Analysis," IEEE Trans, on Software Engr. , 289-298.

May

Key Words: MLS,

1983, pp.

design,

case.

40.

MAC-84

LOE-85

Key Words:

architecture,

general.

Loeper, K.

MacEwen, G.H., and

"Resolving Covert Charmels

D.T. Barnard "The Euclid Family and Its Relation to Secure Systems,"

Within a B2 Class Secure System," Operating Systems Review July 1985.

ACM

LAN-85 Landwehr, C.E., and H.O. Lubbes "Determining Security Requirements for Complex Systems with the Orange Book," Proc. 8th Natl. Comp. Sec. Conf. (5: NCS-85), .

,

Key Words:

requirements,

criteria.

Lee, T.M.P. "Statistical

TCBs

Privacy

(5:

,

&

Sec.

1989

IEE-89b), pp.

ACM

Operating

models,

general.

LEV-80 Levitt, K.N., P.G.

MacEwen, G.H., B. Burwell, and

Z.J. Lu,

Systems Review April 1989,

"Multi-Level Security Based

pp. 39-44.

on Physical Distribution," Proc. 1984 IEEE Symp. on Sec. &

,

covert channel,

Privacy

,

(5:

IEE-84), pp. 167-

177.

Key Words: MLS,

LUC-86 Luckenbaugh, G.L.,

et al.

Neumann,

nethods,

design.

"Interpretation of the Bellin

Secure

Xenix," Proc. 9th Natl. trusted,

specification, case.

MAC-84a

Loepere, K.

LaPadula Model

10-19.

Key Words:

(5:

Trust:

vs. People," Proc.

IEEE Symp. on

,

DOD-84), 1984, pp. 79-87.

Key Words:

case.

Models of

DoD

Program

LOE-89

Key Words:

LEE-89

Sec.

case.

Revisted,"

Key Words:

covert chaimel,

"The Covert Charmel Limiter

1985, pp. 156-162.

Proc. 7th Seminar,

Comp.

Sec. Conf. , (5:

Comp.

NCS-86),

MAR-83 Marick, B.

"The

VERUS

Design

1986, pp. 113-125.

Verification System," Proc.

Key Words: model, methods,

Privacy

case.

160.

1983 IEEE Symp. on Sec. ,

(5:

&

IEE-83a), pp. 150-

and L. Robinson

The SRI

Key Words:

Hierarchical

Development Methodology and

Its

Application to

Development of Secure Systems SP 500-67, NBS, ,

Gaithersburg,

MD,

1980.

Key Words: MLS, methods, design, case.

5-12

verification, case.

MAY-89

MAR-84

MEA-87

"An Overview of Multics Security," Proc. MP/Sec. ;84. Toronto. (2: FIN-85).

•INFOSEC

1984. pp. 225-235.

12th Natl.

Key Words:

architecture,

(5:

MAR-88

Systems: Reducing Covert Channels." Proc. 1987 IEEE Symp. on Sec. & Privacy (5: IEE-87a), pp. 212-218.

Sec. Conf. .

NCS-89). 1989, pp. 135-

,

"Issues in Process

Key Words:

trusted, design,

case, network.

Modek

MIG-87

McDermott, J. "A Technique

Sec. Conf. , (5:

NCS-88), 1988, pp. 109-113.

Migues. S. "The Need for Rigorous Informal Verification of

Removing

for

an Important Class of Trojan Horses from Higher Order Languages," Proc. 11th Natl. Comp. Sec. Conf. (5: NCS-

Specifications-to-Code

Correspondence." Proc.

COMPASS

.

Key Words:

trusted,

models,

Assurance

88). 1988, pp. 114-117.

Key Words:

MAR-89

ADA (5:

Comp.

Key Words: verification, methods specification.

McHugh, J. "An EMACS Based

to

Sec. Conf. .

NCS-89). 1989, pp. 28-

Downgrader

for the

Proc. 8th Natl.

MIL-81 MiUer. IS.

SAT."

Comp.

"Military

Sec.

Conf. (5: NCS-85). 1985. pp. 133-136.

51.

.

Key Words:

Key Words: MLS,

Sec.

&

Privacy

.

(5:

IEE-81),

techniques,

Key Words: models, methods,

case.

MAR-89a

case.

MCH-85a

Marmor-Squires, A., et al. "A Risk Driven Process

Model

for the

McHugh, J. and D.I. Good "An Information Flow Tool for Gypsy," Proc. 1985 IEEE

Development

of Trusted Systems," Proc. 5th Security Applicat. Conf.

,

IEE-89C), 1989, pp. 184-

Symp. on Sec.

&

Privacy

,

MIL-82 Millen, J.K.

"Kemel

Isolation for the

11/70," Proc. 1982

(5:

Symp. on Sec.

IEE-85), pp. 46-48.

&

PDP

IEEE

Privacy

,

(5:

IEE-82), pp. 57-65.

192.

Key Words:

Key Words: risk,

Message Systems:

Applying a Security Model." Proc. 1981 IEEE Symp. on 101-111.

verification,

methods, case.

(4:

Comp.

IEE-87). 1987.

MCH-85

Approach

VCTification." Proc.

12th Natl.

'87: (2:

threats,

techniques.

Marceau, C. and CD. Harper Interactive

.

pp. 13-25.

design, general.

"An

covert channel,

methods, architecture, case.

MCD-88

and Integrated Environments for Trusted Systems Development," Proc. 11th

Its

Application to Message

Product," Proc.

Comp.

Key Words:

Marmor-Squires, A3., and P.A. Rougeau

Comp.

"The Integrity Lock Architecture and

145.

design, case.

Natl.

Meadows. C.

Mayer, F.L., and J^i. McAuliffe "The Design of the Trusted Workstation: A True

Margulis, B.I.

trusted,

model,

verification,

Key Words: kemel,

methods, case.

methods, desigiL

technique,

case.

MCM-85

MAY-88

MIZ-87

McMahon, E.M.

Mayer. F.L.

"Restricted Access Processor

"An

-

Interpretation of a

Refined Bell-LaPadula Model for the T-Mach Kemel." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 368-378. .

An

Application of Computer

Security Technology," Proc.

Aerospace Computer Sec. Conf. 71-73. .

(5:

IEE-85a). 1985. pp.

Mizimo, M., and A.E. Oldenhoeft "Information Flow Control in a Distributed Object-Oriented System with Statistically Bound Object Variables," Proc. 10th Natl.

Key Words: MLS. methods,

Key Words: MLS. model, kemel, case, methods, design.

-

(5:

Comp.

Sec. Conf.

design, case.

Key Words: techniques.

5-13

,

NCS-87a). 1987. pp. 56-67. control, slow,

MUR-88

NCS-88a

Murray, M., R. Berch, and S. Caperton "Use of Automated Verification Tools in a Secure Software Development Methodology," Proc. lldi Natl.

Comp.

Sec. Conf.. (5:

Computer Security Future,

A

NEU-86 ...

Into the

Postscript, 11th

National Computer Security Conference . National Institute of Standards and Technology/ National Computer Security Center, October 1988.

NCS-88), 1988, pp. 284-289. verification,

proceedings,

design.

general.

software, methods, design,

NEU-88

NCS-89

case.

Neugent. W.,

Information Systems Security: Solutions for Today -

NCS-85 Proceedings, 8th National

Concepts for Tomorrow.

Computer Security

Proceedings. 12th National

Conference National Bureau of Standards/National

Computer Security

,

Computer Security Center,

Key Words:

Conference National Institute of Standards and Technology/ .

Key Words: MLS, methods, design.

Neugent,

Key Words:

proceedings,

W.

"Guidelines for Specifying

general.

Security Guards," Proc. 12th

NCS-86

Natl.

Computer Security - For Today... and for Tomorrow,

.

NEU-89

proceedings,

general.

"Security Guards: Issues and Approaches." IEEE

Communications Magazine August 1988. R). 25-29.

National Computer Security Center. October 1989.

September 1985.

Software Engr.. September 1986. pp. 905-920.

Key Words: models, methods,

Key Words:

Key Words:

Neumann, P.O. "On Hierarchical Design of Computer Systems for Critical Applications." IEEE Trans, on

NEE-85

Comp.

Sec. Conf. . (5:

NCS-89). 1989. pp. 320-338.

Proceedings, 9th National

Neely. R.B. and J.W. Freeman,

Computer Security

Key Words: MLS. methods,

"Structuring Systems for

design.

Conference National Bureau of Standards/National

Formal Verification," Proc. 1985 IEEE Symp. on Sec.

Computer Security Center.

Privacy .

,

(5:

&.

IEE-85). pp. 2-13.

September 1986.

Key Words: Key Words:

proceedings,

verification,

ONE-86 O'Neil-Dunne. J. 'The Access Path," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS-86). 1986. pp. 149-155. .

design.

general.

NEE-89

NCS-87 Computer

Security...

From

Key Words: TCB.

Neely. R.B.. J.W. Freeman, and M.D. Krenzin

PAR-88

Principles to Practice ,

"Achieving Understandable

Proceedings, 10th National

Results in a Formal Design

Computer Security

Verification," Proc.

Conference National Bureau of Standards/ National

Sec.

Computer Security Center,

124.

,

(3:

Comp. Foundat. Workshop n

Parker.

TA.

"Structuring Trust in a Large .

IEE-89a). 1989. pp. 115-

General Purpose Operating System." Proc. 4th Aerosp.

Comp.

September 1987.

Sec. Conf. . (4: lEE-

88b). 1988. pp. 152-158.

Key Words:

Key Words:

control,

design.

proceedings,

verification,

Key Words:

methods.

trusted.

OS.

design, case.

general.

NEI-84

NCS-88

PAR-89

Neilson. J.O.. and

Computer Security

...

Into the

Future, Proceedings, 11th

National Computer Security

Conference National Institute of Standards and Technology/ ,

National Computer Security

F.E.

Wuebker

Partney. T.J.

"Design Experiences from the Multilevel Secure MCF." Proc. 1984 IEEE Symp. on Sec.

&

Privacy

.

(5:

IEE-84).

pp. 204-208.

'The Incorporation of MultiLevel IPC into UNIX." Proc.

1989 IEEE Symp. on Sec. Privacy .

(5:

&

IEE-89b). pp. 94-

99.

Center. October, 1988.

Key Words: MLS. Key Words:

proceedings,

design,

Key Words: MLS. methods, design, case.

case.

general.

5-14

POZ-84

PER-84 Perrine, T.,

J.

Codd,

and B. Hardy

"An Overview of

the

Kemelized Secure Operating System (KSOS)," Proc. 7th Seminar.

DoD Comp.

Sec.

DOD-84). 1984,

Progr. . (5:

pp. 146-160.

ROU-87

Pozzo, M.M. "Life Cycle Assurance for Trusted Computer Systems: Configuration Mangement

Rougeau, P.A. "Integrating Security into a

A

Total Systems Architecture,"

DoD Comp.

7th Seminar,

3d Aerosp. Comp. Sec.

Proc.

Strategy for Multics," Proc.

Conf. .

Sec

.

(5:

IEE-87b), 1987, pp.

118-121.

DOD-84). 1984.

Progr. . (5:

Key Words: TCB,

pp. 169-179.

architecture,

design.

Key Words: OS,

Key Words:

kernel,

methods,

trusted,

RUS-81

design, case.

design, case.

Rushby, J.M. 'The Design and Verification of Secure Systems," Operating Systems Review

PRO-85

PFL-88 Pfleeger,

CP., and

ACM

Proctor, N.

S.L. Pfleeger

"The Restricted Access

"A Transaction Flow

Processor, an

Approach

Security Certification for

Formal Verification." Proc. 1985 IEEE Symp. on Sec.

Document Handling

Privacy

to Software

Systems," Computers Security

,

&

.

(5:

,

Example of

Vol. 15.

&

IEE-85). pp. 49-

verification, case.

PRO-89

certification,

Proctor, N., and R.

case.

PFL-89 CP., S.L. Pfleeger, and M.F. Theofanos "A Methodology for

Pfleeger,

Wong

Proceedings, International

Secure Distributed Operating System Prototype," Proc. 5th Security AppHcat. Conf. (4: ffiE-89c), 1989, pp. 95-102.

Symposium on Programming

,

pp. 613-620.

,

Springer, Berlin, 1982, pp.

352-367.

Key Words: Key Words: OS,

Security ,

November 1989,

Rushby, J.M. "Proof of Separability, A Verification Technique for A Class of Security Kernels," in

"The Security Policy of

Penetration Testing,"

&

verification,

design.

RUS-82 Key Words:

495-502.

Computers

Key Words:

53.

October 1988, pp.

Key Words:

1982. pp. 12-21.

5.

verification,

techniques.

policy,

design, case.

RUS-83

Key Words:

vulnerabilities,

methods.

RAJ-86

Rushby, J.M., and

Rajimas, S.A., et "Security in

KeyKOS,"

Proc.

1986 IEEE Symp. on Sec.

PFL-89a Pfleeger,

CP.

Privacy

Computing Prentice Hall, Englewood

Security in Cliffs.

B. Randell

al.

,

(5:

&

IEE-86), pp. 78-

Key Words: methods,

NJ, 1989

Distributed Secure System."

Sec.

&

IEEE Symp. on

Privacy

.

(5:

IEE-83a).

pp. 127-135.

85

.

"A

Proc. 1983

design,

Key Words:

architecture,

design, case.

case.

Key Words: book, MLS, RUS-84

ROS-89

cryptography general.

Rushby. J.M.

Rosenthal. D.

PLA-81

"Implementing a Verification

"The Evaluation of Three Specification and Verification

Methodologies," Proc. 4th Seminar, DoD Comp. Sec

for

.

(3:

IEE-89a). pp. 133-140.

"A Trusted Computing Base Embedded Systems." Proc. 7th Seminar. DoD Comp. Sec. Progr. (5: DOD-84). 1984, pp. for

.

294-311.

.

DOD-81), 1981, pp. X1-X17. Progr. . (5:

Key Words:

McCullough Security." Proc. Comp. Sec. Foundat. Workshop 11 1989

Methodology

Platek, R.A.

Key Words:

verification,

design, case.

verification,

methods, specification, case.

5-15

Key Words: TCB, case.

design,

SCH-84

RUS-89

SCH-87

Russell, T.T., and M.Schaefer

Schaefer, M., and R.R. Schell

'Toward a High B Level

'Toward an Understanding of

Security Architecture for the

Extensible Architectures for

IBM ES/3090

'TCB

Evaluated Trusted Computer

Evaluation," Proc.

System Products," Proc. 1984 IEEE Symp. on Sec. &

Comp.

Processor

Resource/System Manger," Proc. 12th Natl. Comp. Sec. Conf. , (5: NCS-89), 1989, pp. 184-196.

Privacy

,

(5:

Schockley, W.R., and R.R. Schell Subsets for Incremental

3d Aerosp.

Sec. Conf. , (5: lEE-

87b), 1987, pp. 131-139.

IEE-84), pp. 41-

5L

Key Words: TCB, methods, design.

Key Words:

Key Words:

architecture,

architecture,

SCH-88

general.

design, case.

Schaffer. M.A., and G.

SAY-87

SCH-84a and T.F. Tao "Microprocessor-Based Trusted Systems for

Saydjari, O.S.,

Leaman

Securely," Proc. 10th Natl.

Comp.

Sec. Conf.

,

NCS-

(5:

87a), 1987, pp. 129-141.

LOCK

TCB," Comp. Sec.

Conf. . (5: NCS-88), 1988, pp. 319-329.

Workstation Application," Proc. 7th Seminar, DoD

Key Words: OS,

Comp.

design, case.

Sec. Progr. . (5:

Walsh

Implementing

Proc. 11th Natl.

Communication and

"Lxjcking Computers

On

Unix on the

Schell, R.R.,

J.M. Beckman, and J.R.

"LCXTK/ix:

DOD-

architecture,

84), 1984, pp. 277-290.

Key Words: TCB.

SCH-88a

Key Words:

architecture, case.

Schockley. W.R., T.F. Tao,

architecture,

and M.F. Thompson "An Overview of the GEMSOS Al Technology and

design,

SAY-89 SCH-84b

Saydjari, O.S.. J.M.

Beckman, and J.R. Leaman "LOCK Track: Navigating Uncharted Space," Proc. 1989

ScheU, R.R. "Future of Trusted Computer Systems," Proc. IFIP/Sec. '84 Toronto, 1984, (2: FIN-85),

IEEE Symp. on

pp. 55-67.

Privacy

,

(5:

Sec.

&

Applications Experience," Proc. 11th Nad. ,

(5:

Comp.

Sec. Conf.

245.

Key Words: MLS, OS,

IEE-89b), pp.

Key Words:

167-175.

Key Words: TCB,

trusted, general.

SCH-83

M.

ScheU, R.R., T.F. Tao, and

Schaefer,

M. Heckman

"Symbol Security Condition

"Designing the

ScheU, R.R. "Evaluating Security Properties of Computer Systems," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: IEE-83a), pp. 89-95.

kernel,

methods, design, case.

SCH-89

SCH-85

artchitecture, case.

,

NCS-88), 1988, pp. 238-

GEMSOS

Security Kernel for Security

and Performance," Proc. 8th Nad. Comp. Sec. Conf. (5: NCS-85), 1985. pp. 108-120. ,

Considered Harmful," Proc. 1989 IEEE Symp. on Sec. & Privacy (5: IEE-89b). pp. 20,

46.

Key Words: model,

,

Key Words:

kernel, design,

requirement, case.

case.

Key Words: methods,

SCH-89a

design,

SCH-86

general.

Schultz, A.C.

SCH-83a Schell. R.R.

"A

Security Kernel for

"Using Software Tools Analyze the Security

A

Characteristics of

Multi-Processing Micro-

Computer," IEEE Computer July 1983, pp. 47-53.

,

to

HOL

Programs," Proc. 9th Natl. Comp. Sec. Conf. (5: NCS86), 1986, pp. 108-112.

SchallenmuUer, E., et al. "Development of a MultUevel Data Generation AppUcation for

GEMSOS,"

case.

kernel, design,

,

(4:

IEE-89C), 1989, pp. 86-90.

,

Key Words: MLS, case.

Key Words:

Proc. 5th

Security Applicat. Conf.

Key Words: methods, techniques, design.

5-16

design,

SOL-81

SHI-81

and R.R. Schell

Shirley, LJ.,

"Mechanism Sufficiency Validation by Assignment," Proc. 1981 IEEE Symp. on

&

Privacy. (5: IEE-81), pp. 26-32. Sec.

VAR-89

Solomon. D.J.

Varadharajan. V.. and

"Processing Multilevel Secure Objects," Proc. 1981

&

IEEE

Symp. on Sec. Privacy IEE-81), pp. 56-61.

,

(5:

.

Key Words: MLS, methods,

Key Words:

requirements,

Black "Formal Specifiaction of a Secure Distributed Messaging System," Proc. 12th Natl. Comp. Sec. Conf. (5: NCSS.

89). 1989, pp. 146-171.

design.

Key Words:

methods.

specification, case.

STA-86 SID-84

Stauffer, B.C.,

and R.U.

Fujii

"Informal Verification

"Executable Logic

Analysis." Proc. 9th Natl.

Specifications:

Comp.

Approach

A New

Computer

to

Security," Proc. 1984

&

NCS-

(5:

specification,

Sffi-87

W.O.. et al. "Unix and B2: Are They

Siebert,

Compatible?," Proc. 10th Nad. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 142,

criteria,

case.

verification,

Key Words:

SWA-85

Sec.

&

Privacy

.

IEE-86),

(5:

Key Words:

control, methods.

Symp. on Operating

Syst.

Principles . 1983. pp. 143-154.

Key Words: OS.

Walker. S.T.

'The Advent of Trusted Systems." Proceedings, 1980 ,

1980. pp. 655-666.

Key Words:

trusted, plicy,

"FTLS-Based Security Testing

LOCK,"

Proc. 12th Nati.

Sec. Conf. , (5:

Key Words:

ACM

WAL-80

methods.

NCS-

verification, case.

WAL-80a B.J.. R.A. Kemmerer. and G.J. Popek "Specification and Verification of the UCLA Unix Security

Walker,

Kernel." Communications of

Verification of the Security

Kernel." Proc., 9th

verification, case.

Nati.

J.

of an Operating System

Sec.

Comp. Conference AFIPS Press, Reston, VA,

pp. 190-196.

89), 1989, pp. 136-145.

"Reflections on the

Overview,"

Comp.

methods.

Comp. Silverman,

An

Key Words:

for

SIL-83

Environment: ,

Taylor, T.

Key Words: MLS,

all.

Conf. (5: NCS-88). 1988, pp. 147-155.

TAY-89

149.

et

Verification

Proc. 11th Nati.

Swaminathan, K. "Negotiated Access Control," Proc. 1986 IEEE Symp. on

methods.

"EHDM

86), 1986, pp. 126-129.

IEEE

Privacy . Symp. on Sec. IEE-84), pp. 142-153.

Key Words:

Sec. Conf. , (5:

VON-88 von Henke. F.W.,

Sidhu, D.P.

TUR-81 Tum,

the

Advances Security

.

in

ACM

,

February 1980, pp.

118-131.

R. (Ed.)

Computer System

Key Words:

Artech House,

Dedham, MA, 1981.

specification,

methods, verification, case.

verification,

Key Words: book,

case.

general.

WEI-82 Weissman. C.

SMI-86 Smith, T.A. "User-Definable Domains as a

Mechanism

TUR-84 Tum,

Advances Security

for

.

in

Computer System

Vol. 2. Artech

House. Dedham.

Implementing the Least

An Approach Technology

"Bizarre Bazaar: to Security

R. (Ed.)

MA,

1984.

Transfer." Proc. 5th Seminar,

DoD Comp.

Sec. Progr.

,

(5:

DOD-82), 1982, pp. 233-240.

Privilege PrirKiple," Proc. 9th

Nad. Comp. Sec. Conf. (5: NCS-86). 1986, pp. 143-155. .

Key Words: techniques.

design,

Key Words: book,

general.

Key Words: MLS, methods, techniques.

TUR-88 Tum.

R. (Ed.)

Advances Security

,

in

Computer System

Vol. 3, Artech

House, Norwood,

Key Words: book,

5-17

MA.

1988.

general.

WHI-87 "ABYSS:

WOO-87

WIS-88 Wiseman,

White. S.R.

A

Trusted Architecture for Software Protection," Proc. 1987

Symp. on Sec.

&

IEEE

Privacy ffiE-87a), pp. 38-51.

,

(5:

Woodward, J.P.L

S., et al.

"The Trusted Path Between SMITE and the User," Proc. 1988 IEEE Symp. on Sec. &

IEEE Symp. on

Privacy

Privacy (5: IEE-87a), pp. 23-

(5:

.

IEE-88a), pp.

Key Words: TCB,

architecture, case.

case.

technique,

YOU-85

WIT-80 Withington, P.T.

G.W.

'The Trusted Function

Processing," Proc. 1980

IEEE Symp. on

Symp. on Sec.

&

Secure Decentralized

&

IEE-80), pp. 67-79.

Key Words: model,

design.

Key Words: truatsed,

IEEE

Privacy

Privacy (5: IEE-89b), pp. 157-166. ,

Young, W.D., W.E. Boebert. and R.Y. Kain "Proving a Computer System

in

"Formal Model of a Trusted 1989 Sec.

Key Words: MLS, methods, techniques.

Williams. J.C.. and

File Server." Proc.

&

30

Key Words: TCB,

Dinolt

Sec.

.

147-155.

WIL-89

"Exploiting the Dual Nature of Sensitivity Labels," Proc. 1987

,

(5:

Secure." Scientific

Honeyweller, July 1985, pp. 18-27.

methods,

trusted,

Key Words:

verification,

general.

case.

WON-89 WIN-86 Wing. J.M.. and M.R. Nixon "Extending Ina-Jo with

Temporal Logic." Proc. 1986 IEEE Symp. on Sec. & Privacy

YOU-86

Wong,

.

(5:

IEE-86), pp. 2-

R., et al.

System: A Secure Distributed Operating System

'The

SDOS

Prototype," Proc. 12th Nad.

Comp.

NCS-

Sec. Conf. , (5:

89), 1989, pp. 172-183.

Young, W.D.. ?A. Telga, and W.E. Boebert

"A

Verified Labeler for the

Secure Natl.

Ada

Target," Proc. 9th

Comp.

Sec. Conf. , (5:

NCS-86), 1986, pp. 55-61.

13.

Key Words: OS.

Key Words:

trusted, case.

WOO-83

methods, techniques, case.

WIN-89 Wing, J.M., and M.R. Nixon "Extending InaJo with

Temporal Logic," IEEE Trans, on Software Engr.

Woodie. P.E. "Security Enhancement Through Product Evaluation," Proc. 1983 IEEE Symp. on Sec.

&

Privacy

,

IEE-83a).

(5:

(5:

Key Words: capability.

architecture,

IEEE Symp. on

Privacy. (5: IEE-87a),

Key Words: Woodie.

&

specification,

methods. P.

"Distributed Processing

IEE-86). pp. 86-

94

&

pp. 140-148.

WOO-86

.

Specification to

Implementation Mapping,"

techniques.

methods, techniques, case.

Privacy

Young, W.D. "Coding For A Believable

Sec.

Key Words: methods, specification,

WIS-86 Wiseman. S. "A Secure Capability Computer System." Proc. 1986 IEEE Symp. on Sec.

techniques,

YOU-87

Proc. 1987

pp. 96-101.

,

February 1989. pp. 181-197.

Key Words:

Key Words: MLS, case.

specification,

System Security: Communications. Computer or Both," Proc.

IEEE

Intemat.

Conf. on Data Engr. pp. 630-636.

Key Words:

,

1986.

requirements,

YOU-89 Young. W.D. "Comparing Specification Paradigms." Proc. 12th Nad.

Comp.

Key Words: general.

design.

5-18

Sec.

Conf

,

(5:

NCS-

89), 1989, pp. 83-97.

specification,

YUC-88 Yu, C.-F. and V.D. Gligor "A Formal Specification and Verification

Method

for the

Prevention of Denial of Service," Proc. 1988

Symp. on Sec.

&

IEEE

Privacy

,

(5:

IEE-88a), pp. 187-202.

Key Words:

specification,

methods, verification, denial.

6.

The

Database Security

on models of database security, specific implementations, database inference problem, and general aspects of database security.

statistical

section cites publications

ADA-89

BEC-80

Adam, B.R., and J.C. Wortmaim

BLA-85

Beck, L.L.

"A

"Security Control

Methods

for Statistical Databases:

A

ACM

Comparative Survey," Computing Surveys

Blakley, G.R., and

Mechanism

Security

ACM

Statistical Databases,"

Trans, on Database Systems

,

September 1980, pp. 316-338.

,

December 1989,

pp. 515-556.

Key Words:

statistical,

database,

BER-87

AHI-88

Berson, T.A., and T.F. Limt

Key Words:

"Multilevel Security for

encryption

Knowledge-Based Systems," Proc. 1987 IEEE Symp. on

Ahituv, N., Y. Lapid, S.

IEE-85), pp. 116-

(5:

,

122.

control.

and

Computation of Statistics Using Encrypted Data," Proc. 1985 IEEE Symp. on Sec. & Privacy

inference.

Key Words:

Meadows "A Database Encryption Scheme which Allows the

C.

for

Neumann

&

Privacy

"Protecting Statistical

Sec.

Databases Against Retrieval

pp. 235-242.

,

(5:

IEE-87a),

of Private Information,"

Computers

&

Security

,

February 1988, pp. 59-63.

Key Words:

statistical,

Key Words:

database, policy,

methods.

BOE-86 Boebert, W.E., B.B. Dillaway,

and J.T. Haigh "Mandatory Security and Database Management Systems," Proc.

NCSC

Workshop on Database Security (6: COA-86), pp. A1-A21.

BIS-87

.

Biskup, J. "Privacy Respecting

inference.

statistical,

Permissions and Rights," Proc.

Key Words: DBMS,

Akl, S.G., and D.E. Denning

inP

requirements.

"Checking Classification

LAN-88), 1987, pp. 173-185.

AKL-87

WG

11.3 Meeting , (6:

Privacy

(5:

,

-Key Words: database, policy, methods.

BIS-88 Biskup,

Key Words:

database,

methods.

J.,

and H. Graf

Model

pp. 34-37.

for the Information

11.3

Workshop

,

(6:

LAN-89b), 1988, pp. 123-140.

"Improving the Security Posture in Existing Installations," Proc.

NCSC

Key Words:

models, methods,

pp.

,

IEEE Symp. on

Privacy

.

(5:

Key Words: DBMS,

IEE-80),

relational,

kemel.

BON-84 Bonyun, D.A.

case.

Workshop on Database Security

&

Sec.

System DORIS," Proc. IFIP

Baxter, V.,

Proc. 1980

"Analysis of the Privacy

WG

BAX-86

Bonyun, D.A. "The Secure Relational Database Management System Kemel — Three Years Alter,"

IEE-87a), pp.

196-201.

policy,

BON-80

Constraints for Consistency

and Completeness," Proc. 1987 IEEE Symp. Sec. &

1986,

"Rules as the Basis of Accesss Control in Database Mangement Systems," Proc.

(6:COA-86), 1986,

Hl-Hll.

DoD Comp. Sec DOD-84), 1984, pp.

7th Seminar,

Key Words:

Progr.

database,

.

(5:

.

38-47.

methods.

Key Words: DBMS, methods.

6-1

control,

BUR-86

BON-86 "A New Look

at Integrity

Policy for Database

Management Systems," NCSC Workshop on Database Security 86), 1986, pp.

CAR-87

Bums, R.K.

Bonyun, D.

(6:

,

Proc.

COA-

B1-B18.

Carson, et

al.

'Towards Practical MLS Database Management Systems Using the Integrity

'Toward a Multilevel Document System," No. 873064, Proc. 3d Aerospace

Lock Technology,"

Comp.

Natl.

Comp.

Proc. 9th

Sec. Conf., (5:

Sec. Conf.

,

NCS-86), 1986, pp. 25-29.

Key Words: MLS,

Key Words: DBMS,

lEE-

(5:

87b), 1987, pp. 1-6.

database.

Key Words: MLS, DBMS,

polcy,

CHI-80

techniques.

integrity.

Chin. F.Y., and G. Ozsoyoglu

BON-87

Bonyun, DA. "Logging and Accountability Systems," Proc. IFIP 11.3 Meeting

,

WG

Bases," in Rullo. T.A. (Ed.).

"Operational Assurances for a

WG

LAN-88),

(6:

"Security of Statistical Data

Bums. R.K. Tmsted DBMS,"

Mangement

in Database

BUR-87

11.3

inP LAN-

Proc.

Meeting

,

(6:

88), 1987, pp. 241-251.

Advances in Computer Security Management. Vol. 1 Heyden & Son. Philadelphia, PA. 1980. pp. 57-76.

.

1987, pp. 223-227.

Key Words: DBMS,

auditing,

Key Words: neAods.

DBMS,

trusted,

Key Words:

statistical,

methods.

methods.

BUR-89

BON-89

CHI-81

Bums, R.K.

Bonyim, D.A. "Using

MAPLESS

as a

Framework for Secure Database Mangement,"

MP WG

Workshop

Proc.

11.3 (Data Base) ,

(6: IFI-89).

Chin, F.Y., and G. Ozsoyoglu

'The Homework Problem," in Lunt, T.F., Research Directions in Database Security (6: LUN-90), May ,

"Statistical

ACM

Data Base Design."

Trans, on Database

Systems March 1981. pp. 113.

139.

1989, pp. 84-86.

Key Words:

1989.

Key Words: DBMS, methods,

Key Words: MLS,

statistical,

design.

database,

CHI-82

design.

Chin. F.Y., and G. Ozsoyoglu

case.

BUS-83

BOU-84

"Auditing and Inference

BussoUati, U., and

Boukaert, A.

Control in Statistical Databases," IEEE Trans, on

G. Martella

A New

"Security of Transportable

'Toward

Computerized FUes," Proc.

Secure Data Base Design,"

Eurocrypt '84, Paris, 1984, (9: BET-85). pp. 416-425.

January 1983, pp. 49-62.

Computers

&

Approach

Security

to

Software Engr. November ,

1982, pp. 574-582

,

Key Words:

statistical,

auditing.

Key Words:

Key Words:

database,

database,

CHI-86

methods.

techniques.

Chin, F.Y.

BUC-89

CAR-85

Buczkowski, L.J. "Database Inference Controller," Proc.

11.3 (Data Base) (6:

MP WG

Workshop

in-89), 1989.

,

inference.

and

H. Jurgensen "Design of a Secure Relational Data Base," Proc.

mP/Sec. (2:

Key Words:

"Security Problems

Carroll, J.M.,

on

Inference Control for

MAX

SUM,

and MIN Queries," Journal of the July 1986, pp. 451-464.

ACM

,

'85. Dublin, 1985.

GRI-85). pp. 1-16.

control,

Key Words: inference.

Key Words:

database, design,

methods, relational.

6-2

statistical,

COX-88

CLA-83

DEN-80

Claybrook, B.G.

Cox, L.H.

"An Approach

"Inference Controls for

Developing Multilevel Secure Data Base Management Systems," Proc. 1983 IEEE Symp. on Sec. & Privacy

.

to

IEE-83a), pp. 4-

(5:

Frequency Count Tables:

An

Update," Proc. 4th Aerospace Comp. Sec. Conf. . (4: lEE88b), 1988. pp. 112-117.

17.

Key Words: DBMS,

Key Words: design,

M. Hale

DBMS:

Database Security National ,

Computer Security Center, Meade. MD, June 1986.

Key Words:

Ft.

proceedings,

database.

Under Random Sample

Identification of

Critical Problems." Proc. 5th

Security Applicat. Conf. (4: IEE-89c). 1989. pp. 148-165.

Key Words:

,

.

Key Words: DBMS, methods,

Davida,

"Suppression Methodology Statistical EHsclosure

and

Control," Journal of Statistical

Association

,

June 1980, pp.

Denning. D.E.

Might Compromise." Proc. 1981 IEEE Svmp. on Sec. &

"Restricting Queries that G.I..

D.L. Wells,

and J.B. Kam "A Database System with Subkeys." Trans, on Database Systems June 1981. pp. 312-328.

ACM

Lead

to

Privacy .

(5:

IEE-81), pp. 33-

40.

.

Key Words:

statistical,

inference, techniques.

Key Words: statistical,

database,

DEN-82

encryption.

methods.

Denning. D.E.. and E. Wehrle

DAV-88 COX-86

Frequency Count Tables," IEEE Cipher June 1986, pp.

Davidson. J.W. "Implementation Design for a Kemelized Trusted DBMS," Proc. 4th Aerosp. Comp. Sec. Conf.. (4: IEE-88b), 1988, pp.

4-14.

91-98.

Cox, L.H. "Inference Control for

,

Key Words:

statistical,

techniques.

DEN-81

377-385.

Key Words:

Trans, on

Database Systems September 1980, pp. 291-315.

DAV-81

Cox, L.H.

ACM

Queries."

software.

COX-80

American

Denning, D.E. "Secure Statistical Databases

"Software Methodology for Development of a Trusted

NCSC

Workshop on

Invitational

and

S.,

E. Siarkiewicz

(Eds.)

statistical,

DEN-80a

Crocker,

Proceedings of the

.

1980. pp. 88-102.

inference.

CRO-89 Coates, C. and

ACM

Key Words:

statistical,

inference.

methods.

COA-86

Denning, D.E., and J. Schlorer "A Fast Procedure for Finding a Tracker in a Statistical Database," Trans, on Database Systems March

statistical,

Key Words: DBMS,

Schlorer,

"Memoryless Inference Controls for Statistical Databases," Proc. 1982

Symp. on Sec.

&

IEEE

Privacy

,

(5:

IEE-82), pp. 38-43.

Key Words: kernel,

J.

statistical,

inference.

design.

inference.

DEN-83

COX-87

DEJ-83

Cox, L.H. "Modelling and Controlling User Inference," Proc. IhlP 11.3 Meeting (6: LAN-

WG

.

88), 1987, pp. 167-171.

inference.

W.

"Compromising Statistical Data Bases Responding to Queries About Means," ACM Trans, on Database Systems ,

March

Key Words:

Denning, D.E.

DeJonge,

'The Many-Time Pad: Theme and Variations," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: IEE-83a), pp. 23,

30.

1983, pp. 60-80.

Key Words:

database,

Key Words:

statistical,

inference.

6-3

encryption.

database,

DEN-83a

DEN-86a

Denning, D.E., and J.

"A Preliminary Note on

Schlorer

Data Bases," IEEE

Computer July 1983,

pp. 69-

,

Proc.

NCSC Workshop (6:

,

Denning, D.E. "Database Security," in Traub,

Annual Review of Computer Science Volume 3, Aimual Reviews, Inc., Palo Alto, CA, 1988, pp. J.F., et al., (Eds.),

Multilevel Database Systems,"

Database Security

82.

Key Words:

the

Inference Problem in

"Inference Controls for Statistical

DEN-88a

Denning, D.E.

on

COA-

,

86), 1986, pp. 11-114.

1-22.

Key Words: MLS,

Key Words:

statistical,

inference.

database,

database, general.

inference.

DEN-83b

DEN-88b

DEN-87

Denning, D.E. "Field Encryption and

Denning, D.E.

Denning, D.E.,

"An Evolution of Views,"

et al.

Authentication," Proc.

"Views

Crypto-83

Database Security," IEEE Trans, on Software Engr. February 1987, pp. 129-140.

,

Santa Barbara,

1983, (9: CHA-84b), pp. 231-247.

Key Words:

Key Words: MLS,

statistical,

database,

views.

DEN-84

Symp. on Sec.

&

Privacy IEE-84), pp. 52-61.

et al.

Multilevel Relational Data

Model," Proc. 1987 IEEE

Symp. on Sec. (5:

,

&

,

Workshop CA, May 1988

database,

Key Words: MLS,

database,

Denning, D.E. 'Toward a General Multi-Level Data Model," IEEE Cipher April 1989, pp. 34-40. database,

models.

models.

DI1^86

DEN-87b DEN-85 Denning, D.E.

"Commutative Filters for Reducing Inference Threats in Multilevel

Database

Systems," Proc. 1985

Symp. on Sec.

&

Key Words: MLS,

Dillaway, B.B., and

Denning, D.E. "Database System Lessons Learned from Modeling a Secure Multilevel Relational Database System," Proc. IHP 11.3 Meeting (6: LAN-

J.T.

Haigh

"A

Practical

88), 1987, pp. 35-43.

86a), 1986.

Key Words: MLS,

Key Words: MLS,

WG

IEEE

Privacy IEE-85), pp. 134-146.

,

database,

,

database,

models, relational, case.

Design for Multi-

Level Security in Secure Database Management Systems," Proc. 2nd Aerosp. Comp. Sec. Conf. , (5: lEE-

database,

design, case.

inference.

DEN-88

DEN-86 Denning, D.E.,

"Views for Multilevel Database Security," Proc. 1986 IEEE Symp. on Sec. Privacy ,

(5:

Drr-88

Denning, D.E., et al. "The SeaView Security Model," Proc. 1988 IEEE

et al.

&

Symp. on Sec. (5:

&

Privacy

Dittrich, K.R., et al.

"Analysis of the Privacy

Model ,

IEE-88a), pp. 218-233.

Key Words:

WG

11.3

Workshop

,

(6:

LAN-

stabase, model,

Key Words:

views.

Key Words: MLS,

for the Information

System DORIS," Proc. IFIP 89b), 1988, pp. 105-121.

IEE-86), pp.

156-172.

,

LUN-90), pp. 74-77.

(6:

Key Words: MLS, database,

encryption.

(5:

Park,

,

Privacy IEE-87a), pp. 220-234.

Key Words: MLS, Key Words: MLS,

Menlo

DEN-89

Denning, D.E.,

"A

Data Base

Security Invitational

views.

DEN-87a

Denning, D.E. "Cryptographic Checksums for Multilevel Database Security," Proc. 1984 IEEE

RADC

Proc.

,

encryption.

(5:

for Multilevel

database,

case.

views.

6-4

database, model,

DOB-87

DUC-85

Dobson,

J.

"Sec.

Databases:

&

A

11.3 Meeting . (6:

LAN-

Computers

Key Words:

database,

general.

&

Security .

pp. 317-323.

database, control,

DUN-86

Dobson,

and

J.E.,

"Security

Models and

Dissemination." Journal of the

American

Enterprise Models." Proc.

MP WG

11.3

Workshop

.

(6:

(U.K.), April 1986, pp. 85-94.

Key Words: DBMS,

Statistics

Association

.

LAN-89b). 1988, pp. 1-39.

pp. 10-18.

Key Words:

Key Words:

Fernandez, E.B.. R.C.

Summers, and C. Wood Database Sec. & Integrity Addison-Wesley. Reading,

.

Vol. 81, No. 393,

MA.

statistical,

general.

1981.

Key Words: book, databse, models,

FER-89

DWY-87

DOW-86 Downs, D.D.

TCSEC NCSC

"Applicability of the

DBMS,"

database,

methods.

general.

to

policy,

FER-81

Duncan, G., and D. Lambert "Disclosure-Limited Data

McDermid

"Security Issues and Features of Database Management Systems." Information Age .

methods.

case.

DOB-88 JJi.

12."

December 1985.

88), 1987. pp. 11-22.

Key Words:

Feeney, T.

A.J.

"Data Sharing and Access Protection in Business System

Personal View," Proc.

WG

FEE-86

du Croix.

Proc.

Workshop on Database (6: COA-86). 1986, pp.

Sec. , Jl-

Jll.

Fernandez. E.B.. E.Gudes.

Dwyer. P.A., G.D. Jelatis, and B.M. Thuraisingham "Multi-Level Security in

Database Management Systems," Computers & Security June 1987, pp. 252,

and H.Song

"A Security Model of ObjectOriented Databases." Proc. 1989 IEEE Symp. on Sec. Privacy

.

(5:

&

IEE-89b), pp. 110-

115.

260.

Key Words: MLS, DBMS,

Key Words: FRA-85

methods.

DOW-86a

Fraga,

DWY-88

Downs. D.D.

"A

Dwyer. P.. et al. "Query Processing

"Discretionary Security in

Database Management Systems." Proc. NCSC Workshop on Database Sec.

LDV:

in

A

COA-86). 1986. pp. KlKIO.

Secure Database System." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 118-124.

Key Words: DBMS,

Key Words:

.

(6:

policy,

,

database,

IFIP/Sec GRI-85). pp.

File System," Proc.

Key Words:

(2:

database, methods,

case.

FRI-80

Hoffman

Eriksson, R., and K.

Beckman

to

Secure Databases." Proc.

Greenburg, and T.F. Lunt

"Protecting of Data Bases

1980 IEEE Symp. on Sec.

'Issues in Distributed

Privacy

Database Security," Proc. 5th Security Applicat. Conf. (4:

Using File Encryption," Proc. IFIP/Sec. '83 Stockhohn, 1983. (2: FAK-83), pp. 217-

IEE-89c). 1989, pp. 196-203.

221.

,

.

.

Key Words:

database,

Key Words:

database,

encryption.

6-5

(5:

Key Words:

&

IEE-80), pp. 18-

21.

methods. network, general.

.

'Towards a Fail-Safe Approach

ERI-83 I.B.

and D. Powell

Dublin. 1985. 203-218.

L.J.

DOW-89

J.,

Fault and Intrusion-Tolerant

Friedman. A.D.. and

techniques.

discretionary.

Downing, A.R.,

database, models.

Key Words: MLS. DBMS,

criteria.

statistical,

GAR-89

GAL-85

FRO-88

W.E. McCarthy

Froscher, J.N., and

Gal. G.. and

C. Meadows "Achieving a Trusted

"Specification of Internal

Database Mangement System Using Prallelism," Proc.

WG

MP

Accounting Controls in a Database Environment." Computers & Security March ,

Workshop. (6: LAN-89b), 1988, pp. 151-

1985. pp. 23-32.

160.

Key Words:

11.3

WG

.

1989. database,

Key Words: DBMS,

auditing.

Key Words: DBMS,

Garvey, C, et al. "A Layered TCB Implementation Versus the Hinke-Schaefer Approach," Proc. IFIP 11.3 (Data Base) Workshop (6: IFI-89),

GAR-86

methods.

GIL-80

Garvey, C.

FUG-85

"Architecture Issues in Secure

Gilhooley. I.A.

"Design of a Relational Schema for Database

Database Mangement Systems," Proc. NCSC Workshop on Database Sec.,

(Ed.).

Dynamic Authorization

(6:

Fugini.

M.

Management." Proc. IhlP/Sec. GRI-

:85, Dublin. 1985. (2: 85), pp. 17-25.

COA-86), 1986, D19.

pp.

Key Words: DBMS,

Dl-

design,

methods.

Key Words:

Garvey, C, and A. Wu "ASD- Views," Proc. 1988

IEEE Symp. on

M.G.

"Secure Database Development Methodologies," (6:

Advances in Computer Management. Vol. 1 Heyden & Son. Philadelphia, PA. 1980. pp. 33-56. Security

Key Words:

.

database, methods,

general.

GAR-88

FUG-88

MP WG

Proc.

"Data Security, in RuUo, T.A.

database,

control, methods.

Fugini.

design,

case.

trusted,

11.3 Meeting .

LAN-88). 1987. pp. 103-

Privacy

,

(5:

Sec.

&

IEE-88a), pp. 85-

Glasgow, J., G. MacEwen, and P. Panangaden "Security by Permission in Databases." Proc. 11.3

95.

Key Words: MLS. DBMS,

Workshop

.

MP WG

(6:

LAN-89b).

1988, pp. 197-205.

Key Words:

views.

129.

GLA-88

database, control,

methods.

Key Words:

GAR-88a

database,

C. N. Jensen, and J. Wilson "The Advanced Secure DBMS: Making Secure

Garvey.

methods.

GAJ-88 Gajnak, G.E.

"Some

Results from Entity-

Relationship Multilevel

Secure DBMS Project," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, ,

pp. 66-71.

DBMSs

WG

Usable," Proc. IFIP

11.3

Workshop

,

(6:

LAN-89b), 1988, pp. 187-195.

GRA-82 Graubart, R.. and J.P.L.

Woodward

"A Preliminary Naval Surveillance

DBMS

Security

Model." Proc. 1982 IEEE Symp. on Sec. & Privacy (5:

Key Words: MLS, DBMS,

.

IEE-82), pp. 21-37.

Key Words: DBMS, models,

case.

case.

Key Words: MLS, DBMS,

GAJ-88a Gajnak, G.E.

"Some

Results from

Entity/Relationship Multilevel

Secure

RADC

DBMS

Park.

Workshop Menlo CA, May 1988, (6: ,

GRA-84 Graubart, R.

86a). 1986, pp. 58-64.

'The Integrity Lock Approach Secure Database Management," Proc. 1984 IEEE Symp. on Security

Key Words: MLS,

74.

to

Privacy

Project." Proc.

Data Base Security

Invitational

GAR-88b Garvey, C.E., and P.N. Papaccio "Multilevel Data Store Design." Proc. 2nd Aerosp. Comp. Sec. Conf. . (5: lEE-

case.

database,

.

(5:

IEE-84), pp. 62-

design.

Key Words: DBMS,

LUN-90), pp. 144-156.

methods.

Key Words: MLS, DBMS, case.

6-6

design,

GRA-84a S.

HEN-88

HAI-87

Graubart, R.D., and

Haigh, J.T.

Kramer

"The Integrity Lock Support Environment," Proc. IMP/Sec. J4. Toronto. 1984, (2: FIN85). pp. 249-268.

Key Words:

database, design,

mP WG

88), 1987, pp. 45-56.

LAN-89b). 1988. pp. 233-245.

Key Words:

Key Words:

WG

.

database,

Information," Proc. 11.3

Workshop

.

(6:

database, methods.

HEN-88a HAI-89

GRA-89

Haigh,

"Comparing DBMS and Operating System Security Requirements - The Need for Separate

DBMS

WG

Workshop

.

1989.

(6: IFI-89).

Security

WG

IFIP 11.3 (Data Base) Workshop (6: in-89). 1989.

Criteria," Proc.

J.T., et al.

'The LDV Approach to Database Security." Proc. IFIP 11.3 (Data Base)

Graubart. R.

.

database,

Key Words: DBMS,

methods.

requirements. Hale.

M.W.

HEN-89

"Status of Trusted Database

System

GRA-89a

IFIP

Interpretations." Proc.

WG

11.3 Meeting . (6:

LAN-88), 1987, pp. 263-268.

Graubart, R.

"A Comparison of Three

Secure DBMS Architectures," Proc. IFIP 11.3 (Data Base) Workshop. (6: IFI-89),

WG

Key Words:

database, criteria.

Key Words: DBMS,

"Data Base Security System Architectures." Information Systems Vol. 6. No. 1. 1981.

design,

.

pp. 1-22.

GUD-80 Gudes. E. "The Design of a Cryptography Based Secure File System," IEEE Trans, on Software Eng. September 1980. pp. 411-420. .

Key Words:

database, design.

Helming, R.R., and S.A. Walker "Computer Architectures and Natl.

cryptography.

GUY-89

,

Key Words: database, design.

Guynes. C.S.

A

Matter of

Privacy," Computers

March 1989,

&

pp. 15-

Key Words:

Henning. R.R.

statistical,

Hinke, T.H. "Secure Database Management

System Architectural Analysis," Proc. NCSC Workshop on Database Sec. (6: COA-86). 1986. pp. E1-E15.

Key Words: DBMS,

design,

methods.

HIN-87 Hinke, T.H.

"DBMS

Technology

Threats," Proc. IFIP

Meeting

.

(6:

vs.

WG

11.3

LAN-88). 1987.

'The Allocation of Database

Key Words: DBMS, general.

WG

,

HIN-86

Management System

Security

Responsibilities." Proc. IFIP

20.

Trusted

pp. 57-87.

HEN-87

"Protecting Statistical

in

.

HEN-86

Database Security," Proc. 9th Comp. Sec. Conf. (5: NCS-86), 1986. pp. 216-230.

database,

"DAC Mechanisms

Database Management Systems." Proc. 2nd RADC Data Base Security Workshop (6:RAD-90). May 1989.

discretionary.

Hartson. H.R.

case.

Henning. R.R.

Key Words: DBMS,

HAR-81

1989.

Databases:

.

HAL-87

requirements, critCTia.

Key Words:

Henning. R.R. "Industry and Government DBMS Security & Privacy Needs-A Comparison." Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b). 1988. pp. 99105.

Key Words: MLS.

Key Words: DBMS,

.

Schema

requirements.

methods.

Society

Henning. R.R.. R.P. Simonian "Security Analysis of Database

"Modeling Database Security Requirements," Proc. IFIP 11.3 Meeting (6: LAN-

11.3 Meeting . (6:

LAN-

88). 1987. pp. 131-148.

requirements.

Key Words: database, management.

6-7

threats,

HON-82

HIN-88

"A Mechanism

.

IEE-88a), pp. 96-

(5:

for Database

Protection in Cellular-Logic

Management Systems," Proc. 1988 IEEE Symp. on Sec. & Privacy

HUB-86

Hong, Y.-C., and S.Y.W. Su

Hinke. T.H. "Inference Aggregation Detection in Database

Devices,"

IEEE

Trans, on

Criteria:

Software Engr. November 1982, pp. 583-596.

Key Words: database,

Do They

Conf. 21-24. ,

Relate?,"

Comp.

Proc. 9th Natl.

,

106.

Key Words:

Hubbard, B.S., S.A. Walker, and R.R. Henning "Database Systems and The Sec.

NCS-86), 1986. pp.

(5:

database,

Key Words:

techniques.

database, criteria.

inference.

HOP-88 HIN-88a Hinke, T.H. "Database Inference Engine Design Approach," Proc. IFIP

WG

11.3

Workshop

.

(6:

LAN-89b), Oct. 1988. pp. 247-262.

IEO-88

Hoppenstand, G.S., and D.K. Hsiao "Secure Access Control with High Access Precision: An Efficient

Approach 11.3

"An Analysis of Database Security with Queries to

Higher Order

Statistical

WG

Information," Proc. IFIP

to

Multilevel Security," Proc.

MP WG

leong, I.T., and T.C. Ting

Workshop

.

11.3 (6:

Workshop

.

(6:

LAN-89b),

1988, pp. 207-223.

LAN-89b). 1988. pp. 167-176.

Key Words:

Key Words:

database,

Key Words: MLS.

inference, design.

database,

statistical,

methods.

control.

m-89

HIN-88b Hinke, T.H., et al. "A Secure DBMS Design," Postscript, 11th Natl. Comp. Sec. Conf.

(5:

,

NCS-88a),

Proceedings,

Hosmer. H.H.. and B.K. Bums "Designing Multilevel Secure

inP

database, design,

WG

11.3

Workshop

.

(6:

LAN-89b). 1988. pp. 161-165.

Key Words: proceedings, database, MLS, methods, general.

Key Words: MLS. HIN-89

database,

JAJ-89

design.

Hinke. T.H. "DBMS Trusted Computing Data Taxonony." Proc. IFIP 11.3 (Data Base)

Workshop

WG

,

methods.

WG

Workshop on

Database Security, IFIP 11.3 (Data Base) Monterey, CA, September 5-7, 1989.

Distributed Databases." Proc.

1988, pp. 1-13.

Key Words:

HOS-88

.

(6: IFI-89).

1989.

Jajodia, S., et

HOS-89 "Handling Integrity Lock Violations," Proc. IFIP

Workshop

Hosmer, H.H.

11.3 (Data Base)

Key Words: DBMS, methods,

al.

"Audit Trail Organization in Relational Databases." Proc. IFIP 11.3 (Data Base)

(6:

WG

WG

Workshop

.

(6: IFI-89),

1989.

,

Key Words:

in-89). 1989.

database, auditing.

design.

Key Words: HIN-89a Hinke, T.H. "Database Design with

MAC

Workshop

May

.

(6:

JAJ-89a Jajodia, S., et

Row

RAD-90),

1989.

Management Systems."

HSI-87

2nd

Hsiao. D.K.

"Database Security Course 11.3 Module." Proc. IFIP Meeting (6: LAN-88). 1987, pp. 269-301.

WG

RADC

design.

database,

Proc.

Data Base Security Workshop (6: RAD-90). May .

1989.

.

Key Words: DBMS, methods.

Key Words: MLS,

al.

"Auditing in Secure Database

and Table Level DAC," Proc. 2nd RADC Data Base Security Level

database,

techniques.

Key Words:

database,

awareness, general.

6-8

auditing,

KEE-89C

JEN-88 Jensen, N.R.

"System Security Officer Functions in the

DBMS,"

Proc.

Workshop Oct 1988.

.

(6:

A1

inP

Secure

WG

11.3

LAN-87a

Keefe, T.F., and W.T. Tsai "Prototyping the SODA

Landwehr, C.E. (Ed.) Database Security: Status and

Security Models," Proc. IFIP

Prospects, Proceedings, IFIP

WG

11.3 (Data Base)

Workshop

LAN-89b),

1989.

(6: IFI-89),

.

pp. 53-62.

Key Words:

Key Words: MSL. DBMS,

database,

WG

11.3 (Data Base) Initial Meeting Aimapolis, MD, October 1987, North-Holland, Amsterdam, 1988. ,

methods, case.

Key Words:

management.

KEM-87 JEN-88a

proceedings,

database, general, methods..

Kemmerer, R.A.

LAN-89

Jensen, N.R.

"Formal Specification and

"Implications of Multilevel

Verification Techniques for a

Security on the Data

Trusted

WG

Dictionary of a Secure Relational

DBMS,"

Proc. 4th

DBMS,"

Proc. IFIP

11.3 Meeting . (6:

LAN-

88), 1987, pp. 229-240.

Landwehr, C.E., (Ed.) Database Security, 11: Status and Prospects Proceedings. IFIP

WG

,

11.3 (Data Base)

Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 58-

Key Words: DBMS,

October 1988, North-Holland,

59.

verification.

Amsterdam, 1989.

Workshop, Kingston, Ontario,

,

Key Words: MLS, DBMS,

KNO-87

Key Words:

Knode, R.B.

design.

'Trudata:

KEE-89

The Road

DBMS,"

Trusted

Comp.

to a

Proc. 10th

Keefe, T.F.,

Natl.

M.B. Thuraisingham, and W.T. Tsai "Secure Query Processing Strategies," IEEE Computer March 1989, pp. 63-70.

NCS-87a), 1987, pp. 201-210.

Key Words:

Sec. Conf. , (5:

Key Words: DBMS, methods, ,

case.

KEE-89a

Conf. ,

et al.

"Multi-Party Update Conflict:

The Problem and

(4:

Sec.

Comp.

case.

lEE-

(4:

89c), 1989, pp. 222-231.

database, design,

Keefe, T.F., et al. "SODA: A Secure Object-

Leiss, E.L.

Plenum

Press,

LEI-86

A

'The Inaccessible

Publications, Wellesley Hills,

Classification by

MA.

of Security Risk in Statistical Databases," Information Processing Letters December 1986, pp. 275-279.

1983.

Set:

Query Type

,

Key Words: book,

databse,

controls.

Key Words:

New

database,

Leiss, F.L.

,

October 1989, pp. 517-533.

,

York, 1982.

Management Advisory

Oriented Database System," Security

LEI-82

J.J.

Line, Database Systems ,

KEE-89b

database,

general.

Controls for AdvancedA3n-

&

Key Words: requirements.

Key Words: book,

KUO-83 Kuong,

database,

techniques.

Computers

,

Security

Its

,

Decision Support Systems," Proc. IFIP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 239-

Principles of Database

82-90.

Key Words:

Key Words:

Comp.

IEE-88b), 1988, pp.

Solution," Proc. 5th Aerosp.

Sec. Conf.

Lavrence, D.I. "Some Security Aspects of

248.

Proc. 4th Aerosp.

Keefe, T.,

LAV-84

KNO-88 Knode, R.B. and R.A. Hunt "Making Databases Secure with Trudata Technology,"

database,

methods, general.

proceedings,

database.

Key Words:

database, case.

LAN-87

methods.

Landwehr, C.E. (Chm.) "Database Security: Where

WG

Are We," Proc. IFIP Meeting (6: LAN-88),

11.3

,

October 1987, pp.

Key Words:

1-9.

database, general.

6-9

statistical,

Lunt, T.F., et

Probability Distribution,"

ACM

Trans,

LUN-89

LUN-88

LIE-85 Liew. C.K., W.J. Choi, and C.J. Liew "A Data Distortion by

on Database

Systems September 1985, pp. ,

Lunt, T.F.

al.

"A Near-Term Design for the Sea View Multilevel Database System," Proc. 1988 IEEE Symp. on Sec. & Privacy (5:

"Aggregation and Inference: Facts and Fallacies," Proc.

IEE-88a), pp. 234-244.

109.

Key Words: MLS,

Key Words:

,

1989 IEEE Symp. on Sec.

&

Privacy . (5: IEE-89b), pp. 102-

395-411.

Key Words:

database,

design.

statistical,

database,

inference.

methods.

LUN-88a LIN-89 Lin, T.Y.

"Some Remarks on

2nd

Controllers," Proc.

RAEXr Data Base Workshop

May

(6:

,

Inference

Security

LUN-89a

Lunt, T.F.

Lunt, T.F.

"Access Control Policies for Database Systems," Proc. IFIP

RADC

WG

11.3

Workshop

(6:

.

LAN-89b). 1988, pp. 41-52.

RAD-89),

,

database, control,

Key Words:

policy.

Key Words:

Workshop," Proc. 5th Aerosp. Comp. Sec. Conf. (4: lEE89c). 1989. pp. 310-313.

Key Words:

1989.

"Report from the Second Database Security

database, general.

database,

LUN-88b

inference.

LUN-89b Lunt, T.F.

Lunt, T.F.

LIN-89a

"Multilevel Database Systems:

"Multilevel Security for

Lin, T.Y.

Meeting Al," Proc. IFIP

Object-Oriented Database

"Commutative Security Algebra and Aggregation," Proc. 2nd RADC Data Base

89b), 1988. pp. 177-186.

Security 89),

Workshop

May

,

(6:

RAD-

11.3

Workshop

.

WG

LAN-

(6:

11.3

(6:

IFI-89). 1989.

Key Words: MLS,

database,

Key Words: MLS.

methods.

1989.

WG

System," Proc. IFIP (Data Base) Workshop .

database,

methods.

Key Words:

LUN-88C

database,

methods, theory.

Lunt, T.F.

"A Summary of

LOC-87

the

RADC

Database Security Workshop,"

Urh

Comp.

Lochovsky, F.H., and C.C. Woo "Role-Based Security in Database Management

Conf. . (5: NCS-88), 1988, pp. 188-193.

Systems," Proc. IFIP

Key Words:

11.3 Meeting . (6:

WG

Proc.

Natl.

Sec.

database, general.

LUN-88d

Key Words: DBMS, methods.

LUN-87

Veriag,

,

New

York, 1990.

'Toward a Multilevel

Lunt, T.F., and T.A. Berson

Conf.

"An Expert System

72-79.

to

.

(4:

Comp.

Sec.

IEE-88b), 1988. pp.

Classify and Sanitize Text,"

3d Aerosp. Comp. Sec. IEE-87b), 1987,

proceedings,

general.

Proc. 4th Aerosp.

(5:

Workshop Menlo CA, May 1988, Springer

Invitational

Key Words:

Relational Data Language,"

,

Research Directions in Database Security, Proceedings, 1st RADC Data Base Security Park,

Lunt, T.F.

Conf.

Lunt. T.F.

LAN-88),

1987, pp. 209-222.

Proc.

LUN-90

MAC-87 MacEwen, G.H. "Effects of Distributed System Technology on Database Security:

Key Words: MLS.

relational,

MP WG

A

Survey," Proc.

11.3 Meeting , (6:

LAN-88), 1987. pp. 253-261.

design.

pp. 30-34.

Key Words:

LUN-88e

Key Words: techniques.

database,

Lunt, T.F.. et

networks.

al.

"Element-Level Classification with A-1 Assurance."

Computers

&

Security

,

February 1988, pp. 73-82.

Key Words: MLS. methods.

6-10

database,

database,

MAN-87

MCL-85

Manola, F.A.

"A Personal View of Security," Proc. IFIP

11.3 Meeting . (6:

Oct

DBMS

WG

MEA-88b

McLeish, M.

Meadows, C.

"Inference Controls for

"New Approaches

Intelligent Databases."

LAN-88).

1987, pp. 23-34.

Proceedings. 1985 Conference

Base Security

Press, Oakland,

May

MI, April

1985, pp. 71-75.

general.

MAT-86

Key Words:

Matloff. N.S.

database,

methods, control, inference.

"Another Look at the Use of Noise Addition for Database Security." Proc. 1986 IEEE

Symp. on Sec.

&

Privacy IEE-86), pp. 173-180.

,

(5:

MCL-89 the

Workshop Menlo

Park,

.

CA,

1988, (6: LUN-90). pp. 193-200.

Key Words:

database, design,

methods, general.

"Constructing Containers Using

Security of Partitioned

a Multilevel Relational Data

Statistical

ACM

Trans, on

Database Systems . March

techniques.

RADC Dau

Invitational

Meadows. C.

on

"Further Results

Databases,"

statistical,

Database

MEA-89

McLeish, M.

Dynamic

Key Words:

to

on

Discussion," Proc.

on InteUigent Systems and Machines Oakland University .

Key Words: MLS, DBMS,

Security: Report

WG

Model." Proc. IHP (Data Base) Workshop in-89), 1989.

.

11.3 (6:

1989, pp. 98-113.

MAT-87

Key Words:

Matloff, N.S.

Query

"Inference Control via

Key Words: statistical,

methods.

Restriction vs. Data

IMP Meeting (6: LAN-

Modification," Proc.

database, model,

design, relational.

MEA-89a

MEA-87

Meadows, C, and

88), 1987. pp. 159-166.

"Integrity vs. Security in

J. Forscher "Operating System Support of Multilevel Applications," Proc.

Key Words:

Multi-Level Secure Databases," Proc. IFIP

Workshop

WG

11.3

.

statistical,

Meadows, C, and

S. Jajodia

WG

11.3 Meeting . (6: LAN-88),

techniques.

2nd

RADC .

Data Base Security (6:

RAD-90),

May

1989.

1987, pp. 89-101

MAT-88 Matloff. N.S.. and P. Tendick

Key Words: MLS,

"The 'Curse of

methods,

Key Words: OS, databases,

integrity.

MIN-81

Dimensionality' in Database Security." Proc. IFIP

11.3

WG

Workshop (6:LAN-89b), .

MEA-88

Minsky, N.

Meadows, C, and

S. Jajodia

"Maintaining Correctness,

1988, pp. 225-232.

Availability, and Unabiguity

Key Words:

database, theory,

MCH-88 McHugh,

Data Base

in Trusted

Management Systems." Proc. 4th Aerosp. Comp. Sec.

methods.

Conf. (4: IEE-88b). 1988. pp. 106-110. .

and B.M. Thuraisingham J.,

database,

methods.

"Multilevel Security Issues in

Key Words:

Distributed Database

methods, techniques.

trusted.

DBMS,

"Synergistic Authorization in

Database Systems," Proc., 7th Intemat. Conference on Very Large Database Systems , September 1981.

Key Words:

databases, control,

methods, techniques.

MIR-80

Key Words: MLS, DBMS,

Application Using an Object-

Miranda, S. "Aspects of Data Security in GeneralPurpose Data Base Mangement Systems," Proc. 1980 IEEE Symp. on Sec. Privacy . (5: IEE-80), pp. 46-

network.

Oriented Data Model," Proc.

58.

Management Systems,"

Computers & Security August 1988. pp. 387-396. ,

MEA-88a Meadows, C.

&

"Designing a Trusted

RADC

Data Base Security

Workshop Menlo CA. May 1988 (6:

Invitational

Park,

,

LUN-90), pp. 157-163.

Key Words:

database, models,

design.

6-11

Key Words: DBMS, requirements, methods.

MOR-87 "Sec.

&

Notargiacomo,

Inference in

Knowledge-Base Systems,"

ACM

Intemat. Conf.

on Management of Data

(SIGMOD-87) May .

Key Words: MLS,

L.,

Omar. K.A., and D.L. WeUs

and

O'Connor "Report on Secure Distributed Data Management System

"Modified Structure for the Subkeys Model." Proc. 1983 IEEE Symp. on Sec. &

Research," Proc.

Privacy , (5: IEE-83a), pp. 79-

J.P.

Multilevel Database and

Proc,

OMA-83

NOT-86

Morgenstem, M.

NCSC

Workshop on Database Sec.,(6: COA-86), 1986, G1-G9.

1987.

86.

pp.

Key Words:

database,

Key Words:

inference.

database,

OZS-82

methods, network.

MOR-88 Morgenstem, M.

NOT-88 Notargiacomo, L. "Secure Distributed

"Controlling Logical

Inference in Multilevel

Database Systems," Proc. 1988 IEEE Symp. on Sec. Privacy (5: IEE-88b), pp. 245-255.

&

.

DBMS

-

Architecture Definition," Proc.

RADC

Data Base Security

Workshop Menlo

Invitational

Park,

,

CA, May 1988

,

Key Words:

statistical,

methods, inference, design.

database,

Key Words: MLS, DBMS,

inference.

OZS-85

design.

MOR-88a Morgenstem, M. "Inference and Aggregation," Proc. RADC Data Base Security Invitational

Workshop Menlo ,

May

1988, 118-133.

(6:

Notargiacomo, L. "Metadata and View Classification," Proc.

Park,

CA,

LUN-90), pp.

Ozsoyoglu, G., and T.A. Su "Rounding and Inference Control in Conceptual Models

NOT-88a

RADC

Data Base Security

for Statistical Databases," Proc.

1985 IEEE Symp. on Sec.

&

Privacy (5: IEE-85), pp. 160,

Workshop Menlo CA. May 1988 (6:

Invitational

Park.

,

173.

Key Words:

LUN-90). pp. 201-205.

Key Words:

database,

statistical,

inference, techniques.

Key Words:

inference.

database,

PAA-86

methods, views.

NAS-83

Paass, G.

Management Report on 1982 Air

Multilevel Data Security,

Ozsoyoglu, G., and F.Y. Chin "Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design," IEEE Trans, on Software Engr. May 1982, pp. 223-234.

(6:

LUN-90), pp. 23-48.

Key Words: MLS,

database,

encryption.

Force Summer Study Air Force Studies Board, National Academy of Sciences, Washington, DC. 1983. ,

OCO-88 "A

Microdata," Proc. IFIP/Sec.

Distributed Architecture

for Multilevel

Database

Sec. Conf.

,

NCS-

(5:

88), 1988, pp. 179-187.

proceedings,

'86

,

Monte

Carlo, 1986, (2:

GRI-89).

Security," Proc. 11th Natl.

Comp.

Key Words:

"Disclosure Risk and

Disclosure Avoidance for

O'Connor, J.P. and J.W. Gray HI

Key Words:

statistical, threats,

techniques.

general.

Key Words: MLS, NBS-81

database,

Palley,

Guidelines on Integrity

Assurance Data Base FTPS PUB Bureau of

J.S.

OLD-84

and Control in Administration

.

88, National

Standards,

Gaithersburg,

MD,

PAL-87 M.A., and Simonoff "The Use of Regression Methodology for Compromise

network.

August

Oldehoeft, A.E., and

McDonald "A Software Scheme

R.

User

Controlled File Encryption,"

&

Computers

1981.

for

Security ,

of Confidential Information in Statistical Database," Trans, on Database Systems , December 1987, pp. 593-608.

ACM

February 1984, pp. 35-42.

Key Words:

Key Words:

database,

guidelines integrity, methods.

Key Words:

database,

encryption.

6-12

statistical, threats.

PAT-85

SAD-89

REI-84

Patkau. B.H., and

Reiss, S.P.

D.L. Tennenhouse "The Implementation of Secure Entity-Relationship Databases," Proc. 1986 IEEE Privacy (5: Symp. on Sec. IEE-86). pp. 230-236.

"Practical

&

Sadhu, R.

Data Swapping: The

1984. pp. 20-37.

"Mandatory Controls for Database Integrity," Proc. IFIP 11.3 (Data Base) Workshop (6: in-89), 1989.

Key Words:

Key Words:

ACM

First Steps,"

Trans, on

Database Systems March ,

WG

,

,

database,

database, integrity.

techniques.

Key Words:

SCH-80

databse, design,

ROD-80

methods.

PET-89 M.L., E. Gudes, and E£. Fernandez "Security Policies in ObjectPetrie,

Oriented Databases," Proc. JFIP 11.3 (Data Base) Workshop (6: in-89), 1989.

WG

.

and L.A. Cox "A Secure Archival Storage

Schell, R.R.,

Rodriguez,

and

J.J.,

P.S. Fisher

System," Conference Record,

"Security Problems in a Data

1980 IEEE Fall Comcon Washington, DC, 1980.

Base Enviroiunent," in Rullo, T.A. (Ed.), Advances inComputer Security

Management

&

Vol.

,

1,

Son, Philadelphia, PA,

database, threats.

ROU-87

Pluimakers, G.M.J.

"Some Notes on Authorization and Transaction Management in Distributed

A

Dataserver:

DBMS

Multilevel Secure

Problem." Proc. 10th Natl. Comp. Sec, Conf. . (5: NCS87a), 1987. pp. 211-215.

1988, pp. 287-298.

Key Words:

statistical,

inference.

SCH-81 Schlorer,

J.

"Security in Statistical

Databases: Multidimensional

databse, control,

network.

ACM

Key Words:

Solution to the

Computers

Security , June

Databases: Quantitative Aspects of Trackers." Trans, on Database Systems December 1980, pp. 467-492. .

Rougeau, P.A. and E.D. Sturms "The Sybase Secure

Database Systems,"

&

J.

"Disclosure from Statistical

Key Words:

PLU-88

SCH-80a Schlorer,

database, policy,

methods.

database, case.

Heyden

1980, pp. 122-139.

Key Words:

Key Words:

,

ACM

Key Words: MLS, DBMS,

Transformations,"

case.

on Database Systems March

Trans.

,

RAD-89

1981, pp. 95-112.

RUD-85

"Research Directions in Database Security, 11," Proceedings. 2nd

RADC

Base Security Workshop

Data ,

Rudell, M.E.

Key Words:

"Labeling Screen Output,"

techniques.

IEEE Symp. on

Proc. 1986

&

NH, May 1989, SRI International. Menlo Park. CA, December 22,

pp. 237-240.

1989.

Key Words:

Bethlehem.

Sec.

Privacy

,

(5:

IEE-86),

and

J.,

D.E. Denning "Protecting

database,

Query Based

Statistical Output," Proc.

proceedings,

general, policy, methods.

SCH-83 Schloerer,

techniques.

Key Words:

statistical,

RUS-89

mP/Sec.

'83 , Stockholm,

1983,

FAK-83), pp. 37-46.

(2:

Russell, L.

"Semantic Overloading of the

REI-80

Relational

Reiss. S.P. "Practical

Data Swapping," IEEE Symp. on

Proc. 1980 Sec.

&

Privacy

.

(5:

IEE-80),

pp. 38-45.

Model

Key Words:

statistical,

techniques.

for

Multilevel Security," Proc.

2nd

RADC

Security 89),

May

SCH-83a

Data Base

Workshop

,

(6:

RAD-

Schloerer,

J.

"Information Loss in

1989.

Partitioned Statistical

Key Words: techniques.

database,

Key Words: MLS,

database,

Databases," Computer Joumal 3, 1983, pp. 218-223.

No.

methods.

Key Words: inference.

6-13

statistical,

,

SCH-85 "On

SMI-89b

SIC-83

Schaefer,

M.

the Logical Extension of

the Criteria Principles to

ACM

Design of Multi-level Database Management

March 1983.

Systems," Proc. 8th Natl. Sec. Conf. (5: NCS85) . 1985. pp. 28-30.

Comp.

Sicherman, G.L., W. deJonge and R. van de Ried "Answering Questions Without Revealing Secrets." Trans, on Database Systems.

G.W.

Smith,

"Solving Multilevel Database Security Problems: Technology Is

Not Enough,"

WG

Workshop

pp. 41-59.

Proc. IFIP

11.3 (Data Base) .

(6: IFI-89),

1989.

.

Key Words:

Key Words: MLS,

database,

methods.

database,

methods.

Key Words: MLS, DBMS, SMI-89C

SMI-88

criteria, design.

G.W.

Smith,

SCH-86

the Security Semantics of an

and

Schell, R.R..

D.E. Denning "Integrity in Trusted Database Systems," Proc. 9th Natl.

Comp.

Application," Proc. 4th

Comp.

Aerosp.

"MAC, DAC and Proc.

IEE-88b). 1988, pp. 125-130.

Key Words: MLS, Key Words:

86) , 1986, pp. 30-36.

the Need-to-

2nd RADC Data Base Security Workshop (6: RAD-89), May 1989.

Know,"

.

Sec. Conf. , (4:

NCS-

Sec. Conf. , (5:

G.W.

Smith,

"Identifying and Representing

database, models,

database,

policy.

methods.

Key Words:

SMI-89d

database,

SMI-88a

integrity.

SCH-86a

G.W. "Homework Problem

Smith,

G.W.

Smidi.

"Classifying and

and

Schell, R.R.,

D.E. Denning "Integrity in Trusted Database Systems," Proc.

NCSC

Human

Downgrading:

Is

Needed

Loop?." Proc.

in the

a

#2:

MLS

Database Design," Proc. 2nd RADC Data Base Security

Workshop

.

(6:

RAD-89).

RAIX: Data Base Security Invitational Workshop Menlo Park, CA, May 1988. (6:

Key Words: MLS.

LUN-90). pp. 164-185.

design.

May

1989.

.

Workshop on Database Sec., (6: COA-86), 1986, pp. Cl-

database,

C14.

Key Words: MLS,

Key Words:

SMI-89e

database,

methods.

database,

Smith.

SMI-89

SCH-88 M.

"Dynamic Classification and Automatic Sanitization," Proc. RADC Data Base Security

Workshop Menlo CA, May 1988 (6:

Invitational

Park.

G.W.

Smidi,

Schaeffer,

,

"Going Beyond Technology Meet the Challenge of

to

Multilevel Deitabase Security," Proc. 12th Natl.

Conf.

,

(5:

Comp.

Sec.

database,

SMI-89a Smith,

G.W.

Shockley. W.R. and D.F. Warren

Design:

"Description of Multilevel

Applications," Proc. 5th

Key Words: MLS,

,

1989. database,

design.

Spooner. D.L.. and E. Gudes "A Unifying Approach to the

"Multilevel Secure Database

Secure Entity-Relationship DBMS Demonstration." Proc. 11th Natl. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 171-

A

Key Words: MLS, database, OS, design.

Practical

Security Applicat. Conf.

.

(4:

IEE-89C), 1989. pp. 314-321.

.

178.

May

Design of Secure Database Operating Systems," IEEE Trans, on Software Engr., May 1984. pp. 310-319.

methods.

techniques.

SHO-88

RAD-89).

SPO-84

Key Words: MLS, database,

(6:

NCS-89). 1989, pp.

1-10.

LUN-90), pp. 134-139.

Key Words:

W.G.

"Report on the Homework Problem." Proc. 2nd RADC Data Base Security Workshop

integrity.

Key Words: MLS, design.

Key Words: MLS, DBMS, design, case.

6-14

database,

STA-88a

SPO-86 Spooner,

A^.,

"Framework

DBMS,"

"LOCK

for the Seciirity

Component of an

THO-88

Stachour, P.

et al.

ADA

RADC

Proceedings. 12th

International Conference

Very Large Data Bases

Data Views," Proc. Data Base Security

Invitational

on

Park,

Workshop Menlo ,

CA, May 1988

(6:

Tsai. and

"Prototyping as a Research

Tool for

MP WG

MLS/DBMS," 11.3

Proc.

Workshop,

(6:

LAN-89b), Oct 1988, pp. 63-

LUN-90), pp. 65-73.

.

Thompsen, D., W.T. M.B. Thuraisingham

1986, pp. 347-354.

84.

Key Words: DBMS, methods,

Key Words: MLS.

database,

Key Words: MLS, DBMS,

views.

design.

case.

SUM-81 SPO-86a

Summers. R.C..

Spooner, A.M., et

E.B. Fernandez, and C.

al.

"Framework for the Security Component of an ADA

Database Environment,"

DBMS,"

Computer Security

Proc.

"Auditing and Control in a

NCSC

Workshop on Database Sec. (6: COA-86), 1986. pp. Fl-

Wood

Thomsen. D.. W.T. Tsai, and M.B. Thuraisingham "Prototyping to Explore

MLS/DBMS

Journal.

Computers

Spring 1981, pp. 99-121.

,

THO-89

&

Design," Security

.

May

1989, pp. 229-245.

Key Words:

F15.

database,

Key Words: MLS, DBMS,

auditing, case.

Key Words: DBMS, methods,

design.

SUT-87

case.

Su, T.-A, and G. Ozsoyoglu

SPO-87

THU-87 Thuraisingham, M.B.

"Data Dependencies and

Spooner, D.L.

Inference Control in

"Security Checking in

Between Database System and Operating System Security,"

Multilevel Relational Database

Relational Database

Systems," Proc. 1987 IEEE Symp. on Sec. & Privacy (5: IEE-87a), pp. 202-211.

Management Systems Augmented with Inference

"Relationaships

WG

11.3 Meeting LAN-88), Oct. 1987, pp.

Proc. IFIP (6:

,

.

149-158.

Security

Key Words: MLS, DBMS,

Spooner, D.L. "The Impact of Inheritance on Security in ObjectOriented Database System." Proc. IFIP

WG

Workshop

(6:

Oct

.

Su, T.-A., J. Chung, and G. Ozsoyoglu "On the Cell Suppression by Merging Technique in the Lattice Model of Sununary Tables," Proc. 1989 IEEE

Symp. on

11.3

LAN-89b).

Sec.

&

Privacy

,

(5:

database, model,

Key Words: statistical, model, method, techniques.

"Multivalued Dependency P.

Dwyer LDV:

"Update Processing in Secure Database System,"

A

Postscript, 11th Natl.

Comp.

Inferences Relational Database

WG

Systems," Proc. fflP (Data Base) Workshop ,

Proceedings, 21st Hawaii

on

1988.

Key Words:

database,

(6:

11.3

THU-88a Thuraisingham, M.B. "Foundations of Multilevel Databases," Proc.

Base Security

Key Words:

May

RADC

Workshop Menlo 1988

(6:

theory.

method, case.

6-15

Park,

CA,

LUN-90).

Key Words: MLS,

database,

Data

Invitational

,

database,

inference.

Key Words: MLS.

and T.F. Keefe

DFI-89), 1989.

Sec. Conf. , (5: NCS-88a).

1988, pp. 96-115.

Tsai,

"Secure Query processing Using Al Techniques,"

techniques.

Su. T.-A. and G. Ozsoyoglu

B. Thuraisingham, and P.,

W.T.

,

SUT-89a Stachour,

Thuraisingham, M.B.,

Systems Sciences January

methods.

STA-88

THU-88

Intemat. Conference

IEE-89b), pp. 126-135.

1988, pp. 141-150.

Key Words:

inference,

methods.

SUT-89

SPO-88

December 1987, pp.

Key Words: DBMS,

OS,

database,

design.

,

479-492.

inference, control, design.

Key Words:

&

Engines," Computers

database,

VAN-80

THU-89e

THU-89 Thuraisingham. M.B. "A Multilevel Secure Data Model," Proc. 12th Natl. Comp. Sec. Conf. , (5: NCS89). 1989, pp. 579-590.

Thuraisingham, M.B. "Secure Query Processing in Intelligent Database Management Systems," Proc. 5th Security Applicat. Conf. (4: IEE-89C), 1989, pp. 204-

Key Words: MLS,

214.

,

database,

models.

Key Words: DBMS, methods,

THU-89a

Definition Facility

Access Control in Distributed Data Base Systems." Proc. 1980 IEEE

Symp. on Sec. & Privacy IEE-80). pp. 59-66.

.

(5:

database, network,

control.

TIN-87

ACM

VAN-86

Ting, T.C.

"A User-Role Based Data

van der Lans. R.F.

Security Approach," Proc.

"Data Security in a Relational Database Enviromnent." Computers «fe Security June 1986, pp. 128-134.

mP WG

,

11.3 Meeting . (6:

LAN-88). Oct. 1987. pp. 187208.

Key Words: MLS,

"A Module for

Key Words:

techniques.

Thuraisingham, M.B. "Mandatory Security in Object-Oriented Database Systems," Proceedings, Conference on ObjectOriented Progarmming October 1989.

van de Riet, R.P., and A. Wasserman

,

database,

Key Words:

policy.

Key Words:

database,

methods.

database,

relational.

THU-89b TRA-84

Thiffaisingham, M.B.

"Recent Developments in Database Security," Proc, IEEE Comp. Applicat. Conf.

VET-89

Traub.

J.F..

Y. Yemeni, and

,

September 1988.

'TCB

'The

Statistical Security

Statistical

Database."

of a

ACM

Trans, on Database Systems

Key Words:

Vetter, L.,

H. Wozniakowski

Key Words:

THU-89C

Proceedings, 2nd RADC Data Base Security Invitational

Workshop Franconia, NH, May 1989 (6: RAD-90). ,

THU-89d

Troxell, P.J.

'Trusted Database Design," Proc. 9th Natl.

Conf.

,

(5:

Comp.

Sec.

NCS-86), 1986. pp.

37-40 database, trusted,

"A Functional View of

"Security Issues in

Multilevel Databases,"

Systems," Proceedings, 1st

Key Words: MLS,

.

(5:

IEE-82). pp. 104-

Key Words:

database,

WAG-83

Trueblood, R.P.

methods.

Privacy

encryption, control.

TRU-84

pp. 721-729.

"Shared Database Access Using Composed Encryption Functions." Proc. 1982 IEEE Symp. on Security and 110.

Thuraisingham, M.B.

,

database, design.

Wagner. N.R.

design.

December 1989,

IEE-89c),

WAG-82

TRO-86

Key Words:

database,

techniques.

Security

(4:

statistical,

methods.

Thuraisingham, M.B. "Security Checking with Prolog Extensions,"

&

,

1989. pp. 216-221.

December 1984. pp. 672-679.

database,

Key Words:

Computers

The Next

Step," Proc. 5th Security

Applicat. Conf. ,

general, methods.

Key Words:

and G. Smith

Subsets:

International

Wagner, N.R.

Knowledge

Workshop on

Expert Database Systems October 1984, pp. 834-840. ,

"Fingerprinting," Proc. 1983

IEEE Symp. on Privacy .

(5:

22.

Key Words:

database,

Key Words:

database, general,

methods.

database,

techniques, control, authentication.

6-16

Sec.

&

IEE-83a), pp. 18-

WAG-86

WOO-80

WIL-89

Wagner, N.R., P.S. Putter and M.R. Cain

Wilson,

"A

Security Policy for an

"Encrypted Database Design:

AIDBMS

Specialized Approaches,"

Subject)," Proc. 1989

Proc. 1986

Sec.

&

IEEE Symp. on

Privacy

,

(5:

IEE-86),

pp. 148-153.

Key Words:

Wood, C, E.B. Fernandez, and R.C. Summers

J.

(a Trusted

IEEE

Symp. on Sec. & Privacy . IEE-89b). pp. 116-125.

(5:

.

Key Words: MLS. DBMS, database, design,

"Data Base Security: Requirements. Policies, and Models." IBM Systems Journal Vol. 19. No. 2. 2980. pp. 229-252.

Key Words:

policy, case.

encryption, techniques.

database,

requirements.

WIN-88

WHI-89 Whitehurst, RA., and

Winkler, H. "Sybase Secure

T.F. Lunt

Proc.

"The SeaView Verification," Proc.

Comp.

Security Invitational ,

.

May

1988. 65-73.

(6:

Park,

CA,

LUN-90). pp.

,

database, kernel,

design.

WUA-88

WIS -89

WHI-89a

Kernel for Nonproprietary Hardware," Proc. 12th Nad. Comp. Sec. Conf. (5: NCS-

Key Words:

database,

methods, case.

views, case.

Wood, T. "A Trusted Database Machine

89), 1989, pp. 11-17.

Key Words:

verification,

WOO-89 Server,"

Data Base

Workshop Menlo

Sec.

Foundations Workshop 1989 (3: IEE-89a), pp. 125-132.

Key Words:

RADC

SQL

Wu. A.

T.F. Lunt

Wiseman. S. "On the Problem of Security

"The Seaview Verification

in Databases." Proc. IFIP

Architecture." Proc.

Effort," Proc. 12th Natl.

11.3 (Data Base)

Whitehurst, R.A., and

Comp.

NCS-

Sec. Conf. , (5:

(6: IFI-89).

Workshop

1989.

,

"Al Secure

Key Words:

database,

DBMS

Workshop Menlo .

1988. 15-22.

(6:

WIL-88 Wilson,

J.

"Views

as the Security

Objects in a Multilevel Secure Relational Database

Management System," 1988 IEEE Symp. on (5:

CA.

Key Words: MLS. DBMS, design, case.

.

Park.

LUN-90). pp.

requirements.

verificatio,

views, case.

Privacy

RADC

Data Base Security Invitational

May

89), 1989, pp. 18-27.

Key Words:

WG

Proc. Sec.

&

IEE-88a). pp. 70-

84.

Key Words: MLS, DBMS, views.

6-17

Communication and Network Security

7.

This section cites publications on physical security in networks, applied cryptographic techniques, secure communications protocols, and trusted network development.

ABR-88

ABB-84 Abbruscato, C.R.

"Data Encryption Equipment", IEEE

Communications Magazine September 1984, pp. 15-21. ,

ALB-84

Abrams, M.D., S.I. Schaen, and M.W. Schwartz "Strawman Trusted Network

Albert, D.J., et

Interpretation Guideline,"

Management," IEEE Computer

Uth

Proc.

Natl.

Comp.

al.

"Combatting Software Piracy by Encryption and Key ,

April 1984, pp. 68-72.

Sec.

Conf. (5: NCS-88), 1988, pp. 194-200. ,

Key Words:

crypto,

Key Words:

ABB -86

trusted,

"Choosing a Key Style That Suits

the Application," Data Communications April 1986, ,

pp. 146-160.

Key Words:

threats, crypto,

guidelines,

network,

ALV-89

criteria.

Abbruscato, C.R.

Management

Key Words:

keys, management.

hardware.

crypto, keys.

Alvarez, D.L.

ADD-88

"Site Preparedness for the

Addison, K.P. "Secure Networking at Sim Microsystems, Inc.," Proc. 11th Nad. Comp. Sec. Conf. (5: NCS-88), 1988, pp. 212-

Network Emergency," 11th Natl. (5: ,

Comp.

Sec. Conf. ,

NCS-89), 1989, pp. 601-

604.

Key Words:

218.

Next

Proc.

contingency,

network.

Key Words: methods,

ABR-85 Abrams, M.D. "Observations on Local Area Network Security," Proc. 5th Sec. AppUcat. Conf. , (5: lEE-

AMS-88

network, case.

Amsel, E. "Network Security and Access Control," Computers &

AGN-84 Agnew, G.B.

89c), 1989, pp. 77-82.

"Secrecy and Privacy in a

Security

53-57.

Key Words: LAN, methods,

Local Area Network Environment," Proc. Eurocrypt

general.

J4,

Paris, 1984, (8:

BET-85),

,

February 1988, pp.

Key Words:

control, network.

pp. 349-363.

AND-85

ABR-87 Abrams, M.D.

Key Words: LAN, methods,

Anderson,

"Evaluating Security Services

general.

Computer and Network Security Concepts," Proc. 1985 IEEE Symp. on

Under Part 11 of the Trusted Network Interpretation," Proc. 3d Aerosp. Comp. Sec.

J.P.

"Unification of

AGN-85

&

Agnew, G.B.

Sec.

Conf. (5: IEE-87b), 1987, pp. 44-51.

"Modeling of Encryption Techniques for Secrecy and

pp. 77-87.

Privacy in Multi-User Networks," Proc. Eurocrypt

Key Words:

Key Words:

,

criteria.

trusted, network,

:85, Linz, 1985, (8: PIC-86),

Privacy

,

(5:

IEE-85).

models, network.

AND-87 Anderson, D.P., and

pp. 221-230.

Ragan "A Basis for Secure

P.V.

Key Words:

crypto,

techniques, models, network.

Commimication

in Large

Distributed Systems," Proc.

1987 IEEE Symp. on Sec. Privacy .

(5:

&

IEE-87a), pp. 167-

172.

Key Words:

policy, distributed,

models, network.

7-1

AND-87a

ARS-87

BAL-85

A.W.

Anderson, D.P., and

Arsenault,

P.V. Ragan

"High-Performance Interface

"Develoiwnent in Guidance for Trusted Networks," Proc. 10th

Architectures for

Natl.

Cryptographic Hardware," Proc. Crypto '87 Santa

NCS-87a). 1987, pp.

Comp.

Sec. Conf.. (5: 1-8.

,

Barbara,

CA, 1987.

POM-

(8:

88), pp. 301-309.

Key Words:

Key Words:

"Developments in Guidance for Trusted Networks: The

American National Standard for PIN Management and Security, X9.8-1988 American Bankers

Trusted Network Interpretation."

,

Association, Washington,

AIAA

No. 87-

3074, Proc. 3d Aerosp. Comp. Sec. Conf. (5: IEE-87b), 1987, pp. 52-59. .

DC,

January 1982.

Key Words:

Key Words:

Key IEEE

Standard,"

Communications Magazine September 1985. pp. 4146. crypto, keys,

standards.

A.W.

Aresnault,

ANS-82

Financial Institution

Management

Key Words:

ARS-87a

hardware.

"Automated Distribution of Cryptographic Keys Using the

.

guidelines,

trusted, network, criteria.

crypto,

Balenson, D.M.

BAN-82 Banerjee, S.K.

"High-Speed Implementation of DES." Computers &

the

Security .

November 1982,

Key Words: guidelines,

pp.

261-267. crypto,

DES,

hardware.

trusted, network, criteria.

control,

BAR-83

standards.

BAC-89

Barnes, D.

Bacon, M.

ANS-82a

"Assessing Public Network

American National Standard

Security,"

for Financial Institution

Message Authentication X9.9-1982 American Bankers .

Association. Washington.

Telecommunications

December 1989.

.

pp. 19-20.

DC,

Key Words:

April 1982.

requirments,

"The Provision of Security for User Data on Packet Switched Networks," Proc. 1983 IEEE

&

Symp. on Sec. Privacy , IEE-83a), pp. 121-126.

(5:

Key Words: methods, network.

network, general.

Key Words:

BAR-86

control,

BAK-84

standards.

Barrett, P.

Baker, P.C.

ARB-89

"Communications System

Arbo, R.S., E.M. Johnson, and R.L. Sharp "Extending Mandatory Access Controls to a Networked MLS Environment," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS-89). 1989, pp. 286,

Security Evaluation Criteria," Proc. 7th Seminar,

Comp.

DoD DOD-

Sec. Progr. , (5:

84), 1984, pp. 58-71.

Key Words:

Key Words: MLS, network, control.

Key Words: RSA, hardware, al.

"Al Assiu'ance System: Doing

the Job," Proc.

(5:

Arsenault, A.

case.

Baker, P.C, et

9th Natl.

ARS-84

for an Internet

Comp.

Sec. Conf. .

NCS-86). 1986. pp. 130-

Seminar,

DoD Comp.

Progr. . (5:

Key Words:

•The SILS Model

for

LAN

Security," Proc. 12th Natl.

Sec. Conf. , (5:

NCS-

verification,

network, methods, case. Sec.

Key Words: LAN, models, case.

DOD-84), 1984,

policy,

Barker, L.K.

89), 1989, pp. 267-276.

pp. 72-78.

Key Words:

BAR-89

Comp.

137.

"Security Issues Involved in

Networking Personal Computers," Proc. 7th

,

criteria, general.

BAK-85

295.

"Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor," Proc. Crypto '86 Santa Barbara, CA. 1986. (8: ODL-87). pp. 311-323.

PC.

network, requirements.

7-2

BEK-84

BAR-89a

BER-82a

M. Walker

Barrett, P.

Beker, H., and

"The Smart Diskette--A

"Key Management

Universal Cryptoengine,"

Electronic Transfer in Retail

Architecture," Proceedings,

Proc. Crypto '89. Santa

Environment". Proc. Crypto •84 , Santa Barbara, CA. 1984. (8: BLA-84a). pp. 401-410.

IEEE Comcon

Key Words:

methods.

Barbara,

CA,

(8:

BRA-89)

1989. crypto,

techniques.

,

Spring, 1982,

pp. 138-143.

crypto, keys,

crypto,

case.

BER-83

BAR-89b

BEK-85

W.

"Security for Packet-Switched

Berman, A. Security," Data

Communications July 1983,

.

Press,

New

,

York, 1985.

Key Words: book,

Key Words:

"Evaluating On-Line Computer

Beker. H. and F. Piper Secure Speech

Communications Academic

Networks," Telecommunications , September 1989, pp. 47^9.

pp. 145-152.

techniques.

networks,

Key Words: management, nethods.

BEK-87

general.

BON-89

Beker, H.J., and G.M. Cole

BAU-83

"Message Authentication and

Bauer, R.K., T.A. Berson,

Dynamic Passwords,"

and R.J. Feiertag

Eurocrypt '87 Amsterdam, 1987, (8: CHA-88a), pp. 171-

"A Key

Berson,T.A, and R.K. Bauer "Local Network Cryptosystem

Key Words: LAN,

Key Words:

Bartlett,

for Secure

,

Distribution Protocol

Using Event Markers,"

ACM

Trans, on Computer Systems

August 1983, pp. 249-255.

Key Words: crypto, keys, method.

Open System

Networks: A Tutorial Survey," Information Age

,

General Purpose

Key Words: network, methods, authentication.

&

A

Network Interpretation," Proc. 2nd Aerosp. Comp. Sec.

BOS-88 Bosen. R. "Seciu-ing the Micro-

2-4.

Mainframe Link." Proc.

MP/Sec.

Key Words:

trusted,

network,

(2:

'88 , Austraha, 1989.

CAE-89), pp. 351-355.

methods.

Key Words:

networks,

BEL-89

general.

PC.

Conf.. (5: IEE-86a). 1986, pp.

criteria,

Key Words:

,

Key Words: RSA, methods,

(U.K.), July 1988, pp. 131-

145.

Implementations of the

Modular Exponentiation on Microprocessors," Computers Security December 1989, pp. 621-630.

BeU, D.E. "Secure Computer Systems:

Bayle, A.J.

Bong, D., and C. Ruland "Optimized Software

175.

,

BEL-86

BAY-88 "Security in

Proc.

control,

techniques, PC.

Bellovin, C.

BEC-80

TCP/IP

"Security Problems in

ACM

BOY-88

Becker. H.B.

Protocol Suite,"

"Data Network Security: Everyone'a Problem," Data

Computer Communications

Boyd, C. "Some Apphcations of

Rev. . April 1989. pp. 32-48.

Multiple

Key Words:

Eurocrypt '88 Davos, 1988 GUN-89), pp. 455-467.

Communications September 1980, pp. 72-90.

Key

Ciphers," Proc. ,

,

threats, protocols,

(9:

requirements, case.

Key Words:

Key Words: networks, general.

BER-82

case.

Berson, T.A. "Local Network Cryptosystem Architecture: Access Control,"

Proc. Crvpto-82

Barbara,

,

Santa

CA, 1982,

(9:

CHA-

83b). pp. 251-258.

Key Words: LAN. methods.

7-3

crypto,

crypto, methods,

BRA-82

BRA-87b

BRO-84

Branstad, D.K., and

Branstad, D., et

M.E. Smid "Integrity and Security Standards Based on Cryptography," Computers

"SP4: Transport Encapsulation Security

Security ,

November

A

&

1982, pp.

al.

Protocol," Proc. 10th

Comp.

NCS-

Manage

to

Security Joumal

Key Words:

protocols, case.

BUR-87

BRA-87C Branstad, M., et

Brand, S.

"A Status Report on the Development of Network Criteria," Proc. 8th Natl.

Sec. Conf. , (5:

Burger.

al.

A

BRA-85

"SP4: Transport Encapsulation Security protocol," AIAA No. 87-3060,

Comp.

Proc. 3d Aerosp.

Sec.

Conf. (5: IEE-87b), 1987, pp. 143-145.

Computer Sec. Conf.

Key Words:

BRA-85a

BUS-83 Branstad, M., et

Busse, J.G. "Developing a Cryptographic

al.

Bradey, R.L., and

"Key Management and Access

System

Graham

Control for an Electronic Mail System," Proc. 12th Natl.

The

"Full Encryption in a

Comp.

Proc. Eurocrypt '85

89), 1989, pp. 230-231.

Linz,

Sec. Conf. , (5:

for Electronic Mail,"

Office

November

,

1983,

pp. 122-128.

NCS-

Personal Computer System," (8:

network, methods,

protocols, case.

criteria.

BRA-89

,

(5:

,

NCS-87a), 1987, pp. 254-256.

case.

Key Words: network,

W.

"Networking of Secure Xenix Systems," Proc. 10th Nad.

,

BCS-

85), 1985, pp. 145-151.

Key Words:

network.

crypto, methods,

standards.

1985, 240.

Summer

1984, pp. 75-88.

Key Words: management, Key Words:

I.G.

,

Network Computer

the

87a), 1987, pp. 158-161.

255-260.

Comp.

P.S.

"How

Security Problem,"

Nad.

Sec. Conf. , (5:

Browne,

PIC-86), pp. 231-

Key Words:

crypto, methods,

case.

Key Words: EM,

crypto, keys.

CAC-84 Key Words:

crypto, methods,

PC.

BRA-87 Branstad, D.K.

"Considerations for Security in the

OSI

Conf.

,

(5:

Comp.

Sec.

Caccetta, L.

Britton, D.E.

"Vulnerability of

"Formal Verification of a Secure Network with End-to-

Communications Networks," Networks Vol. 14, No. 1,

End Encryption," Proc. 1984 IEEE Symp. on Sec. &

1984, pp. 117-140.

Privacy

Architecture,"

Proc. 10th Natl.

BRI-84

,

(5:

IEE-84), pp. 154-

Key Words:

crypto, network,

vulnerabiUties,

"A Survey of Hardware

"Securing the Distributed Word Processing Network," Security January Computers 1983, pp. 78-81.

Implementations of RSA" Proc. Crypto '89 Santa

Key Words: methods, network.

Key Words: OSI, network, BRI-89

methods.

&

Brickell, E.F.

BRA-87a Branstad, D.K.

"Considerations for Security

OSI

IEEE Network Magazine

,

Barbara,

Architecture," ,

CA,

(8:

,

BRA-90),

1989.

CAP-88 Capel, A.C., C. Laterriere,

April 1987.

Key Words: OSI, network,

CAL-83 Callaghan, D.R.

methods.

methods.

Key Words: network.

166.

NCS-87a), 1987,

pp. 9-14.

in the

,

Key Words: RSA, hardware,

and K.C. Toth

general.

"Protecting the Security of X.25 Communications," Data Communications November ,

1988, pp. 123-139.

Key Words: methods, protocols.

CAR-86

CHI-89a JM., and

Martin "Cryptographic Requirements for Secure Data Communications," Proc.

Carroll,

IFIP/Sec. '86 ,

1986,

(2:

S.

Monte

Carlo,

COH-87a

Chiou, G.-H., and W.-T. Chen "Secure Broadcasting Using

IEEE

the Secure Lock,"

Trans,

on Software Engr.

,

August 1989, pp. 929-934.

GRI-89).

,

Key Words: network,

Key Words:

Cohen, F. "Design and Administration of E)istributed and Hierarchical Information Networks Under Partial Ordering," Computers & Sectirity June 1987, pp. 219-228.

techniques, case.

crypto,

Key Words: network, management, methods,

requirements.

CHR-88

CAR-87

control.

Christoffersson, P.

J^.

"Strategies for Extending the

"Message Authentication and Encryption Combined,"

Useful Lifetime of DES,"

Computers

Carroll

Computers & Security August 1987, pp. 300-313. ,

&

Security ,

February 1988, pp. 65-71.

Key Words:

crypto, control.

Key Words: DES,

COH-87b Cohen, F. "Design and Protection of Information Networks Under a Partial Ordering," Computers & Security August 1987, pp. ,

332-338.

CIM-85

management.

Cimimiera,

CAS-88

L.,

Key Words: network,

and

A. Valenzano

Casey, T.J., and S.R. Wilbur "Privacy Enhanced Electronic Mail," Proc. 4th Aerosp. Comp. Sec. Conf. , (4: lEE-

design,

methods.

"Authentication

Mechanisms

88b), 1988, pp. 16-21.

Microprocessor-Based Local Area Networks," IEEE Trans, on Software Engr., May 1989, pp. 654-958.

Key Words: EM,

Key Words: LAN,

in

COH-87C Cohen,

F.

"A Cryptographic Checksum for Integrity Protection,"

Computers & Security December 1987, pp. 505-510. ,

policy,

methods.

au^entication.

Key Words:

crypto, technique.

CLA-87

CER-83

COH-88

Cerullo, M.J.

Clark, A.J.

"Data Communication

"Physical Protection of

Controls," Computers

Security

,

&

January 1983, pp.

Cryptographic Devices," Proc. Eurocrypt '87 Amsterdam, ,

1987, (8: CHA-88a), pp. 83-

67-72.

Cohen F. 'Two Secure Computers

&

File Servers,"

Security August 1988, pp. 409-414. ,

93

Key Words:

Key Words:

controls, general.

Key Words:

CHE-89

crypto, physical,

hardware, techniques.

COO-89

Chess, D.M.

"Computer Viruses and Related Threats to Computer and Network Integrity," Computer Networks and ISDN Systems July 1989, .

Key Words:

COH-85

Cooper, J.A.

Cohen, F. "A Secure Computer Network Design," Computers & Security September 1985, pp. ,

threats,

network.

Key Words: network,

design.

Chick, G.C., and F.E. Tavares

Cohen,

"Flexible Access Control with Master Keys" Proc. Crypto

of Information Networks with

Santa Barbara, CA, BRA-90), 1989.

Key Words: keys.

Security: Strategies for the

1990s McGraw-Hill, York, 1989 .

New

F.

"Protection and Administration

(8:

crypto, control,

Partial Ordering,"

&

Key Words: book, techniques, methods, general.

CRA-88

COH-87

CHI-89

,

Computer and Communications

189-206.

pp. 141-148.

•89

network, methods,

case.

Security

,

Computers

April 1987, pp.

118-128.

Cramer, R., B. Ridridge, and E. SchallenmuUer "Design and Implementation of a Secure Terminal Gateway," Proc. 4th Aerosp. Comp. Sec. Conf. (5: IEE-88b), 1988, pp. 262-268. .

Key Words: network, management, methods,

Key Words: network,

control.

case.

7-5

design,

DAV-84

CSC-87 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria,

NCSC-TG-005,

Version

1,

Davida,

W.L.

"Passports and Visas Versus IDs," Proc. Eurocrypt '88

Price

Security for

Networks

National Computer

New

,

J.

Computer Wiley & Sons,

book, networks,

,

Davos, 1988

(9:

GUN-89),

pp.

Key Words:

authentication,

crypto, methods.

general. trusted, network,

DAV-89

DAV-84a

criteria, guidelines.

Davio, M., et

DAN-89

"Efficient

Danner, B.P. "Initial Approach for a Secure Communications

TRW

Processor," Proc. 12th Natl.

Comp.

and Y. Desmedt

183-188.

York, 1984.

Key Words:

31 July 1987.

Key Words:

G.I.,

Meade,

Security Center, Ft.

MD,

DAV-88

Davies, D.W., and

Sec. Conf.

,

(5:

Davis, R.

al.

"Network Authentication

Hardware and

Software Implementations for the DES," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: ,

.

BLA-84a), pp. 144-173.

Key Words:

NCSKey Words: DES,

89). 1989. pp. 197-214.

Tokens," Proc. 5th Security AppUcat. Conf. (5: IEE-89c), 1989, pp. 234-238. authentication,

methods.

crypto,

hardware.

Key Words:

DAV-89a

design, policy,

DAV-84b

case, hardware.

Davies,

DAV-80

Davies. D.W.. and

D.W.

"A Message Authentication Algorithm Suitable for a Mainframe Computer," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 393-400.

Privacy (5: IEE-80). pp. 100-102.

Key Words:

G.I.,

Price

.

R.A. DeMillo. and R.J. Lipton "Protecting Shared Cryptographic Keys," Proc. 1980 IEEE Symp. on Sec. & Davida,

W. L

Computer Networks 2nd Edition. J. Wiley & Sons. New York, Security for

1989

,

Key Words: book, network, crypto, techniques, general.

.

DAV-89b

crypto,

Davids. R.

authentication, signatures,

Key Words:

crypto, keys,

DAV-84C

DAV-81 Davies.

D.W. The

^88, Austiaha, 1989, (2:

Davies,

89), pp. 357-365.

Signatures in Banks," Proc. '84 , Toronto, 1984,

Key Words:

D.W. 'The Use of Digital

Security of .

Press.

Los

(2:

Key Words:

Del Re, E., R. Fantacci, and D. Maffucci

crypto,

Key Words: book, network,

authentication, signatures,

general, methods, techniques.

methods.

DAV-83 Davies,

"A New Speech

"Applying the

Davies,

RSA

Digital

Signature to Electronic Mail,"

IEEE Computer February ,

1983, pp. 55-62.

Key Words: RSA. crypto, EM, authentication.

Signal

Scrambling Method for Secure Communications." IEEE Journal on Selected Areas

DAV-85 D.W.

standards, case.

DEL-89

FIN-85), pp. 13-21

CA, 1981.

Angeles,

CAE-

mP/Sec.

Data in Networks IEEE

Computer Society

Security

Standards," Proc. IHP/Sec.

methods, management.

Tutorial:

EFTPOS

"Australian

methods.

Communication

D.W.

"Engineering Secure Infromation Systems," Proc.

Eurocrvpt '85 . Linz, 1985, PIC-86). pp. 191-199.

Key Words:

(9:

design, methods.

methods.

.

May

1989.

pp. 474-480.

Key Words: methods, techniques.

DEN-80 Denning, D.E., and F.B. Schneider "The Master Key Problem," Proc. 1980

IEEE Symp. on

Security

Privacy ,

&

(5:

IEE-

80), pp. 103-107.

Key Words: crypto, keys, management.

7-6

DON-84

DEN-83 Denning, D.E. Signanires,"

,

February 1983, pp. 27-35.

"A

Multilevel Secure Local

Area Network," Proc. 7th Seminar,

DoD Comp.

Progr. . (5:

Key Words:

EST-87

Donaldson, A.

Keys and IEEE Computer

"Protecting Public

Sec

.

DOD-84), 1984,

and G. Tsudik

"Visa Scheme for InterOrganization Network Security," Proc. 1987

Symp. on Sec.

pp. 341-350.

crypto, keys,

Estrin, D.,

methods.

&

IEEE

Privacy ,

(5:

IEE-87a), pp. 174-183.

Key Words: MLS. LAN, DES-83 Desmedt, Y., J. P. Vandewalle, and R.J.M.

case.

DON-88

Govaerts,

"Does Public-Key Cryptography Provide a Practical and Secure Protection of Data Storage and Transmission?," Proc, Intemat. Camahan Conf. on Sec. Technology 1983, pp. ,

133-139.

Donaldson, A.L., J. McHugh, and KA. Nyberg "Covert Channels in Trusted

Key Words:

threats, crypto,

Flow,"

Key Words:

Communication

LAN,

DUF-86

'85, Linz, Austria, 1985, PIC-86). pp. 108-127.

Datagram on

Journal,

,

May

1989.

Key Words: network, Lock MP/Sec.

Key Words:

Transmission Control Protocol," Proc. Eurocrypt

IEEE

pp. 486-498.

SulUvan

J.

Prototype," '86 Monte ,

protocols, control, methods.

FAI-84 A. Matusevich, and J.Plany "An LSI Digital Encryption Processor (DEP)," Proc. Crypto •84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 115-143.

Carlo, 1986, (2: GRI-89).

DoD

"Visa Protocols for Controlling

Selected Areas trusted,

"Integrity

"Security for the

Mogul, and

88), 1988, pp. 226-232.

Proc.

W.

Estrin, D., J.

G. Tsudik Interorganizational

,

Duffy, K.J., and

DIF-85

EST-89

LANs," Proc. 11th Natl. Comp. Sec.Conf. (5: NCS-

threats.

methods.

Diffie.

Key Words: network, methods,

deasign, case.

Fairfield, R.C.,

techniques,

design, case.

(9:

,

EGG-88 Eggers, K.W., and

Key Words:

Key Words: network,

P.W. Mallett

protocols, case.

"Characterizing

DOD-85 Proceedings,

DoD

Computer

Security Center Invitational

Network

Covert Storage Channels," Proc. 4th Aerosp. Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 275-279. .

,

Ft.

Meade,

MD,

Key Words: network,

March 1985.

Key Words:

threat,

"How

to

Choose Good

Proc. IFIP/Sec. '86

Key Words:

ERD-86

proceedings,

,

Monte

crypto, guidelines.

Erdem, H.

DOL-82

"Host Cryptographic A Software Implementation," Computers Operations:

Dolev, D., and A. Wigderson "On the Security of Multi-

&

Security

December 1986,

,

Party Protocols in Distributed

pp. 344-346.

Systems," Proc. Crvpto-82 Sanu Barbara, CA, 1982, CHA-83b), pp. 167-175.

Key Words:

distributed,

FAK-87 Fak, V.

"Crypto Management Made Manageable: Demands on Crypto Equipment Design," Computers & Security February 1987, pp. 36-40. ,

,

(9:

crypto, design.

Key Words:

EST-85 protocols.

Fak, V.

Carlo, 1986, (2: GRI-89).

models.

network.

Key Words:

FAK-86

Cryptographic Protection,"

Workshop on Network Security

crypto, hardware,

case.

Estrin,

D.

"Non-Discretionary Controls for Inter-Organization

Networks," Proc. 1985 IEEE Symp. on Sec. & Privacy (5: IEE-85), pp. 56-61 ,

Key Words:

networks, control,

methods.

7-7

crypto, design.

FAM-83

GAI-80

FIC-84

Fam, B.W.. and J.K. MiUen "The Channel Asssignment Problem," Proc. 1983 IEEE Symp. on Sec. & Privacy (5: ,

EE-83a), pp. 107-112.

Fick, G.P.

Gait,

"Implementation Issues for Master Key Distribution and

Maintenance Testing for the Data Encryption Standard SP 500-61, National Bureau of

Protected Keyload

Procedures," Proc. IFIP/Sec.

FIN-

•84, Toronto, 1984. (2:

Key Words: model, methods.

,

Key Words:

Faurer, L.

Key Words: DES, management.

crypto, keys,

design.

"Security Issues in

Open

GAL-87

System Context," Computer Security Joumal. Vol. 4, No.

FID-85

1986, pp. 55-62.

Galil, Z., S. Haber,

Key Words: OSI,

M. Yimg

"A Comprehensive Approach Network Security," Data

"Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model," Proc. Crypto '87 Santa

Communication April 1985.

design,

,

methods.

pp. 195-213.

,

Barbara,

Key Words:

FEL-89 Feldmeier, D.C, and

CA,

1987, (8: 88), pp. 135-155.

networks,

POM-

general.

Kam

Key Words:

"Cracking Passwords for Fun and Profit," Proc. Crypto '89 Santa Barbara, CA, (8: BRA-

,

90), 1989.

Fisher,

W.W.

GAS-82

"Cryptography for Computer

Making

the

Decision," Computers threats, control.

crypto, protocols.

ns-84

Security:

Key Words:

and

Fidlow, D. to

P.R.

MD,

Standards, Gaithersburg,

August 1980.

85), pp. 571-580.

FAU-86

1,

J.

Security

,

Gasser, M., and D.P. Sindhu

"A

&

October 1984, pp.

229-233.

Multilevel Secure Local

Area Network," Proc. 1982 IEEE Symp. on Sec. & Privacy , (5: EEE-82), pp. 137-

FEN-85

143.

Key Words:

Fenna, E. "Data Encryption Protocols for Electronic Mail,"

Key Words: EM,

Key Words: MLS, LAN.

ACM

Sec., Audit & Control Rev. Winter 1985, pp. 43-47.

crypto, design.

FIT-80 .

crypto,

design.

Fitzgerald,

J.

GIR-87

"Data Communications Conliol Matrix," Assets Protection

,

Girling,

Sept./Oct. 1980,

pp.24-31.

protocols.

C.G.

"Covert Channels in LANs," IEEE Trans, on Software Engr. February 1987. pp. 292,

Key Words:

FER-87 Fernandez,

C,

control, methods.

et al.

"Automating the Computation of Authenticators for Interbank Telex Messages," Computers & Security October 1987, pp. 396-402. ,

Key Words: LAN,

FIT-89

'The Quest for Intruder-Proof Computer Systems," IEEE Spectrum August 1989, pp. ,

GOY-88 Goyal, P.K., and E.B. Fernandez "Encryption Using Random Keys: Scheme for Secure

A

authentication,

Key Words:

case.

threats,

methods.

Communication," Proc. 4th

Comp. Sec. Conf. (4: IEE-88b), 1988, pp. 410^12. Aerosp.

FRI-88

FIA-89 A. "Batch RSA," Proc. Crypto '89 , Santa Barbara, CA, (8:

Increase Telecommunications

BRA-90), 1989.

Security," Information

Fiat,

Friedberg, A.H., et

Key Words: RSA,

AprU 1988,

Key Words:

physical,

7-8

Age

,

pp. 73-78.

design,

methods.

,

al.

"Reliance on Optical Fibres to

(U.K.) case.

threats.

Fitzgerald, K.

22-26.

Key Words:

296.

Key Words:

crypto, techniques.

GSA-82

GRA-87 "DES Key Crunching Safer Cipher Keys,"

for

ACM

Audit & Control Rev. . Spring 1987, pp. 9-16.

Sec..

Key Words: DES.

GUI-88

Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard. Federal Standard 1027, U.S. General Services Administation Washington, DC, April 1982.

Grant, L.

keys,

Guinier, D.

"DSPP:

A

Data Security Pipe

Protocol for PCs, Large Scale

&

Fall 1988, pp. 4-9.

Key Words: PC,

techniques.

Key Words: DES,

GRA-88

ACM

Systems, or Networks," Control Rev. , Sec., Audit

network,

protocol.

crypto,

standards.

Graham, I., and S. Wieten "The PC as a Secure Network Woricstation," Proc.

GUI-88a

GSA-83

Guinier, D.

Teleconununications:

MP/Sec.

'88 . Australia,

Interoperability and Security

1989. 437.

CAE-89). pp. 425-

Key Words: PC. methods,

Requirements for Use of the Data Encryption Standard in the Physical and Data Link Layers of Data

case.

Commimication Federal

(2:

"SPKS: Sharing Partial Key Sec., Audit & System," Control Rev. Fall 1988, pp.

ACM ,

10-13.

Key Words:

crypto, key, case.

,

Greenlee, M.B.

Standard 1026, U.S. General Services Administration Washington, DC, January

"Requirements for Key

1983.

GRE-85

Management Industry,"

Key Words: DES,

IEEE

Scheme

Key

for a

Large Network," Proc. 1989 IEEE Symp. on Sec.& Privacy

crypto,

standards.

Communications Magazine September 1985, pp. 22-28.

L. and T. Keisler

"Authenticated Group Distribution

Protocols in the

Wholesale Financial Services

HAR-89 Ham,

(5:

IEE-89b), pp. 300-309.

,

Key Words:

GSA-85 Interoperability and Security

Key Words:

Requirements for Using the Data Encryption Standard with

requirements,

management,

crypto, keys,

CCi

Group 3 Facsimile Equipment Federal Standard

case.

l

1

.

GRI-89 Grimm,P. "Security

We

on Networks: Do

Need

It?,"

October 1989, pp. 315.

Key Words:

requirements,

,

DC, April

Multilevel Data Security,"

1985.

Key Words: DES,

Proc. 5th Security Applicat. Conf. (4: IEE-89c), 1989, pp. 254-262.

crypto,

,

standards.

Key Words:

GUI-82 GuUlou, L.C.. and B. Lorig "Cryptography and Teleinformatics," Computers

networks.

GRO-82

Chien, and

T. Keisler

"An Extended Cryptographic Key Generation Scheme for

Comp.

Networks and ISDN Systems

HAR-89a Ham, L., Y.

Administration Washington,

1027, U.S. General Services

Really

crypto, keys,

methods.

crypto, keys,

methods.

HAS-85

Grossman, G.

&

"A

27-33.

"On Using

Key Words:

Exponent in a Public Key Network," Proc. Crypto '85

Practical Executive for

Security

January 1982, pp.

,

Secure Communications," Proc. 1982

&

IEEE Symp. on

Privacy pp. 144-155. Sec.

,

(5:

crypto, general.

GUI-86

case.

networks,

J.

RSA

with

Low

Santa Barbara, CA, 1985, WIL-86), pp. 403-408.

IEE-82). Guillou, L.C.

Key Words: OS,

Hastad,

"Smart Card

- A

Key Words: RSA,

Highly

Reliable and Portable Security Device," Proc. Crypto '86 ,

Santa Barbara, CA, 1986. ODL-87). pp. 464-487.

Key Words:

authenication.

7-9

(8:

design.

crypto,

,

(8:

.

HOO-84

HER-85

JAC-89

Herzberger, A., and

Hoomaert,

S.S. Pinter

"Efficient

"Public Protection of Software," Proc. Crypto '85

.

Santa Barbara, CA, 1985, (8: WIL-86), pp. 159-179.

Key Words:

crypto, methods,

F., et al.

Implementation of the DES," Proc. Crypto '84 Santa .

Barbara,

CA, 1984,

BLA-

(8:

84a), pp. 147-173.

Key Words: DES,

crypto,

Herlihy, M.P., and J.D. Tygar

Make

Replicated

Data Secure," Proc. Crypto '87 Santa Barbara, CA, 1987, (9: POM-88), pp. 379,

Hoomaert, F., et al. "Fast RSA-Hardware: Dream or Reality," Proc. Eurocrypt

GUN-

'88 , Davos, 1988, (8: 89), pp. 455-467.

Key Words:

Key Words: RSA, Key Words:

crypto, methods.

on an

Confidentiality, and Integrity

Conf., (5: NCS-88), 1988,

Extensions to the Protocol Suite,"

Audit

Key Words: LAN, methods,

a Local Area

Network

Operations," Proc. IFIP/Sec.

CAE-

auditing,

JAM-89

Comp.

pp. 219-225.

Security, Control and Audit of

Key Words: LAN,

"Authentication,

Sec.

for the

case.

Ethernet,"

Proc. 11th Natl.

"A Framework

crypto,

hardware.

Housley, R.

Herbison, B.J.

Low

Jamieson, R., and G.

89), pp. 439-469.

HOU-89

HER-88

crypto, methods.

^88, AustraUa, 1989, (2:

391.

"Security

Annual AFCEA Intelligence Symposium. September 1987.

JAM-88

HOO-88

HER-87 to

Suj^rt Using Embedded Cryptography," Proc., 2nd

hardware.

software.

"How

J. and T. Kibalo "Secure Data Network System

Jacobs,

Hardware

XNS

ACM

&

Sec.,

Control Rev.. Fall 1989. pp. 17-24.

&

Computers

Security

authentication,

.

June

1989. pp. 305-316.

Key Words: LAN,

case.

Key Words:

Jamieson, R., and G. Low "Security and Control Issues in Local Area Network Design,"

design,

control.

case, methods, protocols.

fflG-88

JAN-86

Highland, H.J.

"How

Secure Are Fiber Optics Communications,"

HUM-80

Jansen,

C.JA.

Humprey, T., and F.L. Toth 'Two-Chip Data Encryption

"On

February 1988, pp. 25-26.

Unit Supports Multi-Key

Termiiuils,"

Security

Key Words:

Systems," Electronics January 17, 1980, pp. 136-139.

Key Words:

Key Words: PC,

Computers

&

Security ,

,

threats,

Key Storage

the

Requirements for Secure ,

Computers

&

June 1986, pp. 145-

149.

hardware, techniques. crypto, hardware.

crypto, keys.

HIG-88a Highland, H.J. "Secret Disk

II



ING-83 Transparent

Automatic Encryption," Computers & Security ,

February 1988, pp. 27-34.

Key Words: PC,

crypto,

methods.

JAY-82

Ingemarsson,

Jay ant, N.S.

I.

"A Comparison Between Public-Key and Conventional Encryption Methods," Proc. IFIP/Sec. '83. Stockholm, 1983, (2: FAK-83). pp. 229-

"Analog Scramblers for Speech Privacy," Computers & Security ,

November 1982,

pp.

275-289.

Key Words: methods,

232.

hardware.

Key Words:

HIN-83 Hinke, T., J. Althouse, and R.A. Kemmerer "SDC Secure Release Terminal Project," Proc. 1983

IEEE Symp. on

Sec.

&

Privacy (5: IEE-83a), pp. 113-119. .

crypto,

JEN-87

techniques.

M.D. Abrams "On Network Covert Channel

Jeng, A.B., and

ING-84 Ingemarsson,

Analysis,"

I.

No. 87-3081,

Comp.

Proc. 3d Aerosp.

Protection," Information

Conf. (5: IEE-87b), 1987, pp. 95-103.

Resource Management (UK), ,

March

Sec.

.

1984, pp. 29-32.

Key Words: hardware, design, case.

ADA

"Encryption for Data

Key Words:

Key Words:

crypto, general.

7-10

threats,

network.

Johnson, H.L., and J.D.

"A to

Mission-Critical

Network

Approach

Sec. Conf.

"Implementing the RSA Cryptosystem." Computers

&

Security . August 1987. pp.

Security," Proc.

Comp.

Kemmerer, R.A.

Jung. A.

Layne

10th Natl. (5:

KEM-87a

JUN-87

JOH-87

,

Verification Techniques," Proc. Crypto '87 Santa Barbara,

342-350.

.

NCS-87a), 1987. pp. 15-

CA. 1987.

Key Words: RSA.

24.

"Analyzing Encryption Protocols Using Formal

(9:

POM-88). pp.

289-305.

crypto,

methods.

Key Words:

KAK-83

network.

JOH-87a Johnson, RJ. in

EFT-

Kak. S.C. "Data Security in Computer Networks." IEEE Computer February 1983. pp. 8-10.

&

Security

.

June

Key Words: network,

general.

1987. pp. 245-251. crypto, keys,

"Analyzing Encryption Verification Techniques."

IEEE

Communication

PA.

Karger.

May

.

1989,

pp. 448-457.

"Authentication and Access

case.

Control in Computer

JON-84 Jones,

Kemmerer. R.A.

Journal on Selected Areas

KAR-86 Key Words:

KEM-89 Protocols Using Formal

Security Systems,"

Computers

verification,

crypto, protocols, techniques.

.

"Key Updating Flags

POS

Key Words:

requirements,

Networks." Computers

R.W.

Security

"User Functions for the Generation and Distribution of Encipherment Keys," Proc. Eurocrypt '84 . Paris. 1984. (8: BET-85). pp. 317-334.

.

Key Words:

&

December 1986.

pp.

KEN-81

314-324.

Kent, S.T.

Key Words: network,

control.

crypto, keys,

methods.

KAR-88

Scenario."

IEEE

Trans, on

Conununications June 1981. pp. 778-786. .

and L.D. Nelson "The Secure Data Network." AT&T Technical Journal .

JON-89

"Security Requirements and

Protocols for Broadcast

Karp. B.C.. L.C. Baker,

Key Words:

verification,

crypto, protocols, techniques.

May/June 1988.

Key Words:

requirements,

network, protocols.

Jonckheer. K.. and

Key Words: network,

M. Scarbrough of Data Transmitted Via Telephone, Fibre Optics, and Microwaves." Information Age (U.K.). March 1989. pp. 99-105.

general.

.

KAT-88

physical,

"Comments on Security Problems in the TCP/IP

M.A.

Katzer.

"Secured Communications for Workstations." Proc. 11th

PC

Natl.

Key Words:

KEN-89 Kent, S.T.

"Sectjrity

Comp.

Sec. Conf. . (5:

Protocol Suite."

ACM

Computer Communications Review July 1989. pp. 10-19. .

NCS-88). 1988. pp. 233-237.

Key Words:

techniques.

threats, protocols.

Key Words: PC. methods, JUE-85

.

pp. 29-40.

Key Words: methods.

KHA-89

design.

Jueneman. R.R.. C.H. Meyer, and S.M. Matyas "Message Authentication." IEEE Communications Magazine September 1985,

KEM-87 Kemmerer. R.A. "Using Formal Verification Techniques To Analyze Encryption Protocols" Proc. 1987 IEEE Svmp. Sec. Privacy (5:IEE-87a). pp. 134-

&

authentication,

.

verification,

crypto, protocols, techniques.

7-11

on Selected Areas

May

Comm.

J.

,

1989, pp. 4590-594.

.

139.

Key Words:

Khashnabish. B. "A Bound of Deception Capability in Multiuser Computer Networks," IEEE

Key Words:

threats,

network.

KOC-85

KIL-88

KRU-89

88), 1988. pp. 201-211.

Kochanski, M. "Developing an RSA Chip," Proc. Crypto '85 Santa Barbara, CA, 1985. (8: WIL86). pp. 350-357.

Key Words: network,

Key Words: RSA,

standards.

hardware.

Kilpatrick, K.E.

"Standards for Network Security," Proc.

Comp.

Uth

Sec. Conf.

.

Natl.

(5:

NCS-

.

Kruys.

J.P.

"Security in

Computers

Open Systems,"

&

Security . April

1989. pp. 139-147.

Key Words: OSI. network, crypto,

general.

LAM-88 KOC-87

KIN-89 King, G.

"A Survey of Commercially Available Secure

LAN

Products," Proc. 5th Security

Lambert, P.A.

Kochanski. M.. "A Survey of Data Insecurity Packages." Cryptologia January 1987, pp. 1-15. ,

Applicat. Conf.. (5: IEE-89c),

1989, pp. 239-247.

Key Words:

the

Protocol." Proc. 11th Natl.

Comp.

Sec. Conf. . (5:

NCS-

crypto, software,

Key Words:

Key Words: LAN. hardware,

crypto, protocol,

keys.

KOC-88

software.

Kochanski,

KNA-88 S.J.



LEM-86

M.

"Another Data Insecurity Package," Cryptologia July 1988, pp. 165-173. ,

"Privacy Protected

Payments

Model of

88). 1988. pp. 126-128.

case.

Knapskog.

"Architectural

SDNS Key Management

Realization of a

Protocol that Guarantees

Key Words:

Payer Anonymity," Proc. Eurocrypt '88 Davos, 1988 (8: GUN-89). pp. 107-122.

case.

crypto, software,

Lemire, J.R.

"A New Key Management Approach for Open Communication Environments," Proc. IFIP/Sec. '86

,

Monte

Carlo, 1986, (2: GRI-89).

.

Key Words:

protocols, case.

KNO-88

KOH-89 Kohl. J.T. "Cryptographic Protocols in Cerberus," Proc. Crypto '89 ,

Santa Barbara, CA,

Knobloch, H.-J. "A Smart Card Implementation of the FiatShamir Identification Scheme," Proc. Eurocrypt '88, Davos, 1988 (8: GUN-

(8:

BRA-

Key Words:

crypto, protocols,

,

1984, 26-28.

KRA-84 Key Words:

Key Words:

Organization," Computers Security

,

&

October 1984. pp.

234-236.

Knowles, T. "Security,

OSI and

Distributed Systems,"

Information

Age

Key Words: OSI, network, methods.

Key Words:

crypto, standards,

control, network.

LIN-83 Linden, C.

"The Transaction-Seal ~ The Comer-Stone in Secured Terminal Systems," Proc.

New

IFIP/Sec. '83 , Stockholm.

1983.

case.

(2:

FAK-83), pp. 223-

227.

(U.K.),

April 1988, pp. 79-84.

Information Resource

Management (UK), March

case.

"Data Encryption in ISO, the International Standards

KNO-88a

Le Roux, Y.

Computer Networks,"

Krauss, L.

authentication,

LER-84 "Controlling Access to

90), 1989.

89), pp. 87-95.

case.

Key Words: crypto, keys, management.

KRI-85 Krivachy, T. "The Ciphercard

Key Words:



an Identification Card with Cryptographic Protection," Proc. Eurocrypt '85 Linz, 1985, (8: PIC-86), pp. 200,

207.

authenticatiorL

LIN-87 Linn,

J.

"SDNS

Products in the Type Environment," Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 162-164.

n

,

Key Words:

crypto, control,

Key Words: network,

case.

techniques.

7-12

MAC-84

LON-86

LIN-88 Linn,

Longley. D.. and S. Rigby "Use of Expert Systems in the Analysis of Key Management

J.

"COMSEC

Integration

Alternatives," Proc. 11th Natl.

Comp.

Sec. Conf. , (5:

NCS-88), 1988, pp. 122-125.

MacEwen, G.H.,

et al.

"Multi-Level Secudty Based on Physical Distribution" Proc.

&

Systems." Proc. IFIP/Sec. '86 ,

1984 IEEE Symp. Sec.

Monte

Privacy (5:IEE-84). pp. 167-

Carlo, 1986. (2:

GRI-

.

179.

89).

Key Words: methods, Key Words:

techniques.

crypto, keys,

methods.

Key Words: MLS,

physical,

methods.

LIN-89 Linn,

DARPA-Intemet

Mail." Proc. 12th Natl.

Comp.

Sec. Conf.

.

(5:

MAR-89

LON-87

and S.T. Kent

J.

"Privacy for

NCS-

Marino,

"Expert Systems Applied to

"An INFOSEC

the Analysis of

&

Computers

Key Words: EM.

Key

network,

Security.

Key Words:

Marella, A.,

Loscocco, P.

Analysis." Proc. 4th Aerosp.

"A Dynamic Network Labeling Scheme for a MLS LAN," Proc. 12th Natl. Comp.

Comp.

Sec. Conf. . (5: NCS-89).

.

(5:

lEE-

Jr.

'Telecommunications: A Control Strategy," EDPACS

LOS-89

Message Switch with Minimal TCB: Architectural Outline and Security Sec. Conf.

hardware, case.

MAR-89a

al.

Multilevel Secure

Sec.

crypto, keys,

methods.

Lipper. E.H.. et

Comp.

Conf. (5: NCS-89). 1989. pp. 571-578.

February 1987, pp. 54-67.

Key Words: LIP-88

Platform,"

.

methods.

"A

J.

Proc. 12th Natl.

Mangement Schemes,"

89). 1989. pp. 215-229.

and P. Lambert

Longley, D.

May

.

1989. pp. 1-5.

Key Words:

control, methods.

MAS-84

88b), 1988, pp. 242-249.

1989. pp. 277-285.

Key Words: MLS, methods,

Key Words: MLS. LAN.

design.

methods.

Masrani, R.. and T.P. Keenan "Security and Privacy in Cellular Telephone System." Proc. IFIP/Sec. '84 Toronto. .

LUB-89

LOC-87 Loscocco.

P.

"A Security Model and PoUcy for a MLS LAN." Proc. 10th Nad. Comp. Sec. Conf.

.

(5:

NCS-87a). 1987.

Luby. M.. and C. Rackoff "A Study of Password Security," Journal of Cryptology Vol. 1. No. 3, 1989, pp. 151-158.

Key Words:

control, methods.

Key Words: MLS. LAN.

LOM-89 Lomas. T.. et al. "Reducing Risks from Poorly Chosen Keys." ACM Operating System Review Vol. 23. No. 5. 1989. pp. 14.

18.

Key Words: methods,

case.

MAS-86 Massey, J.L. "Cryptography-A Selective

Communications January .

MacMillan. D. "Single Chip Encrypts Data at 14 MB/S." Electronics June .

16, 1981, pp. 161-166.

Key Words: DES,

methods,

hardware.

MAC-83

LON-83

"New Key

and S.G. Akl

Generation

Symp. Sec.

Longo, G. (Ed.) Secure Digital Systems Springer- Verlag, Wien, 1983.

Key Words:

&

Privacy

Matsumoto, the

to the

general,

methods.

7-13

A

and H. Imai

Predistribution

Practical Solution

Key

Distribution

Problem," Proc. Crypto '87 , Santa Barbara, CA, 1987, (8: POM-88), pp. 185-193.

Key Words: methods.

,

Key Words: MLS,

T.,

Key

.

(5:IEE-83a). pp. 72-78.

keys.

crypto, general.

MAT-87 System:

S.,

Algorithms for Multilevel Security," Proc. 1983 IEEE

keys.

1986. pp. 3-21.

"On MacKinnon,

Key Words: book,

FIN-85). pp. 457-

Survey," EHgital

MAC-81

models.

threats,

(2:

,

pp. 25-37.

Key Words:

1984. 470.

crypto,

crypto, keys,

MAT-87a

MER-81

Madas, Y., and A. Shamir "A Video Scrambling Technique Based On Space FilUng Curves," Proc. Crypto '87

.

Santa Barbara, CA,

1987, 417.

(8:

POM-88),

pp. 398-

MIL-84

Merkle, R.C., and

M.E. Hellman

MiUen, J.K. "The Interrogator

"On

Cryptographic Protocol

the Security of Multiple

Encryption," Communications

Security," Proc. 1984

of the 465-467.

Symp. Sec.

ACM

IEEE

Privacy

.

(5:IEE-

84). pp. 134-141.

crypto, methods.

MER-82

Key Words:

crypto, protocols.

MIL-87

Merritt,

MAY-89

M.

"Key Reconstruction,"

Proc.

Crypto-82, Santa Barbara,

F. et al.

"Evaluation Issues for an Integrated

&

Tool for

techniques,

physical.

Mayer,

July 1981, pp.

.

Key Words: Key Words:

A

'INFOSEC

1982, 375.

CA,

CHA-83b), pp. 321-

(8:

IEE-89c),

(4:

.

1989, pp. 271-275. case.

MCC-89 McCullough. D. "Security Analysis of a

Token Ring Using Ulysses," Proc. COMPASS '89: Comp.

IEEE

February 1987, pp. 274-288.

Key Words:

crypto, keys,

Key Words:

methods.

Key Words: methods,

Security Analysis,"

Trans, of Software Engr. ,

Product," Proc. 5th Security Applicat. Conf.

MiUen, J.K., S.C. Clark, and S.B. Freedman "The Interrogator Protocol

MEY-81

protocol, design.

MIL-87a

Meyer, C.H., S.M. Matyas, and R.E. Lennon "Required Cryptogr^hic

MiUen, J.K.

Authentication Criteria for Electronic Fxmds Transfer

Comp.

Systems," Proc. 1981 IEEE Symp. on Sec. & Privacy , (5:

Assurance, (2: IEE-89), 1989, pp. 113-118.

IEE-81), pp. 89-98.

Key Words: LAN,

Key Words:

"Interconnection of Accredited

Systems," Proc. 3d Aerosp. Sec. Conf. , (5:IEE-87b),

1987, pp. 60-65.

Key Words: network,

design.

MIL-88 threat,

methods.

MiUen, J.K., and Schwartz "The Cascading Problem for

crypto,

M.W.

athentication.

MEA-89

Interconnected Networks."

MIG-89

Meadows, C. "Using Narrowing in the Analysis of Key Management Protocols," Proc.

Symp. Sec.

&

1989 IEEE

Privacy ,

Migues, S., and R. Housely "Designin a Trusted ClientServer Distributed Network," Proc. 5th Sec. AppHcat. Conf., IEE-89C), 1989, pp. 91-94.

(5:

(5:IEE-89b), pp. 138-147.

Key Words: Key Words:

trusted,

network.

MIL-81

protocols, keys.

Miller. J.S., and

MEN-83

R.G. Resnick

Message Systems:

Menkus, B. "Long-Haul Data Security:

Applying a Security Model."

Whose

Proc. 1981

It

"Military

Today?," Data

&

Communications March 1983, pp. 137+

101-111.

.

Privacy

.

IEEE Symp.

Sec.

.

Key Words: network,

design.

MIT-87

C, and F. Piper "The Cost of Reducing KeyStorage Requirements in Secure Networks," Computers & Security August 1987. pp. .

339-341.

Sec.

(5:IEE-81), pp.

Key Words:

crypto, keys,

network.

Key Words: EM, Key Words: network,

Comp.

Conf. (4: IEE-88b). 1988. pp. 269-274.

Mitchell,

crypto,

Responsibility Is

Proc. 4th Aerosp.

models,

MIT-88

C, and M. Walker

Mitchell,

methods.

"Solutions to the

management.

Multidestinational Secure Electronic

Computers

MaU

&

Problem,"

Security

.

October

1988. pp. 483-488.

Key Words: EM. methods.

7-14

design,

MUE-82

MIT-89

C, D. Rush,

MUR-87

55-58.

MueUer-Schloer, C, and N.R. Wagner "Cryptogrqjhic Protection of Personal Data Cards," Proc. Crypto-82 Santa Barbara, CA. 1982, (8: CHA-83b), pp. 219229.

Key Words: EM,

Key Words:

Mitchell,

M. Walker "A Remark on Hash and

Functions for Message Authentication," Computers

Security

,

&

February 1989, pp.

.

White

and D. Rush

Mechanisms for Computer Networks ElUsHorwood, Chichester, U.K.,

Key Words:

network, methods

guidelines.

K.,

and K. Suzuki

Application Layer," IEEE Journal on Selected Areas

Secure Message Handling," J. on Selected Areas Comm. May 1989, pp. 517-

Key Words: book, network,

524.

methods.

Communication

1988.

IEEE

.

1987.

Communications Service Element (SCSE) in the OSI

S., et al.

Security

,

standards for

NY,

"Proposal on a Secure

Muftic,

C, M. Walker,

Corporation,

Plains,

Nakao,

MIT-89a

IBM

9279-2.

NAK-89

crypto, methods.

MUF-88

"CCnr/ISO

Security Practices for

Information Networks G320-

.

authenticatioiL

Mitchell,

Good

May

.

1989,

pp. 505-516.

Key Words: OSI, network, methods.

Key Words: EM,

standards,

MUF-89 NBS-80

Muftic, S.

case.

Mechanisms for Computer Networks J. Wiley Security

MOO-88

&

Moore, J.H.

,

Guidelines on the User Authentication for Computer

Network Access Control FIPS PUB 83. National Bureau of

Sons, Somerset, NJ, 1989.

,

"Protocol Failures in Crypto-

systems," Proceedings of the

Key Words: book, network,

Standards, Gaithersburg,

IEEE May

methods.

September 1980.

1988, pp. 594-

,

MD.

602.

MUF-89a Key Words:

Key Words:

"Extended OSI Security

protocols.

Computer Networks and ISDN Systems September 1989. pp. 223-227. Architecture."

MOO-88a

.

Moore, A. "Investigating

Formal

Specification and Verification for

COMSEC

Software

Key Words: OSI, network,

Sec. Conf. , (5:

NCS-

81, National

of Standards, Gaithersburg, September 1980.

MD,

NBS-81

Key Words:

"A Microprocessor-Based Cryptoprocessor," IEEE Micro October 1983. pp. 5,

15.

MOU-83

Guidelines for Implementing

and Using the NBS Data Encryption Standard, FIPSPUB 74, National Bureau of Standards, Gaithersburg,

Moulton, R.T.

Key Words: PC.

'T^etwork Security,"

hardware.

Datamation July 1983. pp. ,

121+

Key Words:

network, general.

,

Bureau

Key Words: DES, methods. Muller-Scloer. C.

software.

HPS PUB

MUL-83

88), 1988. pp. 129-138. verification,

NBS-80a DES Modes of Operation

methods.

Security," Proc. 11th Natl.

Comp.

guidelines,

network.

Muftic. S.

crypto,

Key Words: DES.

MUN-87

Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria,

Security Architecture,"

MILCOM

'87 ,

case.

NCSC-TG-005,

MD.

July 1987.

design,

Key Words:

trusted,

criteria, guidelines.

7-15

Computer Meade.

Natl.

Security Center, Ft.

October 1987.

Key Words: network,

guidelines.

NCS-87

Mundy, G.R.. and R.W. Shirey "Defense Data Network Proceedings.

MD.

April 1981.

crypto,

network,

NYE-82

NES-89

NEL-87

Nesset,

Nelson, R. "SDNS Services and Architecture," Proc. 10th Natl.

Comp.

Sec. Conf.

,

(5:

D.M.

"Layering Central Authentication on Existing Distributed System Terminal

NCS-87a). 1987, pp. 153-

Services," Proc. 1989

157.

Symp. Sec.

&

IEEE

Assets Protection Jan./Feb. 1982, pp. 21-24. ,

Privacy ,

Key Words:

(5:IEE-89b), pp. 290-299.

Key Words: network,

crypto, hardware,

case.

Key Words:

methods, case.

authentication,

NYE-82a

design.

NEL-89

Nye, J.M.

Nelson, R. "SDNS Architecture and End-

to-End Encryption," Proc. Crypto '89 Santa Barbara, ,

CA,

Nye, J.M. "The CryptogrE^hic Equipment Market Trends and Issues,"

(8:

BRA-90), 1989.

NES-89a Nesset,

"Satellite

D.M.

"Issues in Secure Distributed

May

Operating System Design," Digest of Papers, IEEE Compcon '89 1989, pp. 342-

case.

,

Key Words:

crypto, network.

Communications and Computerworld

Vulnerability," 3,

.

1982, pp. ID7-ID13.

Key Words:

vulnerabilities,

347.

NYE-83 Key Words: OS, methods,

NES-83 Nesset,

D.M.

design.

"A Systematic Methodology for

Analyzing Security

NEW-86

.

Threats to Interprocessor

Newman,

Communications

R.L. Pickholtz

in a

Distributed System,"

IEEE

D.B., and

"Cryptography in the Private

IEEE

Key Words:

Trans, on Communications ,

Sector,"

September 1983.

Communications Magzine August 1986, pp. 7-10.

Key Words:

threats,

OBE-83 Oberman. M.R.

Key Words: Nestman, C.H., J. Windsor, and M.C. Hinson 'Tutorial on Telecommunications and Security," Computers & Security October 1984, pp. ,

vulnerabilities.

,

network.

NES-84

Nye. J.M. "Network Security and Vulnerability." Proc. 1983 Nad. Computer Conf. AFIPS Press. Reston VA. May 1983, pp. 647-653.

crypto, general.

NEW-87 Newman,

D.B.,

IFIP/Sec. '83

J.K.

Jr.,

"Some Security Aspects of a Computer Communications Network Environment." Proc.

Omura, and R.L. Pickholz

1983,

"Public Key Management for Network Security," IEEE Networks Magazine April

238.

,

(2:

.

Stockholm.

FAK-83), pp. 233-

Key Words: network, methods.

1987, pp. 11-16.

215-224.

ODE-85 Key Words:

Key Words:

techniques,

"An Approach to Multi-Level Secure Networks, Revision 1,"

network.

general.

NES-87 Nesset,

O'Dell, L.L.

crypto, keys,

NIE-89

D.M.

"Factors Affecting Distributed

System Security," IEEE Trans, on Software Engr.

,

February 1987, pp. 233-248.

Proc. 8th Natl.

Niemeyer, R. "Applying the TNI Certification and

Comp.

Sec.

Conf. (5: NCS-85). 1985, pp. 152-155. ,

to

System

Key Words: MLS, network,

Accreditation," Proc. 5th

Security Applicat. Conf.

,

(5:

design.

IEE-89c), 1989, pp. 248-252.

Key Words:

OKA-89

design, network.

Key Words: network, case.

criteria,

Okamoto. E.. and K. Tanaka "Key Distribution System Based on Identification Information." IEEE Journal on Selected Areas

Communication

.

May

1989,

pp. 481-485.

Key Words: design.

7-16

crypto, keys,

OMA-83

PRE-89

PIE-85

Omar, K.A.. and D.L. Wells, "Modified Architecture for the Sub-Key Model," Proc. 1983 IEEE Svmp. Sec. Privacy (5:IEE-83a), pp. 79-

&

.

86.

and DA. Rutkowski "Modular Design of Information Encipherment for

Press,

Computer Systems," Computers & Security

Systems September 1989, pp.

Pieprzyk,

J.P.,

I.

"Software Dase Encryption for Local Area Networks,"

Computer Networks and ISDN ,

187-192.

.

September 1985. pp. 211-218.

Key Words:

architecture,

Key Words:

keys.

crypto, design,

Key Words: Local Area Networks.

methods.

ORT-86

PRI-83

Orton, G.A., et

POL-84

al.

"VLSI Implementation of Public-Key Algorithms," Proc. Crypto '86 , Santa Barbara,

CA, 1986,

ODL-

(8:

87), pp. 277-301.

W.L. "Key Management

Price,

PoUak, R. "Micro-Mainframe

Communications Security in Distributed Network

ACM

Environment," Sec., & Control Rev. . October 1984, pp. A1-A6.

Audit.

Key Words:

public-key,

hardware.

Key Words: PC, network,

OZA-84

methods.

Ozarow, L.H., and A.D. Wyner "Wire-Tap Channel

11,"

Proc.

Eurocrypt '84 Paris, 1984, ,

BET-85), pp. 33-50.

(8:

Key Words:

threats,

methods.

RAM-89 Ramaswamy, R. "A Scheme for Providing Layer

in

on Transport

Open System

Power, J.M., and S.R. Wilbur "Authentication in an Heterogenous Environment,"

Intercormection Architectures,"

Proc. IFIP/Sec. '85

1989.

1985,

(2:

Dublin, GRI-85), pp. 117.

on Comp. ICCr89 May

Proc. Intemat. Conf.

&

Information.

,

Key Words: OSI, methods,

127.

PAI-86

design.

and M. Girault "The Security Processor CRIPT," Proc. inP/Sec. '86. Monte Carlo. 1986. (2: GRIPailles. J.-C.,

89), pp. 127-139.

Key Words:

authentication.

RAM-89a

POW-88

Ramaswamy,

Key Words:

techniques,

hardware.

Security Services in

System Using the TNI," Proc. 4th Aerosp.

Conf.

PAR-87 Parker,

.

(4:

Comp.

Sec.

Open

Systems Interconnection Architecture," Computers & Security October 1989, pp. ,

IEE-88b), 1988, pp.

507-516.

256-261.

TA.

"Seoirity in

Key Words: OSI, methods,

Open Systems:

Report on the Standards of ECMA's

Key Words:

trusted,

network,

TC32/rG9,"

Proc. 10th Natl.

Sec. Conf.

.

(5:

NCS-

87a), 1987, pp. 38-50.

Key Words: OSI, standards.

network,

design.

criteria.

RAM-89b

Work

Comp.

R.

"Placement of Data Integrity

Powanda, E.J.. and J.W. Genovese "Configuring a Trusted

A

Data

Key Words:

Security Ser/ices

POW-85

for

Encipherment," Proc. IFIP/Sec. _;83, Stockholm, 1983, (2: FAK-83), pp. 205-215.

Ramaswamy,

PRE-87

R.

"Security Architecture for Data

Presttun, K.

"Integrating Cryptography in

Transfer Through

ISDN," Proc. Crypto '87

Protocols,"

Santa Barbara, 1987,

POM-88).

,

(8:

pp. 9-18, 1988

Key Words:

crypto, network.

Security

,

&

December 1989, pp.

709-719.

Key Words:

network,

protocols, case.

7-17

TCPAP

Computers

RUT-86

RAS-85 Rasmussen, O.S. "Communications and

Network

SCH-82b

Rutiedge, L.S., and L.J.

"A Survey of

Protection: Practical

Issues in

Computer Network Security," Computers & Security December 1986, pp. 296-308.

Experience," Proc. IFIP/Sec.

GRI-

;85, Dublin. 1985. (2:

Schwartz,

Hoffman

pp. ID1-ID16.

.

85), pp. 107-115.

Key Words: network, methods, case.

Key Words:

RIH-83

SCH-84 Schaumueller-Bichl.

and E.

"Secure Computer Network Requirements," Information Age (U.K.), October 1988. pp. 211-222.

Republic of Germany." Information Age (UK). April

Key Words:

1983. pp. 91-96.

crypto,

network, general.

Satya, V.

Rihaczek. H.. and L. Krause "Data Encipherment Requirements Federal

Key Words: DES, methods.

SAT-88

I.,

Filler

"A Method of Software on the Use

Protection Based

of Smart Cards and Cryptographic Techniques." Proc. Eurocrypt '84 Paris. 1984. (8: BET-85). pp. 446.

requirements,

network.

Key Words:

M.

"DES: Putting It to Work," Computerworld. June 21, 1982,

454.

requirements,

SCA-87

crypto.

Key Words:

Schaumuller-Bici.

RIH-87 Rihaczek, K.

'IC-Cards in High-Security AppUcations." Proc. Eurocrypt

'TeleTrusT-OSIS and

'87 .

Amsterdam. 1987, (8: CHA-88a). pp. 177-189.

Communication Security," Computers & Security Jime

Key Words:

SCH-85 Schaefer. M.. and D.E. Bell

"Network Security Assurance," Nad. Comp. Sec. Conf. (5: NCS-85). 1985, pp. Proc. 8th

,

1987, pp. 206-218.

crypto, software,

methods, techniques.

I.

crypto, hardware.

,

64-69.

SCH-80

Key Words: OSI, methods, case.

RrV-80

Scharf. J.D., C.V. Wallentine.

Key Words:

and P.S. Fisher "Department of Defense

network.

Rivest, R.L.

Network Security

"A

Considerations," in Rullo,

Description of Single-

SCH-85a

Chip Implementation of RSA Cipher." Lambda, Fourth

T.A. (Ed.), Advances in

Quarter, 1980, pp. 14-18.

Vol.

Key Words: RSA,

Computer Sec. Management. 1 Heyden, Philadelphia, PA. 1980, pp. 202-230. ,

crypto,

Key Words: network,

hardware.

verification,

Schnackenberg. D.D. "Development of a Multilevel Secure Local Area Network,"

Nad. Comp. Sec.

Proc. 8th

Conf. . (5: NCS-85), 1985, pp. 97-104.

design,

Key Words: MLS, LAN.

case.

RIV-84

design, case.

SCH-82

Rivest, R.L.

"RSA Chips

Schanning, B.P.

(Past/Present/Future)," Proc.

"Applying PubUc Key Distribution to Local Area Networks," Computers &

Eurocrypt '84, Paris, 1984, (8: BET-85). pp. 159-165.

Security

Key Words: ESA.

,

SCH-87

November

1982, pp.

268-274.

crypto,

Schnackenberg. D. "Applying the Orange Book to an MLS LAN," Proc. 10th

Nad. Comp. Sec. Conf.. (5: NCS-87a), 1987, pp. 51-55.

hardware.

Key Words: LAN,

ROG-87

crypto,

keys.

Key Words: MLS, LAN, criteria.

Rogers, H.L.

SCH-82a

"An Overview of the Caneware Program," Proc. 10th Natl. (5:

Comp.

Sec. Conf.

Schwartz. .

NCS-87a), 1987, pp. 172-

174.

Key Words: case.

crypto, design,

SCH-87a

M.

Schweitzer, J.A.

"Making Sense of DES," Computerworld, June 7. 1982,

"Securing Information on a Network of Computers,"

pp. ID15-ID34.

EDPACS

Key Words: DES, general.

7-18

crypto,

.

July 1987, pp. 1-8.

Key Words: network, methods.

"

SCH-87b

SER-84

SHA-89

Schockley. W.R.. R.R.

Serpell, S.C., C.B.

and M.F. Thompson "A Network of Trusted Systems," AIAA No. 873100, Proc. 3d Aerosp.

and B.L. Clark "A Prototype System Using Public Key," Proc. Crypto '84, Santa Barbara, CA, 1984. (8: BLA-84a), pp. 3-9.

Schell,

Comp.

Sec. Conf.

,

(5:IEE-

Brookson,

Key Words: trusted,

crypto, public-

Computers

Transfer,"

Security

May

,

&

1989, pp. 209-

221.

network,

case.

key, case.

SHE-87

case.

SER-84a

SCH-89

Sheehan, E.R. "Access Control within

and C.B. Brookson "Encryption and Key Serpell, S.C.,

SchnoiT,

CP.

"Efficient Identification and

Signatures for Smart Cards," Proc. Crypto '89 Santa ,

Barbara,

CA,

(8:

BRA-90),

1989.

Key Words:

authentication,

Management

SDNS," Proc. 10th Comp. Sec. Conf. .

ECS

for the

SCO-85

,

Key Words:

(8:

crypto, network,

"Wide-Open Encryption

"Cryptographic Equipment

Design Offers Flexible Implementations

Security:

Cryptologia, January 1985, pp. 75-90.

A

Computers

Code of

&

March

crypto, hardware.

SHA-86

SEA-85 Seaman,

.

encryption,

design.

J.

Network Intruders," Computer Decisions January "Halting

,

Sharma, R.S. "Data Communications and Security," ACM Sec.. Audit & Control Rev. Winter 1986.

G.J. (Ed.)

Secure Communications and Asymmetric Cryptosystems Westview Press, Boulder, CO, 1982.

Key Words: book, crypto, methods, public-key. SIM-83 Simmons,

G.J.

Using the

Protocol

RSA

Cryptoalgorithm." Cryptologia, 1983, pp. 180-182.

.

Key Words: RSA,

pp. 28-38.

crypto,

protocol.

Key Words: methods, threats,

general.

SIM-84 Simmons, G.J. "A System for Verifying User

network,

SHA-88

techniques.

Shain,

SED-87

M.

"Security in Electronic Funds Transfer." Proc. mP/Sec. '88 .

Sedlak, H.

RSA

SIM-82 Simmons,

"A 'Weak' Privacy

29, 1985, pp. 82ff.

Key Words:

control,

Practice."

Security

1985, pp. 47-64.

Key Words: Key Words:

Key Words: network, case.

,

Serpell, S,C,

,

NCS-

Satellite Service," Proc.

Eurocrypt '84 Paris, 1984, BET-85), pp. 426-436.

SER-85

Scott, R.

Natl. (5:

87a). 1987, pp. 165-171.

keys.

case.

"The

M.

"Security in Electronic Funds

Key Words: methods,

87b), 1987. pp. 140-142.

Key Words: network,

Shain,

Cryptography

Processor," Proc. Eurocrypt '87 Amsterdam, 1987, (8:

AustraUa, 1989,

(2:

CAE-89),

pp. 367-380.

Identity

and Authorization

at

the Point-of-Sale or Access,"

Cryptologia January 1984, pp. ,

1-21.

,

CHA-88a), pp. 95-105.

Key Words: RSA,

Key Words: methods,

Key Words:

network, case.

case.

authentication,

crypto,

SIM-85 Simmons,

hardware.

G.J.

"The Practice of Authentication," Proc. Eurocrypt '85 Linz. 1985. (8: .

PIC-86). pp. 261-272.

Key Words: methods.

7-19

authentication,

SIM-87 Simmons, G.J. "Message Authentication with

SOR-84

SMI-88a Smid, M., et

Message Authentication Code

Buchanan "Measurment of Cryptographic

(MAC)

Capability Protection

Sorkin.A., and J.C.

al.

Receiver Disputes," Proc. EurocTVpt '87 Amsterdam, 1987. (8: CHA-88a), pp. 151-

Validation System: Requirements and Procedures SP 500-156, National Institute of Standards and Technology,

165.

Gaithersburg,

Arbitration of Transmitter/

,

.

MD, May

116.

1988.

Key Words: Key Words:

authentication.

Key Words:

&

Algorithms," Computers Security . May 1984. pp. 101-

authentication,

crypto, design,

methods.

design, methods, requirements.

SIM -88

STO-89 SMI-89

Simmons, G.J.

"A Survey of Information Authentication," Proceedings

of the IEEE 603-620.

Key Words:

,

May

1988, pp.

authentication.

Smid, M., J. Dray, and R. Wamar "A Token Based Access Control System for Computer Networks," Proc. 12th Natl. Comp. Sec. Conf. (5: NCS89) 1989. pp. 232-253. .

Stonebumer, G.R., and D.A. Snow "The Boeing MLS LAN: Headed Towards an INFOSEC Security Solution," Proc. 12th Natl.

Comp.

Sec. Conf.. (5:

NCS-89), 1989. pp. 254-266.

,

SIM-88a Simmons,

Key Words: MLS, LAN, Key Words: network,

G.J.

"How to Insure that Data Acquired to Verify Treaty Compliance Are IEEE May ,

TAT-87 SMI-89a

1988, pp.

Tater, G.L.

Smith, J.M. "Practical

Problems with a

Cryptographic Protection

621-627.

Santa Barbara,

verification,

90)

crypto.

,

CA,

,

BRA-

(8:

'The Secure Data Network System: An Overview:, Proc. 10th Natl. Comp. Sec. Conf. (5: NCS-87a), 1987, pp. 150,

Scheme," Proc. Crypto '89

Key Words:

design, case.

case.

Trustworthy," Proceedings of the

control,

152.

1989.

Key Words: Key Words:

SMI-81 Smid, M.E.

crypto, design,

methods.

TAT-89

"Integrating the Data

Encryption Standard into Computer Networks," IEEE Trans, on Communications

,

SNA-88

Tatebayashi, M., N.Matsuzaki.

Snare,

and D.B.

J.

"Secure Electronic Data

Exchange," Proc. iHF/Sec.

June 1981, pp. 762-772.

Key Words: DES, network,

J8,

Australia, 1989, (2:

CAE-

Newman

"Key Distribution Protocol for Digital Mobile Communication System," Proc. Crypto '89 , Santa Barbara, CA,

89), pp. 331-342.

(8:

BRA-

90). 1989.

design.

Key Words: network,

case.

Key Words:

SMI-87 Smidi, M.K. "A Verified Encrypted Packet Interface,"

network, design,

case.

ACM

Software

Engr. Notes , July 1987.

Key Words:

SOR-83 Sorkin, A.

"Requirements for A Secure Terminal Switch," Computers

&

crypto, design,

Security ,

November

1983,

pp. 268-274.

Key Words:

requirements,

Tener, w.T.

An Expert System Communications Data

"Discovery:

Security Environment," Proc. '86 Monte Carlo,

mP/Sec. 1986,

case.

Smid, M.E., and D.K. Branstad "The Data Encryption Standard: Past and Future," Proceedings of the IEEE May 1988, pp. 550-559.

(2:

.

GRI-89).

Key Words: case.

,

Key Words: DES,

TEN-86

in the

case.

SMI-88

crypto, protocols,

key.

crypto,

general.

7-20

general, network,

TUR-80 Tum,

TOP-84 Toppen, R.

The

"IrLBnite Confidence:

"AppUcations of Cryptography," in Rullo, T.A.

Audit of Communication Networks," Computers & Security .

November

VOY-83 R.

(Ed.),

1984, pp.

Advances in Computer Management, Vol. 1

Security

&

Heyden

303-313.

.

,

June 1983. pp. 135-171.

Son, Philadelphia,

Key Words: methods,

PA, 1980, pp. 170-200.

Key Words:

Voydock, V.. and S.T. Kent "Security for Computer Communication Networks," ACM Computing Surveys

general.

auditing,

Key Words:

network.

crypto, general.

Voydock, V.L.. and S.T. Kent

VAN-85

TOR-85 Torrieri, D.J.

Vandewalle,

Principles of Sectire

"Implemerttation Study of

J.

et

"Security

al.

Public

MA,

Electronic Mail and

&

Computers

in a

Security

.

December 1985. pp. 325-341.

Protection in an Existing

1985.

Mechanisms

Transport Layer Protocol,"

Key Cryptographic

Communication Systems Artech House, Norwood,

,

VOY-85

Document

Key Words: book, methods,

Handling System," Proc. EurocTVpt '85 Linz. 1985,

general.

PIC-86), pp. 4349.

.

Key Words: methods, (8:

protocols.

VOY-85a Key Words: EM.

TRO-85 Troy, E.F. "Dial-Up Security Update," Proc.

8lJi

Natl.

Comp.

cerypto,

public key.

VAN-87

Sec.

Conf. (5: NCS-85), 1985, pp. 124-132.

van Heurck,

Key Words: PC, methods,

Transfers,"

hardware.

Security , June 1987, pp. 261268.

,

P.

'TRASEC: Belgian System

Security

&

Computers

Key Words: network, protocols.

WAL-85 Key Words: network,

Troy, E.F. Security for Dial-Up Lines

Walker, S.T.

"Network Security Overview," IEEE Symp. Sec. 6. Privacy (5:IEE-85), pp. 62-

methods, case.

,

Proc. 1985

National Bureau

VAN-88

of Standards, Gaithersburg, 1986.

MD, May

.

van der Bank. D.. and E. Anderssen

76.

Key Words: PC, methods,

"Cryptographic Figiire of

Key Words: network,

hardware.

Merit," Computers

&

June 1988. pp. 299-303.

WAL-89 Walker, S.T.

Key Words:

Tsudik, G.

"Datagaram Authentication Internet Gateways:

in

Implications of Fragmentation

and Dynamic Routing," IEEE Journal on Selected Areas

Communication

,

May

1989,

crypto, design,

"Network Security: The

Parts

of the Sum," Proc. 1989 IEEE Symp. Sec. & Privacy (5:IEE-

methods.

,

VAR-89

89b), pp. 2-9.

Varadharajan, V. "Verification of

Network

Key Words: network,

general.

Security Protocols."

Computers

pp. 499-504.

&

Security

December 1989. case.

general.

Security ,

TSU-89

Key Words:

,

July 1985, pp. 12-24.

Funds

for Electronic

TRO-86 SP 500-137,

Voydock, V.L.. and 5. T. Kent "Security in Kigh-Level Network Protocols." IEEE Communications Magazine

.

pp. 693-708.

WIL-80 WiUiams, H.C.

"A Modification of

authentication,

Key Words:

verification,

the

RSA

Public -Key Cryptosystem,"

IEEE Trans, on Inform. Theory November 1980, pp.

protocols.

,

726-729.

Key Words: RSA, design.

7-21

crypto,

WOO-89

WOO-81

WIT-88 Witten. I.H. and J.G. Cleary

Wood, C.C.

"On the Privacy Afforded by Ad^tive Text Compression,"

"Future Applications of

"Planning:

Cryptography," Proc. 1981

Achieve Data Communications Security." Computers &

Computers & Security August 1988, pp. 397-408.

Wood, C.C.

IEEE Symp.

,

Sec.

&

Privacy.

(5:IEE-81), pp. 70-74.

Security .

A

Means

May

to

1989. pp. 189-

199.

Key Words: methods,

case,

Key Words:

crypto, general.

Key Words: methods,

techniques.

WOO-82

WON-85

WOO-89a

Wood, C.C.

Wong, R.M., T.A.Berson,

"Future Applications of

and R.J. Feiertag

Cryptography." Computers Security . January 1982, pp. 65-71.

"Polonius:

An

Identity

Authentication System," Proc.

1985 IEEE Svmp. Sec.

&

&

Woodfield, N.K.

"An Approach

for Evaluating

the Security of an Air Force

Type Network."

Proc. 5th Sec.

Applicat Conf.. (5:IEE-89c).

.

Privacy . (5:IEE-85). pp. 101-

design.

Key Words:

crypto, general.

1989. pp. 53-62.

107.

WOO-83 Key Words:

authentication,

Key Words: network, methods,

Wood, H.M., and

case.

I.W. Cotton

case.

"Security in

WON-89

Computer

Commtmications," in

W. Chou

Wong, R.M.

(Ed.),

"Logon

Communications, Vol.

in Distributed

Computer 1,

Englewood

Systems," Digest of Papers,

Prentice-Hall,

IEEE Compcon

CUffs, NJ. 1983, pp. 369-409.

'89

.

1989,

pp. 338-341.

Key Words: methods,

Key Words: methods, network.

7-22

general.

8.

Cryptography

This section cites publications on the theoretical and practical aspects of cryptography, cryptanalysis, and cryptographic protocols. ADL-83

ACE-81 "American Council of Education Report on the Public Cryptography Study Group," Communications of

ACM

the

.

July 1981, pp,

435-450.

AKL-82

Adleman, L.M.

Akl. S.G.

"On Breaking Generalized

"Digital Signatures with

Knap-sack Public-key

Blindfolded Arbitrators

Cryptosystems," Proceedings.

Cannot Form Alliances." Proc. 1982 IEEE Svmp. Sec, and

15th ACM Symposium on Theory of Computing 1983, ,

pp. 402-412.

Key Words:

Adams,

CM. Comments

Regarding McEUece's Public Key Cryptosystem," Proc. Crypto '87 Santa ,

CA, 1987.

(8:

POM-

88), pp. 224-228.

Key Words:

analysis,

Key Words:

signatures.

methods.

kiiapsack.

"Seairity-Related

Barbara,

IEE-82). pp. 129-

(5:

135.

policy, research.

Key Words:

ADA-87

Privacy .

Who

AGN-87

AKL-83

Agnew, G.B. "Random Sources

Akl, S.G. for

"On

the Security of

Cryptographic Systems," Proc.

Compressed Encodings," Proc.

Etirocrypt '87 ,

Crypto '83 Santa Barbara.

1987.

CA, 1983.

(8:

Amsterdam, CHA-88a), pp. 77-

.

(8:

81.

209-230.

Key Words: random,

Key Words:

CHA-84b). pp.

evaluation,

public-key.

analysis, codes.

techniques.

AKL-83a

ADL-82

AGN-88

Adleman, L.M.,

"On Breaking

the Iterated

Merkle-Hellman Pubhc-Key Cryptosystem," Proc. Crypto '82

.

Santa Barbara, CA,

Akl, S.G.

Agnew. G.B.. R.C. Mullin,

"Digital Signatures: Tutorial

and S.A. Vanstone "An Interacrtive Data

Survey,"

Discrete Exponentionation." Proc. Eurocrypt '88 . Davos,

Key Words:

1988. 176.

(8:

GUN-89).

pp. 159-

Key Words: methods,

ADL-82a

protocols.

Adleman, L.M. "Implementing an Electronic Notary Public," Proc. Crypto ,

Santa Barbara,

CA,

1982, (8: CHA-83b), pp. 259-265.

Key Words: design.

Key Words:

signatures.

general.

AKL-84 Akl, S.G., and H. Meijer

knapsack.

'82

,

Exchange Protocol Based on

1982, (8: CHA-83b), pp. 303-313. analysis,

IEEE Computer

February 1983, pp. 14-24.

Fast Pseudo Random Permu-tation Generator with

"A

Applica-tions to

AHI-87 Ahituv, N., Y. Lapid,

and

S.

Neumann

Cryptography," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 269-275. ,

"Processing Encrypted Data,"

Communications of the ACM. September 1987. pp. 777-780.

Key Words: random, techniques.

signatures,

Key Words:

techniques.

ALP-83 Alpem, B., and B. Schneider "Key Exchange Using 'Keyless Cryptography'," Information Processing Letters

,

1983, pp.

79-81.

Key Words:

8-1

keys, techniques.

BEN-84

BAL-85

AMI-81 Amirazizi, H.R., E.D. Kamin,

and J.M. Reyneri

"Compact Knapsacks

are

Polyno-mially Solvable," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER82). pp. 17-24.

Baldwin, R.W.. and W.C. Gramlich "Cryptographic Protocol for Trustable Match Making," Proc. 1985 IEEE Symp. Sec, and Privacy (5: IEE-85), pp. 92-100.

Bennet, C.H., and G. Brassard

"Update on Quantum Cryptography," Proc. Crypto '84 Santa Barbara, CA, 1984. (8: BLA-84a). pp. 475-480. ,

,

Key Words:

techniques,

methods.

Key Words:

Key Words:

analysis,

AND-82

BEN-85 Bennet, C.H.. G. Brassard, and J.-M. Robert

BAN-83

Andelman,

"On

protocols,

methods.

knapsack.

D.,

and

Reeds

J.

the Cryptanalysis of

Rotor Machines and Substitution-Permutation

"How to Reduce Your Enemy's Information,"

Banary, I., and Z. Furedi "Mental Poker with Three or More Players." Information and Control 1983. pp. 84-93.

Crypto '85

CA,

.

Networks," IEEE Trans, on Inform. Theory No. 4, 1982, pp. 578-584. ,

Key Words:

Key Words:

IEEE

J.

Wiley

theory.

BEN-86 Benaloh, J.C. "Cryptographic Capsules:

Protection of Communications

Safeguarding,"

WIL-86), pp.

Key Words: methods,

Cipher Systems: The

Asmuth, C, and J. Blum "A Modular Approach to Key

(8:

protocols,

methods.

Beker, H., and F. Piper

ASM-83

Proc.

Santa Barbara,

468-476.

BEK-82

analysis,

hardware.

1985,

,

&

New

Sons,

York,

1982.

,

Interactive Protocols," Proc. Crypto '86 , Santa Barbara,

CA.

Trans,

on Inform. Theory, March

Key Words:

1983. pp. 208-210.

methods, general.

book, techniques,

A

Disjunctive Primitive for

1986. 213-222.

(8:

ODL-87). pp.

Key Words: methods, Key Words: methods,

keys.

BEL-89

protocols.

Bellare, M., and

AVA-88

S.

Avame,

S.

"Cryptography — Combatting Data Compromise." Security Management October 1988.

Barbara,

pp. 38-43.

1989.

,

BEN-86a

Goldwasser

"New Paradigms

for Digital

Signatures for Smart Cards," Proc. Crypto '89 Santa ,

CA,

BRA-90),

(8:

Benaloh. J.C. "Secret Sharing

Homomorphisms: Keeping Shares of a Secret Secret," Proc. Crypto '86

Barbara.

Key Words:

threats,

methods.

Key Words:

.

Santa

CA, 1986.

(8:

ODL-

87). pp. 251-260.

signatures,

methods.

AYO-83

Key Words: methods,

Ayoub, F. 'The Design of Complete Encryption Packages Using

BEN-82

protocols.

Bennett, C.H., et

al.

Cryptographically Equivalent

"Quantum Cryptography, or Unforgeable Subway Tokens."

Permutations," Computers

Proc. Crypto '82

Security

,

November 1983,

&

pp.

261-267.

Key Words: methods,

design.

CA,

.

BEN-87 Bennett.

J.

"Analysis of the Encryption

Santa

CHA-

83b), pp. 267-275.

Algorithm Used in the WordPerfect Word Processing Program." Cryptologia, October

Key Words:

1987. pp. 206-210.

Barbara,

1982, (8:

authentication,

case.

Key Words: methods,

8-2

case.

BEN-89

BET-86

Bender, A., and G. Castagnoli "On the Implementation of

Curve

Elliptic

Cryptosystems," Proc. Crypto •89 .

SanU

CA,

Barbara,

(8:

BRA-90). 1989. theory.

al.

Blakely. G.R.. and

(Eds.)

Advances in Cryptology

D.L.

.

Chaum

(Eds.)

Proceedings. Eurocrypt '85 .

Advances

Linz, Austria, April 1985,

Crypto '84 Santa Barbara. CA. August 1984. Lect. Notes

New

Key Words:

in Cryptology: ,

Lecture Notes in Computer Science, Vol. 209 SpringerVeriag,

Key Words: methods,

BLA-84

Beth, T., et

York, 1986

in

Comp.

Sci.,

No. 196,

Springer- Veriag. Berlin, 1984.

Key Words:

proceedings,

general.

proceedings,

general.

BER-84 Berger, R., et

"A

BET-88

al.

Provjdjly Secure

Oblivious Transfer Protocol," Proc. Eurocrypt '84

1984.

Paris,

,

BET-85). pp. 379-

(8:

BLA-84a

Beth, T.

Blakely, G.R., and

Zero-Knowledge Identication Scheme for Smart

C.

Cards," Proc. Eurocrypt '88 .

Proc. Crypto '84

"Efficient

Davos. 1988.

386.

(8:

GUN-89).

Barbara,

Ramp

CA,

,

Schemes," Santa

1984, (8:

BLA-

84a), pp. 242-268.

pp. 77-84.

Key Words:

Meadows

"Security of

oblivious,

Key Words:

protocols.

authentication,

Key Words:

analysis, methods.

zeto.

BLA-84b

BER-85 Berger, R.. et

BEU-87

al.

"A Framework

for the

Study

of Cryptographic Protocols." Proc. Crypto '85 Santa ,

Barbara,

CA,

1985,

(8:

WIL-

"Information Theory Without

"Perfect and Essentially

the Finiteness Assumption,

Perfect Authentication

Cryptosystems as Group-

Schemes." Proc. Eurocrypt

Theoretic Objects," Proc. Crypto '84 Santa Barbara,

'87 .

Amsterdam. 1987. (8: CHA-88a). pp. 167-170.

86), pp. 87-103.

Key Words: model,

Blakely, G.R.

Beutelspacher. A.

,

CA, 1984,

(8:

BLA-84a), pp.

314-338.

protocols.

Key Words: BET-82

I:

authentication,

Key Words:

methods.

analysis, theory.

Beth, T., and T. loth

"Algorithm Engineering for Key Algorithms," Proc. 1982 IEEE Symp. Sec. Public

&

Priv.

.

(5:

IEE-82), pp.

458-466.

BLA-85

BLA-80

Blakely. G.R.

Blakely, G.R.

"One Time Pads Are Key Safeguarding Schemes. Not Cryptosystems." Proc. 1980 IEEE Symp. Sec. & Priv. (5: .

Key Words:

algorithms,

IEE-80). pp. 108-113.

design.

Key Words: methods,

"Information Theory Without the Finiteness Assumption.

,

keys.

Key Words: DES.

BET-83

BLA-80a

Beth, T. (Ed.)

Blakely, G.R.

1982 Lecture Notes

Keys," Proc. 1980

in

analysis,

theory.

Cryptography, Proceedings, Burg Feuerstein Conference ,

11:

Unfolding the DES." Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86). pp. 282-337.

"Safeguarding Cryptographic

&

IEEE

Computer Science, Springer

Symp. Sec.

Veriag, Berlin, 1983.

80), pp. 108-113.

Key Words:

Key Words: methods,

Priv. . (5:

BLA-85a Blakely. G.R.. C.

IEE-

Meadows,

and G.B. Purdy "Fingerprinting Long Forgiving Messages," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86). pp. 180-189. ,

proceedings,

general.

keys,

Key Words: methods,

8-3

theory.

BLU-83

BLA-86 R.D. Dixon

Blum. M. "How to Exchange

"Smallest Possible Message

Keys."

Expansion in Threshold Schemes," Proc. Crypto '86

Computer Systems

Blakely, G.R., and

Santa Barbara,

CA,

1986.

ACM

Trans, .

BRA-83 Brassard, G. (Secret)

on

May

1983.

pp. 175-193.

.

"A Note on

the Complexity of

Cryptography,"

IEEE Trans, on November

Informat. Theory

.

1983. pp. 232-233.

(8:

Key Words:

ODL-87), pp. 266-274.

protocols, keys.

Key Words:

complexity,

theory.

Key Words: methods,

BLU-84

theory.

Blum. M.. and S. Micali "How to Gen^ate

BLA-87

BRA-83a Brassard, G.

Blakely, G.R., and

Cryptographically Strong

"Relativized Cryptography,"

W.

Sequences of Pseudo-Random

IEEE

Rundell "Cryptosystems Based on an Analog of Heat Flow," Proc. Crypto '87 , Santa Barbara,

CA,

1987, (8:

Bits."

SIAM

Joumal of

.

Computation. November 1984.

Key Words: mathods. random.

POM-88), pp.

Trans, on Inform. Theory 1983, pp. 877-894.

Key Words: methods,

general.

BRA-86

306-329

BLU-84a

Brassard, G., and C. Crepeau

Key Words: models,

Blum. M.. and

methods.

"An

S.

Goldwasser

Efficient Probabiliastic

"Non-Transitive Transfer of

A

Confidence:

Perfect Zero-

Public-Key Encryption Scheme which Hides All

Knowledge

Blom, R.

Partial Infromation," Proc.

Proceedings, 27th

"Non-Public-key Distribution," Fhroc. Crypto '82 . Santa Barbara, CA,

Crypto '84 Santa Barbara, CA. 1984. (8: BLA-84a). pp. 289-299.

Annual Symposium on the Fotmdations of Computer

1982, (8: CHA-83b). pp. 231-236.

Key Words:

Key Words:

BLO-82

Key Words:

for

.

algorithm, zero.

BOO-85

keys,

BLO-84

Protocols," Proc. Eurocrypt

Blom. R. "An Upper Bound on the

J5,

Inform. Theory 82-84.

.

Linz, 1985. (8: PIC-86).

pp. 254-260.

Key Equivocation for Piffe Ciphers." IEEE Trans, on

Key Words:

Blom, R. "An Optimal Class of Symmetric Key Generation Paris. 1984. (8:

Joumal of Computer and System Science 1981, pp.

Registration in Databases." Proc. Eurocrypt '88 Davos.

280-311.

1988.

Key Words: methods,

P.

.

(8:

GUN-89).

Key Words:

pp. 167-

authentication,

methods, theory.

Brassard, G.

keys, theory.

"On Computationally Secure

Blum. M.

protocols, case.

and

design.

BRA-82

BLU-82

Key Words:

theory.

76.

BET-

"Coin Flipping by Telephone." Proc. IEEE Spring Computer Conference 1982. pp. 133-137.

,

Relativized Cryptography."

,

85). pp. 335-338.

Key Words:

and J.-M. Robert "All-Or-Nothing Disclosure of Secrets," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87). pp. 234-238.

J., I.B. Damgard, Landrock "Anonymous and Verifiable

in

Systems," Proc. Eurocrypt

J4.

Brassard. G., C. Crepeau,

Brandt,

"A Time-Luck Tradeoff

BLO-84a

protocols, zero.

BRA-88

Brassard. G.

theory.

Science . 1986. pp. 188-195.

Key Words: methods,

BRA-81

Key Words: methods,

IEEE

verification,

protocols.

1984, pp.

and Beyond,"

BRA-86a

Book. R.V., and F. Otto 'The Verifiability of Two-Part

management.

SAT

Interactive Protocol

Brassard, G.

Short Shared Keys," Proc. Crypto '82 Santa Barbara,

Tutorial . Lecture Notes in

CA,

Computer Science No. 325.

.

.

BRA-88a

Authentication Tags Requiring

1982, (8: CHA-83b), pp. 79-85.

Modem

Cryptology:

Springer- Verlag.

A

New

York.

NY. 1988 Key Words:

authentication,

Key Words: book,

keys.

8-4

general.

BRA-90

BRI-84

BRI-87b

Brassard, G.

Brickell, E.F.

BrickeU. E.F., P.J. Lee,

Advances

"A Few

and Y. Yacobi

in Cryptology.

Results in Message

Proceedings of Crypto-89 Santa Barbara, CA, August

Authentication" Congress

"Secure Audio

Numerantium December

Teleconference," Proc. Crypto

1989, Lecture Notes in

1984. pp. 141-154.

,

,

'87 . Santa Barbara,

Computer Science, Springer

(8:

Key Words:

Verlag, Berlin, 1990.

Key Words:

proceedings,

BRI-84a BRI-88

BrickeU, E.F. "Breaking Iterated

BRI-82 BrickeU, E.F. Fast Modular

Multiplication Algorithm with

Application to

BrickeU, E.F., and

Knapsacks," Proc. Crypto '84 , Santa Barbara, CA, 1984, (8: BLA-84a), pp. 342-358.

Two-Key Key Words:

Cryptography," Proc. Crypto '82 Santa Barbara, CA, 1982. (8: CHA-83b), pp. 51-

analysis,

A.M. Odlyzko

"Cryptanalysis: A Survey of Recent Results," Proceedings of the IEEE. May 1988, pp. 578-593.

knapsack.

.

Key Words:

analysis, methods.

BRI-85

60.

Brickell, E.F.,

Key Words: RSA,

techniques.

BRI-82a Brickell. E.F.. J.A. Davis,

and G.J. Simmons "A Preliminary Report on the Cryptanalysis of MerkleHellman Knapsack Cryptosystems," Proc. Crypto '82 Santa Barbara, CA,

BRI-88a

and

J.M. DeLaurentis

BrickeU, E.F., and

"An Attack on a Signature Scheme Proposed by Okamoto

D.R. Stinson

and Shiraishi," Proc. Crypto '85 Santa Barbara, CA, 1985. (8: WIL-86). pp. 28-32.

Multiple Arbitrers," Proc.

.

1982,

Key Words:

signatures.

analysis,

knapsack.

BRI-89 BrickeU, E.F., and

Purtill

"Structure in the S-Boxes of the DES," Proc. Crypto '86 ,

D.M. Davenport "On the Classification of

Santa Barbara, CA. 1986,

Secret Sharing Systems," Proc. Crypto '89 Santa Barbara,

(8:

ODL-87), pp. 3-32.

BRI-83

Low

Key Words: DES,

Density

Key Words: methods,

BUC-82

BrickeU, e.F.

Key Words:

"On Privacy Homomorphisms,"

and

Key Words: methods,

Simmons Status Report

theory.

on

Knapsack Based Public-key

BRI-87a

Cryptosystems," Congressus

BrickeU, E.F.. et

Numerantium Vol.

"Gradual and Verifiable Release of a Secret," Proc. Crypto '87 Santa Barbara,

.

37, 1983,

pp. 3-72.

al.

,

Key Words: knapsack.

analysis,

CA,

1987. 156-166.

Buck. R.C. 'The Public Cryptography Study Group," Computers Security

,

November

&

1982, pp.

249-254.

125.

Brickell, E.F.,

G.J.

Proc.

Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 117-

BRI-83a

theory.

BRI-87

CHA-84b), pp. 25-38.

knapsack.

BRA-90), 1989.

(8:

analysis.

,

analysis,

Ideal

,

CA,

Brickell.E.F.

Knapsacks" Proc. Crypto '83 Santa Barbara, CA, 1983. (8:

authentication,

codes.

and M.R.

"Solving

,

analysis,

BrickeU, E.F., J.H. Moore,

289-301.

Key Words:

Eurocrypt '87 Amsterdam. 1987. (8: CHA-88a), pp. 51-

BRI-86

CHA-83b), pp.

(8:

"Authentication Codes with

55.

Key Words:

.

"A

techniques,

design.

general.

"A

1987.

authentication,

methods, theory.

Key Words:

CA.

POM-88). pp. 418-426.

(8:

Key Words:

POM-88),

verification,

methods.

8-5

pp.

Key Words:

policy, research.

CAR-88

BUC-88 Buchmann, J., and H.C. WUliams "A Key-Exchange System Based on Imaginary Quadratic Fields," Journal of Cryptology Vol. 1, No. 2, 1988, pp. 107-118. .

CHA-85

DES

"Cryptanalysis of

"Using Binary Derivatives to Test an Enhancement of DES," Cryptologia, October 1988, pp. 193-208.

Reduced Number of Rounds

with a

Sequences of Linear Factors in Block Ciphers," Proc. Crypto '85 (8:

Santa Barbara, CA, 1985,

,

WIL-86), pp. 192-211.

evaluation.

Key Words: DES,

keys,

CHA-81

theory.

D., and J.-H. Evertse

L.E. Robbins

Key Words: DES, Key Words: methods,

Chaum,

and

Carroll, J.M.,

analysis,

design.

Chaum, D.L.

BUC-89 Buchmann, H.C.

J.A.,

and

WUUams

"A Key Exchange System Based on Real Quadratic Crypto '89

Fields," Proc.

Santa Barbara,

CA,

(8:

BRA-

keys,

Chaum, D. "Security Without Identification: Transaction

System

Make Big

to

Brother

ACM

Key Words: methods,

the

protocols.

1030-1044.

CHA-82

October 1985, pp.

,

Key Words:

techniques, theory.

Chaum, D.

theory.

CHA-86

"Blind Signatures for

CAD-86

Untraceable Payments," Proc.

Cade, J.J. Broken "A Modification of Public-Key Cipher," Proc. Crypto '86 , Santa Barbara,

Crypto '82 Santa Barbara,

CA,

Key Words:

A

1986, 64-83.

CHA-85a

Obsolete," Communications of

.

90), 1989.

Key Words: methods,

"Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, February 1981, pp. 84-88.

(8:

ODL-87), pp.

,

CA, 1982,

(8:

CHA-83b), pp.

199-203.

Chaum, D., and J.-H. Evertse "A Secure and PrivacyProtecting Protocol for Transmitting Personal

Infromation Between Organizations," Proc. Crypto '86 , Santa Barbara, CA, 1986,

signatures,

theory.

(8:

Key Words: methods,

design.

Chaum,

CAR-86 and "The Automated

Carroll, J.M.,

S.

Martin

D., R.L. Rivest,

and

A.T. Sheridan (Eds.), Advances in Cryptology: Proc. of Crvpto-82 Santa Barbara, ,

Cryptanalysis of Substitution

CA, August

Ciphers," Cryptologia,

Press,

New

1982, Plenum

York, 1983.

Can Be

and L. Robbins

Any

(8:

ODL-87), pp.

195-199.

Chaum, D. (Ed.), Advances in Cryptology: of Crypto-83

Cryptanalysis of

CA, August

Polyalphabetic Ciphers,"

Press,

New

.

Proc.

Sata Barbara,

Key Words:

CHA-86b Chaum,

Key Words:

protocol, theory,

zero.

1983, Plenum

York, 1984.

Cryptologia, October 1987, pp. 193-205.

Satisfied

,

CA, 1986,

"The Automated

proceedings,

general.

Key Words:

Chaimi, D. "Demonstrating the a Public

Crypto '86 Santa Barbara,

general.

CHA-84 Carroll, J.M.,

CHA-86a

Infromation About How," Proc.

proceedings,

methods.

CAR-87

protocols, design.

Without Revealing

Key Words: analysis,

Key Words:

Predicate

October 1986, pp. 193-209.

Key Words:

ODL-87), pp. 118-167.

CHA-83

analysis,

methods.

D., et

al.

"Demonstrating Possession of a Discrete Logarithm Without Revealing It," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87), pp. 200-212. .

Key Words: zero.

8-6

protocol, theory,

CHA-88b

CHA-87 Chaum,

LB. Damgard, and J. Van de Graaf "Multiparty Computations Ensuring of Each Party's Input and Correctness of the Result," Proc. Crypto '87 D.,

.

Santa Barbara,

CA,

1987.

(8:

CHO-88

Chaum, D. "Elections with

Unconditionally Secret Ballots

and Disruption Equivalent to Breaking RSA," Proc. Eurocrypt '88 . Davos, 1988, (8:

GUN-89).

Chor, B., and R.L. Rivest "A Knapsack-Type Public-key Cryptosystem Based on Arithmetic in Finite Fields," IEEE Trans, on Inform.

Theory September 1988, pp. ,

pp. 177-182.

901-909.

POM-88),

Key Words: RSA.

Key Words:

Key Words: methods, knapsack, theory, public-key.

protocols.

protocols,

CHA-89

theory.

CHO-89

Chaum. D.

CHA-87a Chaum, D.

"Undeniable Signatues" Proc. Crypto '89 Santa Barbara,

Chor, B.. and E. Kushilevitz "Secret Sharing over Infinite

"Blinding for Unaticipated

CA,

Domains." Proc. Crypto '89

,

(8:

BRA-90), 1989.

Santa Barbara, CA, 1989,

Signatures," Proc. Eurocrypt '87 Amsterdam. 1987.

Key Words:

(CHA-88a). pp. 227-233.

methods.

,

BRA-90).

signatures,

Key Words: methods,

CU-84

Chaum, D.

methods.

Demonstrating Posession of a Discrete Logarithm and Some

"The Spymaster's DoubleAgent Problem: Multiparty Computations Secure Unconditionally from All Minorities and Cryptographically from Majorities," Proc. Crypto '89

Generalizations." Proc. Eurocrypt '87 , Amsterdam,

90), 1989.

1987, (CHA-88a). pp. 127141.

Key Words:

CHA-87b D.. J.-H. Evertse.

van de Graaf "An Improved Protocol

and

J.

Key Words:

for

CHA-88

Key Words:

:

.

BRA-

Chor, B. and R.L. Rivest

"A Knapsack Type

1985, pp. 372-382.

protocols, theory.

Public -key

54-65.

Key Words: methods, knapsack.

York, 1988. Chor. B.. et

proceedings,

al.

"Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," Proceedings, 26th IEEE

general.

CHA-88a Chaum, D. "The Dining Cryptographers Problem: Unconditional Sender and Receiver

Annual Symposium on the Foundations of Comp. Sci. , 1985. pp. 383-395.

Untraceability," Journal of

Cryptology Vol. ,

1,

No.

1988, pp. 65-75.

1,

COH-85 Cohen, J., and M. Fischer "A Robust and Verifiable Cryptographically Secure Election System," Proceedings, 26th IEEE Symposium on Foimdations of Computing

CHO-85 Key Words:

policy, research.

,

,

Amsterdam. April 1987, Lecture Notes in Computer Science No. 304, Springer-

New

(8:

.

603.

Cryptosystem Based on Arith metic in Finite Fields," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp.

Eurocrypt '87 Proceedings

Verlag,

Santa Barbara, CA,

"Government and Cryptography," Computer/Law Journal Winter 1984. pp. 573-

CHO-84

protocols,

theory.

Chaum. D.. and W.L. Price (Eds.) Advances in Cryptology

theory.

CHA-89a

'Cey Words: signatures,

Chaum.

,

(8:

Key Words:

protocols,

methods.

,

Key Words: methods, protocols.

COO-80 Cooper, R.H. "Linear Transformations in Galois Fields and Their AppUcations to Cryptography," Cryptologia, Vol. 4, 1980, pp. 184-188.

Key Words:

algorithms, theory.

COO-84 Cooper, R.H., W. Hyslop, and W. Patterson "An Application of the Chinese Remainder Theorem to Multiple-Key Encryption in Data Base Systems," Proc. MP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 553-556. ,

Key Words:

protocols,

theory.

Key Words: methods,

8-7

theory.

DAV-80

COP-84 Coppersmith, D. "Another Birthday Attack," Proc. Crypto '85 Santa .

Barbara,

CA,

1985, (8:

WIL-

86), pp. 14-17.

Key Words:

DAV-83a

Davies. D.W.. W.L. Price,

Davis, J.A., and

and GJ. Parkin "Evaluation of Public-key Privacy (U.K.). March 1980,

D.B. Holdridge "Factorization Using the Quadratic Sieve Algorithm," Proc. Crypto '83. Santa

pp. 138-154.

Barbara,

Cryptosystems." Information

CA,

(8:

CHA-84b),

1983, pp. 103-113.

analysis,

Key Words:

methods.

evaluation,

Key Words:

public-key.

COP-85

analysis,

techniques.

Coppersmith, D. "Cheating at Mental Poker," Proc. Crypto '85. Santa Barbara, CA. 1985, (8: WIL86). pp. 104-107.

DAV-80a DAV-83b

Davies, D.W., and D.A. Bell "Protection of Data by

Davio, M., et

Cryptography," Information

"Analytical Characteristics of the DES," Proc. Crypto '83

Privacy , (U.K.),

May

1980,

.

Santa Barbara, CA, 1983. CHA-84b). pp. 171-202.

pp. 106-125.

Key Words:

threats,

Key Words:

protocols.

al.,

techniques, case.

Key Words: DES,

DAV-82

COP-87 Coppersmith. D. "Cryptography," IBM Journal of Research and Development, March 1987, pp. 244-248.

D.W. "Some Regular

Davies.

DAV-84

Properties of

Data Encryption Standard Algorithm." Proc. Crypto '82 Santa Barbara, CA, 1982,

Davio, M., Y. Desmedt, and ,

(8:

CHA-83b), pp. 89-96.

(Juisquater

J.-J.

"Propagation Characteristics of the DES" Proc. Eurocrypt '84 .

Paris, 1984. (8:

Key Words: DES,

BET-85). pp.

62-73.

analysis.

Key Words: DES,

DAV-82a

COS-81

analysis,

methods.

Key Words: methods, general.

(8:

Costas, IP.

Davies, D.W., and

"The Hand-Held Calculator

G.I.P. Parkin

as a Cryptographic

Terminal," Cryptologia, April 1981, pp. 94-117.

'The Average Cycle Size of the Key Stream in Output Feedback Encipherment,"

Key Words: methods,

Barbara,

hardware.

83b), pp. 97-98.

analysis.

DAV-84a

Proc. Crypto '82, Santa

CA, 1982,

(8:

CHA-

Davis. J A., D.B. Holdridge.

and G.J. Simmons "Status Report on Factoring (At the Sandia Laboratories)." Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), pp. 183215.

CRE-85

Key Words: DES,

Crepeau, C. "A Secure Poker Protocol that

analysis.

Key Words: RSA,

Minimizes the Effect of

analysis,

methods.

DAV-82b Davida,

and Y.Yeh

G.I.,

Player Coalitions," Proc.

"Cryptographic Relational

Crypto '85

Algebra," Proc. 1982 IEEE Privacy (5: Symp. Sec.

DAV-87

IEE-82). 1982, pp. 111-116

Davida, G.I.. and G.G. Walter "A Public -key Analog Cryptosystem," Proc. Eurocrypt

Key Words: methods,

Key Words:

88a), pp. 144-147.

protocols.

theory.

CA.

1985, 73-86.

Santa Barbara,

,

(8:

WIL-86), pp.

&

,

'87.

Crepeau, C. "Equivalence Between Flavors of ObUvious

Davies,

Two

Santa Barbara,

CA.

1987. POM-88). pp. 350-354.

theory.

oblivious,

.

(8:

key.

D.W.

"Use of the 'Signature Token' to

Transfer." Proc. Crypto '87

Amsterdam. 1987. (CHA-

Key Words: methods,

DAV-83

CRE-87

Key Words:

algorithms,

Create a Negotiable

Document, Proc. Crypto '83

,

Santa Barbara, CA, (8: CHA84b), 1983. pp. 377-382.

Key Words:

signatuers.

methods.

8-8

public-

DAV-87a

DEM-83a

DEJ-86

Davida, G.I, and BJ. Matt "Arbitration in Tamper Proof

de Jonge, W., and D. Chaimi

Systems," Proc. Crypto '87. Santa Barbara, CA, 1987, (8: POM-88), pp. 216-222.

Signatures

"Some

Variations

&

on

DeMillo, R.. and M. Merritt "Protocols for Data Security." IEEE Computer . February 1983. pp. 39-50.

RSA

Their Security," Proc. Crypto '86, Santa Barbara,

CA. 1986,

(8:

ODL-

Key Words:

87). pp. 49-59.

Key Words:

Key Words: RSA,

methods.

DAV-87b and F.B. Danes

G.I.,

"A Crypto-Engine,"

Denning. D.E. Cryptography and Data Security Addison-Wesley, Reading, MA, 1982.

DeLAurentis, J.M.

,

CA, 1987,

POM-88),

(8:

.

"A Further Weakness in the Common Modulus Protocol

Proc.

Crypto '87 Santa Barbara,

for the RSA Cryptoalgorithm," Cryptologia July 1984, pp. 253-259.

pp.

257-268.

,

Key Words: methods,

DAV-88

Denning. D.E.. 'The Many-Time Pad: Theme and Variations," Proc. 1983

analysis,

threats. j)rotocols.

JA, and

DB.

IEEE Symp.

DEL-84a

Holdridge "Factorization of Large Integers on a Massively Parallel Computer," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89), pp. 235-243.

Delsarte, P., et

Sec.

&

"Fast Cryptanalysis of

Key Words:

techniques, case.

,

DEN-84 Denning. D.E.

142-149.

RSA

"Digital Signatiffes with

analyis,

Key Words:

techniques.

analysis, public-

and Other PubUc-Key Cryptosystems."

key.

Communications of

DEA-87

DEM-82

Deavours, C.A., Cryptology Yesterday. Today and Tomorrow Artech House, Norwood, MA, 1987.

the

ACM.

April 1984. pp. 388-392.

DeMillo. R.. N. Lynch,

and M. Merritt "Cryptogr^hic Protocols." Symposium Proc. 14th on Theory of Computation

.

Key Words: book,

Priv. , (5:

IEE-83a), pp. 23-30.

al.

Matsumoto-Imai Public-key Scheme," Proc. Eurocrypt '84 Paris, 1984. (8: BET-85). pp.

.

Key Words:

Key Words: book, methods, models.

DEN-83

design.

Key Words: RSA. Davis,

DEN-82

signatures.

DEL-84

Davida,

protocols, general.

signatures,

ACM

general.

,

DEA-89

Key Words: RSA.

DEN-88 Den Boer,

signatures.

B.

1982, pp. 383-400.

"Cryptanalysis of F.E.A.L.," Proc. Crypto '88 Santa

Key Words:

Barbara.

,

Deavours, C.A., et al. (Eds.) Cryptology: Machines, History, and Methods Artech

protocols,

CA. 1988.

pp. 293-

299.

general.

.

House, Norwood,

MA,

Key Words: book,

general.

Cryptographic Protocols, and Computer Security Models,"

deJonge, W., and D.

Chaum

"Attacks on Some RSA Signatures," Proc. Crypto '85

Santa Barbara, CA. 1985,

(8:

WIL-86). pp. 18-27. analysis,

Proceedings, 29th

Symposium

on Applied Mathematics American Mathematical Soc, ,

,

1983.

analysis,

algorithm.

DeMillo, R.A., et al. "AppUed Cryptology,

DEJ-85

Key Words: RSA.

Key Words:

DEM-83

1989.

DES-84 Desmedt, Y.G..

"A

et al.

Critical Analysis of

Security of

Knapsack Public-

key Algorithms," IEEE Trans, on Inform. Theory July 1984, ,

pp. 601-611.

Key Words:

models.

protocols.

Key Words: knapsack.

signatures.

8-9

analysis,

DES-87

DES-84a

De

Desmedt, Y., et al. "Dependence of Output on Input in DES: Small Avalanche Characteristics," Proc. Crypto '84 Santa .

Barbara,

CA,

1984. (8: 84a), pp. 359-376.

BLA-

DIF-81 Santis. A., S. Micali,

Diffie,

W.

and G. Persiano

"Cryptographic Technology:

"Non-Interactive Zero-

Knowledge Proof Systems,"

Fifteen Year Forecast," Proc. Crypto '81 Santa Barbara,

Proc. Crypto '87

CA.

,

,

Santa

Barbara,

CA, 1987.

88), pp.

52-72

(8:

POM-

1981. 84-108.

(8:

GER-82). pp.

Key Words: methods, Key Words: DES,

Key Words:

design,

DIF-88

analysis.

DES-87a

DES -85

Diffie.

Desmedt, Y.G.. et al. "Special Uses and Abuses of

Desmedt, Y. "Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences." Proc. Crypto '85 Santa Barbara, CA. 1985, (8: WIL-86), pp. 42-

the Fiat-Shamir Passport Protocol" Proc. Crypto '86 .

Santa Barbara. CA, 1986.

W.

Ten Years of Public-Key Cryptography." Proceedings of the IEEE. May 1988. pp. 560-577. "The

First

(8:

Key Words:

ODL-87), pp. 21-39

public-key,

methods.

,

Key Words:

thretas, protocols.

DOL-81

55.

DES-87b

Key Words:

authentication,

theory.

DES-85a

Dolev. D., A.C.

Desmedt, Y.G. "Society and Group Oriented Cryptography: A New Concept," Proc. Crypto '87 Santa Barbara, CA, 1987, (8: ,

Desmedt, Y., and A.M. Odlyzko "A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes," Proc. Crypto '85 Santa Barbara, CA. 1985, (8: WIL-86), pp. 516-522. ,

Key Words: RSA,

analysis,

POM-88),

Desmedt, Y., and J.-I.

policy, methods.

"Subliminal-Free Authentication and Signature," Proc. Crypto '88 Santa ,

CA,

1988, pp. 23-33.

.

analysis, public-

key.

Party Protocols in Distributed Systems." Proc. Crypto '82 ,

Santa Barbara,

CA,

1982, CHA-83b), pp. 167-175.

(8:

authentication,

Key Words:

analysis,

DES-88a

DOL-82a

De

Tampering," Proc. Crypto '86 Santa Barbara, CA, ,

ODL-87), pp. Hi-

ll?.

Soete, M. "Some Constructions

Dolev, D., S. Even,

for

and R.M. Karp

Authentication-Secrecy

Codes," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89), pp. 57-75.

,

public-key,

Key Words:

design.

"On

the Security of Ping-Pong

Algorithms," Proc. Crypto '82

Santa Barbara,

CA,

1982, CHA-83b), pp. 177-186.

,

(8:

authentication,

Key Words:

codes.

DES-86a

analysis,

algorithms.

Desmedt, Y. "Is There A Ultimate Use of Cryptography?," Proc. Crypto '86 , Santa Barbara,

1986,

Foundations of Comp. Sci. 1981.

protocols.

the Difficulty of

Key Words:

22nd

the

Dolev. D.. and A. Wigderson "On the Security of Multi-

Desmedt, Y.G.

methods.

"Public-Key Systems Based

(8:

Protocols," Proc,

Annual Symp. on

DOL-82

DES-88

Quisquater

1986,

Yao

the Security of Public

Key Words:

Key Words:

DES-86

"On Key

pp. 120-127.

Key Words:

Barbara,

threats.

on

gneral.

theory, zero.

(8:

CA,

ODL-87). pp. 459-

463.

Key Words:

DES-89

DOL-83

Desmedt, Y.G.

"Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context." Proc. Crypto '89 Santa Barbara, CA, (8: BRA,

policy, general.

Dolev, D., and A.C. Yao "On the Security of Public-key Protocols,"

IEEE

Inform. Theory,

Trans, on

March

pp. 198-208.

90), 1989.

Key Words: Key Words: methods,

8-10

design.

protocols.

analysis,

1983,

EVE-87

EST-85

EIE-83 and H. Lagger 'Tr^oors in Knapsack Cryptosystems," Proc. Burg

Estes, D., et

Feuerstein Conf.

Quadratic

Eier, R.,

,

1982,

(8:

BET-83), pp. 316-322.

Shamir Signature Scheme for

"Linear Structures in Block Ciphers," Proc. Eurocrypt '87

Number

Amsterdam, 1987, (CHA-88a),

"Breaking the Ong-Schorr-

analysis,

Fields,"

Proc. Crypto '85 , Santa

Barbara,

Key Words:

Evertse, J.-H.

al.

CA,

1985. (8:

,

pp. 249-266.

WIL-

Key Words:

86). pp. 3-13.

analysis, methods.

knapsack.

Key Words:

ELG-82

EVE-89

analysis,

S., O. Goldreich, and A. Lempel

Even, S., O. Goldreich, and S. Micali "On Line/Off Line Digital Signatures," Proc. Crypto '89 Santa Barbara, CA, (8: BRA-

"A Randomized

90). 1989.

signatures.

ElGamal, T.

"A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Proc. Crypto '84 Santa Barbara, CA, ,

1984.

(8:

BLA-84a). pp. 10-

18.

EVE-82 Even,

,

Protocol for

Signing Contracts" Proc. Crypto '82 Santa Barbara,

Key Words:

CA. 1982.

methods.

,

(8:

CHA-83b), pp.

signatures,

205-210.

FAM-83

Key Words: methods, Key Words:

signatures.

Fam, B.W.

signatures,

"Improving the Security of Key Exchange," Proc. Crypto '83 Santa

random, protocols.

ELG-85

Exponential

EVE-85

ElGamal, T.

"A

Public-key Cryptosystem

and Signature Scheme Based

on Discrete Logarithms," Trans, on Inform. Theory July 1985, pp. 469-

IEEE

,

472.

,

Barbara,

when Implemented Using the RSA," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 58-72.

Key Words: methods,

Protocols

,

Key Words: methods, Key Words: RSA,

signatures.

analysis,

ELK-83 Even,

"Public-key Cryptosystems,"

"On

Age (UK), October 1983, pp. 232-237.

S.,

FEI-85 Feigenbaum, J. "Encrypting Problem Instances," Proc. Crypto '85

Key Words: methods,

and O. Goldreich

Power of Cascade Ciphers," ACM Trans, on Computer Systems 1985, pp.

,

(8:

theory.

FEI-88 Feige, U., A. Fiat,

,

and A. Shamir "Zero-Knowledge Proofs of

publi-key,

Key Words:

general.

keys.

the

108-116.

Key Words:

84b), pp. 359-368.

EVE-85a

S. Al-Khayatt

Information

CHA-

1983, (8:

Santa Barbara, CA, 1985, WIL-86), pp. 477-488.

protocols.

El-Kateeb, A., and

CA,

Even, S., O. Goldreich, and A. Shamir "On the Security of Ping-Pong

Identity," Journal of

evaluation,

Cryptology Vol.

methods.

,

1,

No.

2.

1988, pp. 77-94.

ESC-84

EVE-85b

Escobar, C.B.

"Nongovenunental Cryptology and National Security: The Government Seeking to

Even, S., O. Goldreich, and A. Lempel

Restrict Research,"

Signing Contracts,"

Computer/Law

Communications of the

Journal.

June 1985. pp. 637-647.

Key Words:

Key Words:

for

ACM

siagnatures,

random.

authentication,

zero.

"A Randomized Protocol

Winter 1984. pp. 573-603. policy, research.

Key Words:

FEL-85 ,

Fell. H.,

and W.Diffie

"Analysis of a Public-key

Approach Based on Polynomial Substitution," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 340-349. ,

Key Words: key.

8-11

analysis, public-

GAL-85

FEL-87 Feldman, P.

"A

ftactical

GIR-88

Galil, Z.. S. Haber,

Scheme

and

Secret Sharing," Proc, 28th

"Symmetric I*ublic-Key Encryption," Proc. Crypto '85

IEEE Annual Symp. on Foundation of Comp.

Santa Barbara, CA. 1985, WIL-86), pp. 128-137.

Non-Interactive Verifiable

Science

.

M., R. Cohen, and M. Campana Girault,

M. Yung

for

the

"A Generalized Birthday .

Davos, 1988.

(8:

Key Words:

Key Words:

public-key,

FIA-86

GOD-85 Godlewski,

GaUl. Z., S. Haber, and

M. Yimg "A Private

and A. Shamir Prove Yourself:

a Boolean Predicate and

Minimum-Knowledge PublicKey Cryptosystems," Proc. 26th IEEE Symposium on

(8:

Key Words:

'85.

Foundations of Computing 1985. pp. 360-371

(8:

Key Words:

CA,

Barbara,

Key Words: methods,

1985,

codes.

GOL-82 Goldwasser, and A. Yao

evaluation,

"On

public-key.

ns-81

S., S.

Micali,

Signatures and

Authentication," Proc. Crypto

GEO-89

Fischer, E.

Sanu

WIL-86), pp. 458-467.

.

signatures,

methods.

and

"Some Cryptographic Aspects of Womcodes," Proc. Crypto

Interactive Test of

and Signature Problems," Proc. Crypto '86,

ODL-87). pp. 186-194.

P.,

G.D. Cohen

Practical Solutions to Identification

Santa Barbara, CA, 1986,

analysis, threat

methods.

GAL-85a

to

.

GUN-89), pp.

129-156.

protocols.

"How

(8:

1987, pp. 427-437.

Key Words: methods,

Fiat, A.,

Attack," Proc. Eurocrypt '88

Sanu

'82,

CA, 1982,

Barbara,

"Measuring Cryptographic Performance with Production

Georgia, G.

Processes," Cryptologia, July

Ciphers," Cryptologia, April

1981, pp. 158-162.

1989, pp. 151.

Key Words:

Key Words: methods,

Goldwasser,

techniques.

"ProbabiUstic Encryption and

"A Method

(8:

to

CHA-83b), pp. 211-215.

Strengthen

Key Words:

signatures,

GOL-82a evaluation,

methods.

Gersho. A. (Ed.) Advances in Cryptology: Report on Crypto 81 August

CA.

1981.

1984, 454-464.

(8:

BLA-84a), pp.

Information," Proceedings, 14th

A

Annual ACM Symp. on Theory of Computing May

.

ECE RepL

,

No. 82-02.

1982, pp. 365-377.

University of California, Santa

Barbara,

Key Words:

protocols, case.

CA, August

Key Words: methods,

20,

1982.

protocols.

Key Words:

FOS-82

GOL-82b

proceedings,

methods.

Foster, C.C.

Goldwasser,

Cryptanalysis for

Microcomputers Hayden .

Book

S. Micali

to Play Mental Poker Keeping Secret All Partial

"Poker Protocols," Proc. Crypto '84 , Santa Barbara,

Fortune, S.

and

How

GER-82

FOR-84

S.,

Co., Rochelle Park, NJ,

1982.

P.

"How

GIF-82

S., S.

Micali, and

Tong to Establish

a Private

Gifford, D.K.

Code on

"Cryptographic Sealing for

Proceedings. 23d Annual

IEEE Symposium on Foimdations of

Information Security and

Key Words: book, PC,

Authentication,"

methods.

Communications of the

ACM

April 1982. pp. 274-286.

Key Words:

authentication,

methods.

8-12

a Public Network,"

Computing 1982, pp. 134-144. ,

.

Key Words: methods,

codes.

GOL-85

GOL-83

GOL-87a

Goldreich, O.

Goldwasser.

"A Simple

and R.L. Rivest

Protocol for

"A

Goldreich, O., and R. Vainish

Micali.

S.. S.

Signing Protocols," Proc. Crypto '83 Santa Barbara,

the Signature Problem," Proc,

CA, 1983.

25d Annual IEEE Symp.on

,

(8:

CHA-84b), pp.

'Paradoxical' Solution to

Found, of Comp. 441-448.

133-135.

Key Words:

,

1984, pp.

"How to Solve a Protocol Problem: An Efficiency Improvement," Proc Crypto '87 Santa Barbara, CA, 1987, (8: POM-88), pp. 73-86 ,

Key Words: methods,

signatures,

Key Words:

protocols.

signatures,

protocols.

theory.

GOL-89

GOL-83a Goldwasser, S., S. Micali, and A. Yao "Strong Signature Schems," Proc. 15th Annual Symp. on Theory of Comp. 1983. pp. 431-439.

GOL-86

Goldwasser,

Goldreich, O.

ACM

.

S., et al.

"Efficient Identification

Two

'Two Remarks Concerning

Schemes Using

the Goldwasser-Micali-Rivest

Signature Scheme" Proc

Interactive Proofs." Proc. Crypto '89 . Santa Barbara,

Crypto '86 Santa Barbara,

CA,

,

Prover

BRA-90). 1989.

(8:

CA,

1986, (8: ODL-87), pp. 104-110.

Key Words: methods,

Key Words:

GOL-84

GOO-84 Goodman, R.M.F., and McAuley "A New Trapdoor Knapsack

GOL-86a

Micali fhe Cryptographic

S.

"On

Apphcations of

A.J.

Goldreich. O., S. Micali,

Random

Fimctions," Proc. Crypto '84

Santa Barbara, CA, 1984, BLA-84a). pp. 276-288.

,

(8:

and A. Wigderson "How to Prove All

Public-key Cryptosystem,"

NP

Proc. Eurocrypt '84

Statements in Zero-Knowledge and Methodology of

Cryptographic Protocol Design," Proc. Crypto '86 Santa Barbara, CA, 1986, ODL-87), pp. 171-185.

Key Words: methods, random.

Key Words:

Goldreich. O.

"On Concunent

(8:

protocols, zero.

Identification

Protocols." Proc. Eurocrypt ;84. Paris, 1984, (8:

BET-

387-396.

1984,

(8:

GOL-86b

Paris,

,

BET-85), pp. 150-

158.

Key Words:

,

GOL-84a

85). pp.

authentication,

analysis,

signatures.

Goldreich, O., S. Goldwasser,

and

Key Words: methods.

signatures.

public-key,

knapsack.

GOR-81 Gordon, J.A. 'Towards a Design for Cryptosecure Susbstitution Boxes," Proc. Crypto '81.

Goldreich. O.

CA,

'Toward a Theory of

Santa Barbara,

Software Protection." Proc.

GER-82), pp. 53-63.

Key Words: methods,

Crypto '86 Santa Barbara.

protocols.

CA.

1981,

(8:

.

1986. (8: ODL-87). pp.

Key Words: methods,

design.

426-439.

GRO-84

GOL-84b Goldwasser.

S..

and

S. Micali

Key Words:

software, theory.

Journal of

Comp. and System

Groscot, H.

"Estimation of Some Encryption Functions

"Probabilistic Encryption,"

GOL-87

Science April 1984, pp. 270-

Goldreich, O.

Implemented

299.

'Towards a Theory of Software Protection and Simulation by ObUvious

Cards," Proc. Eurocrypt '84

,

Key Words: methods,

theory.

RAMs," Proceedings, 19th ACM Symposium on Theory of Computing

,

1987, pp. 182-

194.

Paris, 1984, (8:

theory, software.

Smart

Key Words:

analysis, methods.

GUA-87 P.

"Cellular

Automaton Public

Key Cryptosystem," Complex Systems

,

1987, pp. 51-56.

Key Words: methods,

8-13

,

BET-85), pp.

470-479.

Guam,

Key Words:

into

case.

HAR-84

GUI-88 Guillou, L.C., and J.

Quisquater

"A

Practical

Zero-Knowledge

Protocol Fitted to Security

Microprocessor Minimizing Both Transmission and

Memory,"

HEN-81

Harari, S.

"Non-Linear NonConunutative Functions for Data Integrity," Proc. Eurocrypt '84 Paris, 1984, BET-85), pp. 25-32. .

(8:

Henry, P.S. "Fast Encryption Algorithm for the Knapsack Cryptographic System," Bell System Technical Journal May-June 1981, pp. 767-773. ,

Proc. Eurocrypt

^88. Davos, 1988, (8:

GUN-

Key Words:

integrity, theory.

89). pp. 123-128.

Key Words:

design protocols,

zero.

HAR-89 Ham, L., and T. Keisler 'Two New Efficient

al.

"Public-Key Techniques:

Proc. 5th Security Applicat.

Randomness and

Conf. (4: IEE-89c), 1989, pp. 254-262. .

Redundancy," Cryptologia

,

Key Words: methods, public-key,

public-

HEL-80

GUN-88

Proc.

Eurocrypt '88 , Davos, 1988, (8: GUN-89), pp. 405-414.

Plenum

Press,

New

Key Words: book,

general.

"A Cryptoanalytic TimeTradeoff." IEEE Trans, on Inform. Theory

308.

July 1980, pp.

,

40M06.

analysis, design.

Search." Proc. Crypto '81 ,

Eurocrypt '88 Proceedings, Davos, Switzerland, May 1988, Lecture Notes in Comp. Science No. 330, Springer- Verlag, New York,

GER-82). pp.

Santa Barbara,

Key Words:

CA,

1981, (8:

1-5.

HAR-83

One Checksum

,

vulnerabilities,

algorithms, check-sum.

IMP-87

Hellman, M.E., and J.M. Reyneri "Distribution of Drainage in DES," Proc. Crypto '82. Santa Barbara,

CA.

1982, (8:

CHA-

83b), pp. 129-131.

Harari, S.

Cohen

Algorithm and Its Improvement," Computers & Security October 1988, pp. 503-505.

Key Words:

analysis,

methods.

HEL-82

general.

F.

Points of

Fast Cryptographic

the Necessity of

Cryptoanalytic Exhaustive

proceedings,

and

Y.J.,

"Some Weak

Gunther, C.G. Advances in Cryptology:

1989.

complexity,

HUA-88 Huang.

HEL-81 "On

GUN-89

Key Words: methods.

algorithms,

coding.

Herlestam, T.

Memory

Key Words:

Key Words:

.

York. 1986.

.

Hellman. M.E.

Gunther, C.G. "A Universal Algorithm for

Key Words:

Protection

"On the Complexity of Certain Crypto Generators," Proc. IFIP/Sec. '83 Stockholm. 1983, (2: FAK-83), pp. 305-

key.

random

Homophonic Coding,"

Hepshey, J.E., R.K. Yarlanda Data Encryption and

HER-83

April 1989, pp. 167.

Key Words:

algorithm,

HEP-86

Cryptosystems Based on Rabin's Scheme: Alternatives to the RSA Cryptosystem,"

GUI-89 Guillou, L., et

Key Words: knapsack.

Impagliazzo, R.,

and M. Yimg "Direct

Minimum-Knowledge

Computations," Proc. Crypto '87 , Santa Barbara, CA, 1987, (8: POM-88). pp. 40-51

"Secret Sharing Systems in Digital Communications," in

Key Words: DES,

Longo, G. (Ed.), Secure Digital Systems Springer, Wien, 1983, pp. 105-110.

methods.

,

Key Words:

techniques,

design.

8-14

design,

Key Words: methods,

zero.

JAN-87

ING-81 Ingemaisson,

I.,

and

C.K. Wong "A UsCT Authentication Scheme for Shared Data Based on a Trap-Door One-

Way

JUE-83

Jansen, C.J.A., and

Function," Information

Processing Letters April 13, 1981, pp. 63-67. ,

D.E. Boekee "Modes of Block Cipher Algorithms and Their Protection Against Active Eavesdropper," Proc. Eurocrypt '87, Amsterdam, 1987, (8: CHA-88a), pp. 281-

Jueneman, R.R., S.M. Matyas, and C. H. Meyer, "Authentication with Manipulation Detection Codes," Proc. 1983 IEEE Symp. Sec. & Priv. , (5: lEE83a), pp. 33-54.

286.

Key Words:

Key Words:

authentication,

Key Words:

trap-door, methods.

therats,

methods,

authentication,

codes.

algorithms.

ING-82 Ingemarsson,

I.,

D.T. Tang,

JIN-88

and C.K. Wong "A Conference Key Distribution System" IEEE Trans, on Inform. Theory

Jingmin, H., and L. Kaicheng

1982, pp. 714-720.

(8:

,

"A New

Detection Code," Proc. Crypto

ProbabiUstic

Encryption Scheme," Proc. Eurocrypt '88 Davos, 1988, ,

GUN-89),

JUE-86 Juenemam, R.R. "A High Speed Manipulation '86 (8:

,

Santa Barbara, CA, 1986,

ODL-87), pp. 327-346.

pp. 413-418.

Key Words: methods,

Key Words: methods,

keys,

Key Words: methods,

design.

codes,

threats.

case.

JUR-83

JOR-81

JAM-86

Jurgensen. H., and

Jordan, J.P.

James, N.S., R. Lidl, and

"A Variant of

H. Niederreiter "Breaking the Cade Cipher," Proc. Crypto '86 Santa

Cryptosystem Based on Goppa Codes," Proc. Crypto '81, Santa Barbara, CA, 1981, (8: GER-82). pp. 25-30.

,

Barbara,

CA,

1986, (8: 87), pp. 60-63.

ODL-

a Public-key

analysis, case.

public-

on

the

of Cryptosystems," Proc. Crypto '83 , Santa Barbara, 1983, 303-356.

(8:

CHA-84b), pp.

key.

JOR-87

Jamnig, P. "Securing the

analysis, theory,

design.

J. Vandewalle, and R. Govaerts

Jorissen, P.,

RSA-

Cryptosystem Against Cycling Attacks," Cryptologia, July 1988, pp. 159-164.

Key Words: RSA,

analysis,

"Extension of Brickell's

Algorithm for Breaking High Density Knapsacks," Proc. Eurocrypt '87 Amsterdam, 1987. (8: CHA-88a), pp. 109,

Kahn, D. "Cryptography Goes Public," IEEE Communications Magazine March 1980, pp. ,

19-28.

Key Words:

Key Words: JAN-82

KAH-80

115.

threats.

public -key,

general.

analysis,

algorithms.

KAH-82

Janardan, R., and

K.B. Lakshmanan "A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem," Proc. Crypto '82 , Santa Barbara, (8:

CHA-83b). pp.

Key Words:

JUE-82 Jueneman, R.R. "Analysis of Certain Aspects

of Output Feedback Mode," Proc. Crypto '82 . Santa Barbara,

CA,

1982, (8:

public-key,

Key Words: DES,

Kahn. D. "The Grand Lines of Cryptology's Development," Computers & Security ,

November

1982, pp. 245-248.

CHAKey Words: methods,

83b), pp. 99-127.

21-37.

methods.

Results

Key Words:

JAM-88

CA, 1982,

"Some

Information Theoretic Analyses

CA, Key Words: methods,

Key Words:

D. E. Matthews

analysis,

general.

KAH-84 Kahn, D.

design.

Kahn on Codes Macmillan, ,

New

York, 1984.

Key Words: book,

8-15

general.

KAR-83

KAH-84a

KON-81

Kahn. D.

Kamin, E.D.,

"Cryptology and the Origins of Spread Spectrum," IEEE

"On Secret Sharing Systems," IEEE Trans, on Inform.

Spectrum September 1984,

Theory 1983, pp. 35-41.

,

et al.

general.

Key Words: methods,

KAR-84

general.

"A

Kak, S.C. "Joint Encryption and Error Correction," Proc. 1983 IEEE

&

Privacy , Symp. Sec. IEE-83a), pp. 55-60.

Trans, on Computers

.

May

(5:

Key Words:

Kesim, S.N.

"On

the

Key

for

KOT-84

Method of Puzzles

Kothari, S.C.

Ciphers," Security

Distribution,"

Management. October 1988,

"Generalized Linear Threshold Scheme," Proc. Crypto '84

Computer

and Information Science

Key Words: methods,

.

pp. 45-47.

Santa Barbara, CA, 1984, BLA-84a), pp. 231-241.

,

April 1984. pp. 103-109. keys.

Key Words: methods,

Kahski, B.S.

Key Words: methods,

KOB-87

Key Words: book,

Koyama,

1984,

(8:

BLA-84a). pp. 83-

Distribution Systems," Proc. Crypto '87 , Sanu

general.

Barbara,

KOB-87a

Jr.,

POM-

keys.

KOY-88 Koyama,

K.,

and K. Ohta

"Security of Improved Identity-

Based Key Distribution

R.L. Rivest,

,

1987. (8:

Key Words: methods,

Cryptosystems," Mathematics of Computation, 1987, pp.

and A.T. Sherman "Is the Data Encryption Standard a Group?," Joumal of Cryptology Vol. 1, No. 1,

CA,

Curve

203-209.

Kaliski. B.S.,

OhU

88). pp. 175-184.

"Elliptic

KAL-85

and K.

Key

Kobhtz, N.

Key Words:

K.,

'Identity-Based Conference

Santa Barbara, CA,

94.

theory.

KOY-87

KobUtz, N. Course in NumbCT Theory and Cryptography Springer, New York, 1987. ,

"Wyner's Analog Encryption Scheme: Results of a Simulation," Proc. Crypto

(8:

general.

A

KAL-84

,

method,

analysis,

"Encryption: Security with

Intemat. Journal of

•84

"Cryptanalysis of ADFGVX Encryption Systems," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 339-341.

case.

KES-88 Kak, S.C.

general.

algorithm,

codes.

KAK-84

Key Words: book,

.

1984, pp. 404-408.

knapsack.

Key Words: methods,

J.

York.

Konheim, A.G.

Algorithm for the Knapsack Problem," IEEE Parallel

Key Words:

Primer .

KON-84

Kamin, E.D.

KAK-83

A

New

1981.

.

pp. 70-80

Key Words: methods,

Konheim, A.G. Cryptography Wiley & Sons,

Key Words: methods,

theory.

System," Proc. Eurocrypt-87 , pp. 11-19.

KOB-89

Key Words: methods,

KobUtz, N.

keys.

"Hyperelliptic Cryptosystem,"

1988, pp. 3-36.

Joumal of Cryptology Vol. No. 3, 1989, pp. 139-150. ,

Key Words: DES,

design,

1,

KRA-86 Kranakis, E. Primality and Cryptography ,

theory.

Key Words: methods,

theory.

Wiley,

New

York, 1986.

KAL-85a Kaliski, B.S. Jr, R.L. Rivest

and A.T. Sherman "Is DES a Pure Cipher?," Proc. Crypto '85 Santa ,

Barbara,

CA, 1985,

(8:

WIL-

theory.

Key Words: book,

Konheim, A.G., et al. "The IPS Cryptographic Programs," IBM Systems Joumal Vol. 19. No. 2, 1980, .

pp. 153-283.

86), pp. 212-226.

Key Words: DES,

KON-80

design,

Key Words: methods, software.

8-16

general.

KUR-88

LEE-88

LID-83 and W.B. MuUer "Permutation Polynomials in RSA Cryptosystems," Proc. Crypto '83 Santa Barbara,

Kurosawa, K., T. Ito, and M. Takeuchi "Public Key Cryptosystem Using a Reciprocal Number

Key Cryptosystem,

with the Same Intractability as Factoring a Large

Eurocrypt '88 Davos, 1988 (8: GUN-89), pp. 275-280.

CA, 1983,

Key Words:

Key Words: RSA, methods,

Lee,

P.J.,

and E.F. BrickeU

"An Observation on

Lidl, R.,

the

Security of McElice's PublicProc.

,

,

(8:

CHA-84b), pp.

293-301.

Number," Cryptologia, October 1988, pp. 225-233.

analysis, public-

key.

Key Words: methods,

theory.

public-

LID-84

LEI-84

key.

LAG-83 Lagarias, J.C.

"Knapsack Public Key Cryptosystems and Diophantine Approximations," Proc. Crypto '83 Santa

Leighton, A.C., and

Lidl, R.

S.M. Matyas "The History of Book Ciphers," Proc. Crypto '84

"On Cryptosystems Based on Polynomials and Finite Fields," Proc. Eurocrypt '84 Paris, 1984, (8: BET-85), pp. 10-15.

Santa Barbara, CA, 1984, BLA-84a), pp. 101-113.

,

,

(8:

Key Words: methods,

,

Barbara,

CA, 1983,

CHA-

(8:

Key Words: methods,

LON-82

84b), pp. 4-23.

LEN-81

Key Words:

Lennon. R.E..

public-key,

IEEE

LAI-89

pp. 773-777.

Key Words:

Journal on Selected in

Communications

,

Santa Barbara, CA, 1984,

LAK-83 Laksmivarahan, S. "Algorithms for Public -Key Cryptosystems: Theory and AppUcations," in M. Yovits,

Key Words: methods,

York,

Levin, L.

Pseudo-random Generators," Proc. 17th Annual ACM Symp. on Theory of Computing 1985, pp. 363-

public-key,

,

LAM-81

365.

.

November 1981,

pp.

Key Words:

Key Words: Methods,

authentication.

one-

way,

Key Words: methods,

general.

Encryption Algorithm," Proc. IHP/Sec. '84 Toronto, 1984, ,

(2:

FIN-85), pp. 557-570.

Key Words: methods, algorithm.

MagUveras, S.S., and N.D. Memon "Algebraic Properties of the

PGM

LEV-87 and R. Chandler "Some Further AppUcations of Permutation Polynomials," Cryptologia, October 1987, Levine,

770-772.

,

MAG-89

Lamport, L.

"Pasword Authentication with Insecure Communications," Communications of the

Luby, M., and C. Rackoff "A Study of Password Security," Proc. Crypto '87 Santa Barbara, CA, 1987, (8: POM-88), pp. 392-397.

Madryga, W.E. "A High Performance

"One-Way Functions and

methods.

ACM

pubUc-

MAD-84

complexity.

LEV-85

22,

1983, pp. 45-108.

Key Words:

(8:

BLA-84a), pp. 468-474.

in

New

(8:

LUB-87

Leung, A.K. "Sequenec Complexity as a Test for Cryptographic Systems," Proc. Crypto '84

knapsack.

.

signatures,

,

key.

authentication.

LEU-84

Key Words: methods,

Advances Computers Vol. Academic Press,

Santa Barbara, CA, 1982, CHA-83b), pp. 187-197.

,

1989, pp. 534-539.

(Ed.),

Longpre. L. "The Use of Public-Key Cryptography for Signing Checks," Proc. Crypto '82

Key Words:

Key Cryptosystem,"

Areas

May

Trans, on

Communications, June 1981,

al.

"Linearly Shift Knapsack Public

IEEE

et al.

"Cryptographic Authentication of Time-Invariant Quantities,"

knapsack.

Laih, C.-S.. et

theory.

general.

J.,

8-17

,

Key Words: methods, case.

pp. 211-218.

Key Words: methods,

Cryptosystem" Proc. Crypto '89 Santa Barbara, CA. 1989 (8: BRA-89).

theory.

theory,

MAS -84

MCE-81

Massey, J.L., and R.A. Rueppel "Linear Ciphers and Random Sequence Generators with Multiple Clocks," Proc. Eurocrypt '84 Paris, 1984, .

MEI-89

McElicie, R.J., and

Meier, W., and O. Staffelbach

D.V. Sarwate

"On Sharing Secrets and Reed-Solomon Codes," Communications of the ACM, September 1981, pp. 583-584.

No.

Key Words:

Key Words:

"Fast Correlation Attacks

on

Certain Stream Ciphers," Journal of Cryptology , Vol. 3,

1,

1989, pp. 159-176.

BET-85), pp. 74-87.

(8:

Key Words: methods,

MEA-87

MAS-88 Massey,

"An

theory, codes.

J.L.

Introduction to

Contemporary Cryptology," Proceedings of the IEEE May 1988, pp. 533-549.

,

MER-80

Meadows, C, and

Merkle, R.C.

D. Mutchler "Matching Secrets in the Absence of a Continuously Available Trusted Authority," IEEE Trans, on Software

"Protocols for Public Key Cryptosystems." Proc. 1980

metliods, theory,

&

IEEE Symp. (5:

Sec. Privacy , IEE-80). pp. 122-134.

Key Words:

Engr. February 1987, pp. 289-292. .

Key Words:

analysis, methods.

design.

protocols, pubUc-

key.

general.

MER-81

Key Words: methods,

MAT-86

Merkle, R.C.

protocols.

"On

Matyas, S.M.

Key

"Public

Registration,"

Proc. Crypto '86

,

Santa

CA, 1986,

Barbara,

(8:

ODL-

87), pp. 451-458.

Key Words: methods,

public-

key.

MEA-88

the Security of Multiple

Encryptions," Communications

Meadows, C, "Some Threshold Schemes

of the ACM, July 1981, pp. 465-467.

Without Central Key Distribution," Proc. Crypto '88 Santa Barbara, CA, 1988

Key Words:

(8:

MER-82

GOL-89b).

Merritt,

MAT-88

Key Words: methods,

Matsumoto,

T.,

,

CA, 1982,

Meijer, H., and S. Akl

GUN-

'Ji, Davos, 1988, (8:

Key Words: methods,

pp. 329-338

design.

Merkle. R.C.

Key Words: methods,

Security, Authentication, and

MEI-85

signatures.

Public-Key Systems University of Michigan Press, Ann Arbor, ,

Meijer, H., and S. Akl

'Two New

MCC-88 McCurley, K.S.

System

Journal of Cryptology 2.

Secret

Key

MI, 1982.

Cryptosystems," Proc.

Equivalent to Factoring,"

No.

.

Eurocrypt '85 Linz, 1985, PIC-86). pp. 96-102. .

(8:

Vol.

1988, pp. 95-105.

Key Words: methods,

Key Words: methods,

public-key.

MER-87 Merkle, R.C. Digital Signature

Based on

a Conventional Encryption Fimction," Proc. Crypto '87

keys,

MEI-88 Meier. W., and

O. Staffelbach "Fast Correlation Attacks on Stream Ciphers," Proc. Eurocrypt '88 Davos, 1988, ,

(8:

Key Words: book,

"A

algorithms. case.

keys,

MER-82a

signatures.

1,

CHA-83b), pp.

Cryptologia, October 1982,

Key Words: methods,

89), pp. 419-453.

Distribution

(8:

321-375.

"Digital Signature Schemes,"

Message

Encryption," Proc. Eurocrypt

"A Key

Proc.

Crypto '82 Santa Barbara,

MEI-82

Efficient Signature

Verification and

M.

"Key Reconstruction,"

keys.

and H. Imai

"Public Quadratic Polynomial-Tuples for

analysis, methods.

.

GUN-89),

Key Words:

pp. 301-314.

analysis,

methods.

8-18

Santa Barbara, CA, 1987, POM-88), pp. 369-378.

Key Words: methods, signatures.

,

(8:

MOO-85

MER-89 Merkle. R.C.

"A

Certified Digital

Signature," Proc. Crypto '89 .

Santa Barbara, CA, 1989,

(8:

NIE-85

Moore, T.E., and S.E. Tavares "A Layered Approach to the Design of Private Key Cryptosystems," Proc. Crypto

CA. 1985,

•85 , Santa Barbara,

BRA-89).

(8:

Key Words:

WrL-86), pp. 227-245.

Key Words: methods,

design,

Way Hash

MOO-86

Functions

and the DES." Proc. Crypto •89 , Santa Barbara,

CA,

Key Words: DES, methods, design.

and

J.H.,

O'Connor,

Simmons

J.

public-

DES Weak and Semiweak

L.J.

and

Seberry

"Cycle Structures of the

The Cryptographic

with

of the Knapsack Problem Aegean Park Press, Laguna HUls, CA, 1987.

Keys," Proc. Crypto '86 , Santa Barbara, CA, 1986, ODL-87), pp. 187-205.

(8:

MEY-82

Significance ,

Key Words: book, knapsack,

Meyer, C.H., and SM. Matyas Cryptography - A New Dimension in Computer Data Sectirity J. Wiley & Sons, ,

New

Key Words: methods,

OCO-87

Moore, G.J.

BRA-89).

(8:

Shift Register

Sequences," Proc. Eurocrypt ^85, Linz, 1985, (8: PIC-86). pp. 35-39.

key.

case.

Merkle, R.C.

1989.

"A Public-Key Cryptosystem Based on

signatures, case.

MER-89a "One

Niederreiter, H.

York, 1982.

Key Words:

book, general,

Odlyzko, A.M.

Moore,

"Cryptanalytic Attacks on the

and

J.H.,

Simmons

Multiplicative

(or Anti-palindromic)

S., et al.

Key Words: DES,

Proc. Crypto '86

design.

Santa

CA, 1986.

(8:

ODL-

87), pp. 381-392.

Key Words: methods,

theory.

ODL-84a

MOR-81 Morrison, D.R. "Subtractive Encryptors

-

DES,"

Proc. Crypto '81 , Santa

Barbara,

Micali. S. "Digital Signatures:

The

CA. 1981.

(8:

Key Words: methods,

Evolution of a Fundamental Primitive." Proc. Crypto '89 ,

Key Words: DES. methods,

Santa Barbara. CA. 1989.

case.

BRA-89).

Key Words:

Odlyzko, A.M. "Discrete Logarithms in Finite Fields and Their Cryptographic Significance," Proc. Eurocrypt ^84. Paris, 1984, (8: BET-85), pp. 225-314.

GER-

82). pp. 42-52.

(8:

analysis,

analysis,

Alternatives to the

MIC-89

Key Words:

knapsack, signatures.

for

Probabilistic Cryptosystems," ,

Knapsack

Cryptosystem and on Shamir's Fast Signature System, IEEE Trans, on Inform. Theory July 1984, pp. 594-601. ,

Sequences of Keys," IEEE Trans, of Software Engr., February 1987, pp. 262-273.

"The Notion of Security

analysis, theory.

ODL-84

MOO-87 "Cycle Structure of the DES for Keys Having Palindromic

MIC-86

Barbara,

analysis,

design.

G.J.

theory, methods, keys.

Micali,

Key Words: DES,

theory.

ODL-87 Odlyzko, A.M., (Ed.) Advances in Cryptology Proceedings of Crypto '86 Santa Barbara, CA, August 1988. Lecture Notes in Computer Science No. 263. Springer- Verlag. New York. ,

MUL-84 signatures,

.

Mullin. A.A.

"A Note on the Mathematics of Public-Key Cryptosystems,"

theory.

Computers

MIL-85 MiUer, V.S. "Use of Elliptic Curves in Cryptography," Proc. Crypto '85 . Santa Barbara, CA. 1985. (8: WIL-86). pp. 415-

&

Security

1987.

Key Words:

Key Words:

public-key,

general.

theory.

426.

Key Words: methods,

,

February 1984, pp. 45-47.

theory.

8-19

proceedings,

OKA-85

OKA-88a

Okamoto,

and

T.,

A. Shiraishi

"A

Scheme

Fast Signature

Based on Quadratic Inequalities," Proc.

IEEE Symp. 1985, (5: 133.

Pfitzmann and M. Waidner 'T*Jetworks Without User

Scheme Using Bijective PublicKey Cryptosystems,"

Observability." Computers

ACM

1985

&

Privacy IEE-85). pp. 123Sec.

Pn-87

Okamoto, T. "A Digital Multisignature

Trans, on

Security

Computer

166.

,

Key Words: methods,

432-441.

Key Words: methods,

case.

PIC-86

signatures.

Pichler. F. (Ed.)

Advances in Cryptology:

signatures.

OKA-89

OKA-85a

Proceedings of Eurocrypt '85

Okamoto,

E.,

and

K. Nakamura "Lifetimes of Keys in Cryptographic Key

Management Systems," Crypto '85

CA, 1985,

&

April 1987. pp. 158-

Systems November 1988, pp.

,

Key Words: methods,

Okamoto,

.

Proc.

Santa Barbara,

,

(8:

and K. Ohta "Disposable Zero-Knowledge Authentications and Their

Linz, Austria, April 1985.

Application to Untraceable

Veriag,

Electronic Cash," Proc. Crypto '89 . Santa Barbara, CA, 1989

Key Words:

(8:

E.,

BRA-89).

Comp.

Science. No. 219, Springer-

New

York, 1986. proceedings,

general.

WIL-86), pp.

Key Words: methods,

246-259.

PIE-84

zero,

Pieprzyk, J.P.

design.

Key Words:

Lecture Notes in

.

"Algebraical Structures of Cryptographic Transformations." Proc. Eurocrypt '84. Paris, 1984,

keys,

ONG-83

management.

Ong.

OKA-86

H., and

CP.

Schorr

"Signatures through

BET-85), pp. 16-24.

"Proposal for Identity-Based

Approximate Representations by Quadratic Forms." Proc.

Key

Crypto '83 . Santa Barbara,

Key Words:

Okamoto, E. Distribution Systems,"

Electronics Letters

,

CA. 1983.

Nov. 20,

1986, pp. 1283-1284.

(8:

(8:

algorithms, theory.

CHA-84b). pp. PIE-85

117-132.

Pieprzyk, J.P.

Key Words: methods,

keys.

Key Words: methods,

"On PubUc-Key Cryptosystems

signatures.

Built Using Polynomial

Rings." Proc. Eurocrypt '85

OKA-87 ONG-84

Okamoto, E. "Key Distribution Systems Based on Identification

Ong, H., C. Schnorr, and A. Shamir "Efficient Signature Schemes Based on Polynomial

Information," Proc. Crypto '87 , Santa Barbara, CA,

1987,

(8:

POM-88),

Equations," Proc. Crypto '84

pp. 194-

Santa Barbara, CA, 1984, BLA-84a), pp. 37-46.

202.

Key Words:

Key Words: methods, ,

(8:

Key Words: methods, signatures.

OKA-88

PIE-85a J.P.. D.A. Rutowski "Modular Design of Information Encipherment for Computer Systems." Computers & Security September 1985,

Pieprzyk,

,

pp. 211-218.

PAT-87

Okamoto, E. "Substantial Number of Cryptographic Keys and Its Application to Encryption Design," Proc. Eurocrypt '88 Davos, 1988, (8: GUN-89),

Patterson,

W.

Mathematical Cryptology for Computer Scientists and

,

Mathematicians Rowman «fe Littlefield, Totowa, NJ. 1987. ,

pp. 361-373

Key Words: book, Key Words: methods,

public-

key.

keys,

management.

,

Linz, 1985, (8: PIC-86), pp. 73-78.

keys,

design.

8-20

theory.

Key Words: methods,

design.

POM-88

PIE-85b Pieprzyk,

QUI-87

C,

Pomerance,

J.P.,

DA.

Rutkowski "Design of Public Key Cryptosystems Using Idempotent Elements," Computers & Security

Advances

December 1985,

Springer.

(Ed.)

Quisquater.

in Cryptology:

Crypto '87 Santa Barbara,

1988. Lecture Notes in

CA,

for Public-Key Systems," Proc. .

1987, 203-208.

Computer Science No. 293.

pp. 297-308.

New

design, public-

key.

Key Words:

York. 1988.

QUI-89 Quisquater,

POR-84

Piper, F.,

and M. Walker

"Linear Ciphers and

Cryptology Vol. 1, No. 1989. pp. 185-188. ,

Key Words: methods,

J.

3,

theory.

J.,

and

Delescaille

"How Easy

Porter. S.

Is Collision

Search? New Results and Applications to DES," Proc. Crypto '89 Santa Barbara,

"Cryptology and Nimiber Sequences: Pseudorandom,

Spreads," Journal of

public -key, keys.

proceedings,

general.

PIP-89

POM-88), pp.

(8:

Key Words: Key Words:

Keys

Proceedings of Crypto '87 Santa Barbara. CA. August ,

.

J.-J.

"Secret Distribution of

Random, and Perfectly Random," Computers &

,

CA, 1989

Security . February 1984. pp. 43-44.

(8:

BRA-89).

Key Words: DES, methods, design.

Key Words:

POE-85 Poet, R.

algorithms,

QUI-89a

theory.

"The Design of SpecialPurpose Hardware to Factor Large Integers," Computer Physics Communications ,

1985, pp. 337-341.

Key Words:

analysis,

hardware.

Quisquater, Preneel. B.. et

al.

"A Chosen Text Attack on

the

Modified Cryptographic Checksum Algorithm of Cohen and Huang," Proc. Crypto '89 Santa Barbara. CA. 1989. (8: BRA-89).

Verification Scheme," Proc. Crypto '89 Santa Barbara, CA. 1989 (8: BRA-89). ,

Key Words:

verification,

QUI-89b

Pomerance,

C,

et al.,

Ideas for Factoring

Large Integers," Proc. Crypto '83 Santa Barbara, CA, .

1983,

and K.Vedder

signature.

,

POM-83 "New

J.-J.,

"A Signature with Shared

PRE-89

(8:

CHA-84b), pp. 81-

86.

Key Words:

analysis,

Key Words:

Quisquater,

analysis,

Advances

checksum.

Proctor, N.

"A Self-Synchronizing

Computer Science, Springer-

Cascaded Cipher System with

Veriag,

,

(8:

Pomerance, C. "The Quadratic Sieve Factoring Algorithm," Proc. Eurocrypt '84 . Paris. (8:

BET-85). pp. 169-182.

Key Words: algorithms.

analysis,

New

York, 1989.

Dynamic Control of Error ,

POM-85

(Ed.)

Proceedings of Eurocrypt-89 Houthalen, Belgium, April 1013, 1989, Lecture Notes in

PRO-84

Propagation," Proc. Crypto '84 Santa Barbara, CA, 1984,

algorithms.

J.-J.,

in Cryptology:

BLA-84a), pp. 174-190.

Key Words: methods,

Key Words:

proceedings,

gneral.

RAO-84

design.

QUI-85 J.-J., Y. Desmedt, and M. Davio 'The Importance of 'Good'

Quisquater,

Key Scheduling Schemes (How to Make a Secure DES Scheme with ?)," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 537-542. .

Key Words: DES. methods,

Rao, T.R.N. "Joint Encryption and Error Correction Schemes," Proc., 11th Intern. Symp. on Arch.,

May

Comp.

1984.

Key Words: methods,

codes.

RAO-86

Rao, T.R.N., and K.-H. Nam "Private-Key Algebraic -Coded Cryptosystems," Proc. Crypto '86 . Santa Barbara, CA, 1986, (8:

ODL-87), pp. 35-48.

design.

Key Words: methods,

8-21

codes.

RAO-87

SAL-88

RIV-84

Rao. T.R.N.

Rivest, R.L.. and A.

"On

"How

Struik-Tilburg

Cryptanalysis of

Rao-Nam

Scheme," Proc. Crypto '87

CA.

Santa Barbara,

POM-88).

to

Shamir

Eavesdropper," .

1987. (8:

Salomaa, A. "A Public-Key Cryptosystem Based on Language Theory,"

Expose an

Communications of

the

ACM

.

&

Computers

Security

.

April 1984. pp. 393-395.

February 1988. pp. 83-87.

Key Words:

Key Words: methods,

pp. 458-461.

Key Words:

analysis, threat,

SCH-84

methods, case.

RUB-81

RAO-89

Rao. T.R.N.. and K.H. Nam "Private-Key Algebraic-Code Encryptions,"

theory.

methods.

analysis,

IEEE

Trans, on

Inform. Theory , July 1989, pp. 829-833. codes.

,

126.

Key Words: RSA. Key Words:

Key Words: methods,

W. Alexi "RSA-bits are 0.5 -i- e Secure," Proc. Eurocrypt '84 Paris, 1984. (8: BET-85). pp. 113Schnorr, CP., and

Rubin. F. "Decrypting a Stream Cipher Based on J-K FHp-Flops." Cryptologia, January 1981. pp. 51-57.

analysis,

theory.

analysis,

methods.

SEB-89

RUB-87

REE-84

Seberry,

Reeds, J.A., and J. Manferdelli "DES Has No Per Round Linear Factors," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 377-

Rubin. F. "Foiling an Exhaustive KeySearch Attack." Cryptologia. April 1987. pp. 102-107

389

methods.

and

J.,

to

J.

An

Cryptography:

Computer Security

Hall,

New

Key Words:

,

Prentice-

York, 1989

Key Words: book,

,

Pieprzyk Introduction

general.

analysis,

SGA-83 Sgarro, A.

Key Words: DES.

analysis,

RUE-86

"Error Probabilities for Simple

Rueppel. R. Analysis and Design of Stream Ciphers Springer

design.

Rrr-81

,

R.R. "Data Encryption Basics and the Cipher Feedback Method," Telecommunications Jxme Ritts,

Verlag,

New

Key Words: methods, RIV-82 Rivest, R.L.. ar

analysis,

SGA-84 Sgarro,A.

Rueppel, R.

"Equivocations for

"Key Agreements Based on

Homophonic

Function Composition." Proc. Eurocrypt '88 Davos, 1988,

Eurocrypt '84 Paris, 1984,

(8:

GUN-89),

Technique." Proc. Crypto '82 , Santa Barbara. CA. 1982. (8: CHA-83b). pp. 145-163.

Key Words: methods, design, random.

Ciphers," Proc. ,

(8:

BET-85), pp. 51-61.

pp. 3-10.

Key Words: methods,

A.T. Sherman

"Randomized Encryption

analysis,

theory.

design.

.

d

.

1983. pp. 190-198.

Key Words: methods, Key Words: book,

RUE-88 theory.

IEEE

Trans, on Inform. Theory

York, 1986.

,

1981, pp. 39-44.

Substitution Ciphers,"

Key Words: methods,

theory.

keys.

SHA-80

RUG-84

Shamir, A.

Ruggiu, G. "Cryptology and Complexity Theories," Proc. Eurocrypt 'S4, Paris, 1984, (8:

BET-85),

"The Cryptographic Security of

Compact Knapsacks," Proc. 1980 IEEE Symp. Sec. & Privacy

.

(5:

IEE-80), pp. 94-98

pp. 3-9.

Key Words: Key Words: methods, complexity.

8-22

knapsack.

analysis,

SHA-80 Shamir, A.„and

"On

R E.

"Correlation-Immunity of Nonlinear Combining

Merkle-Hellman Cryptographic Systems," Trans, on Inform.

Functions for Cryptographic

IEEE

May

,

Simmons,

Siegenthaler, T.

the Security of the

Theory

SIM -82

SIE-84 Zippel

IEEE

Applications,"

1980, pp. 339-

Inform. Theory

,

Trans, of

September

1984, pp. 776-780.

340.

G.J., and D. Holdridge "Forward Search as a Cryptanalytic Tool Against Public Key Privacy Channel," Proc. 1982 IEEE Symp. Sec.

&

Privacy

(5:

,

IEE-82), pp.

117-128.

Key Words:

Key Words:

analysis,

knapsack.

algorithms,

Key Words: analysis,

theory.

public-

key.

SHA-81

SIF,-85

Shamir, A., R.L. Rivest,

Siegenthaler, T.

and L. Adleman "Mental Poker," in Klamer, D.E. (Ed). Mathematical Gardner Wadsworth, NY,

"Decrypting a Class of Sream Ciphers Using Ciphertext Only," IEEE Trans, on

SIM-82a Simmons, G.J. "A Game Theory Model of Digital Message

Computers January 1985, pp.

Authentication," Congressus

1981, pp. 37-43.

81-85.

Numerantium 1982,

,

,

,

pp. 413-

424.

Key Words: methods,

Key Words:

protocols.

methods.

analysis,

Key Words:

authentication,

models.

SHA-83

SIM-80 Simmons, G.J. "Secure Communications

Shamir, A. "On Generation of Computationally Strong

in

the Presence of Pervasive

Pseudo-'^andom Sequences," Trans, on Computer Systems May 1983, pp. 38-

ACM

,

Deceit," Proc. 1980

&

Symp. Sec.

IEEE

Privacy

,

(5:

Key Words:

therats,

G.J.

"The Prisoners' Problem and the Subliminal Channel," Proc. Crypto '83 Santa Barbara, ,

CA,

IEE-80), pp. 84-93.

1983, 51-67.

44.

Key Words:

SIM-83 Simmons,

(8:

methods.

Key Words:

algorithms,

SIM-81 Simmons, G.J. "A System for Point-of-Sale

random.

SHA-84

CHA-84b), pp.

SIM-83a Simmons,

analysis, methods.

G.J.

Shamir, A.

or Access, User Authntication

"Verification of Treaty

"A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Trans, of Liform. Theory September 1984, pp. 525-530.

and Identification," Proc. Crypto '81 Santa Barbara,

Compliance Revisited," Proc. 1983 IEEE Symp. Sec. &

CA, 1981,

Privacy .

,

(8:

GER-82). pp.

31-37.

(5:

IEE-83a), pp. 61-

66.

,

Key Words:

authentication.

Key Words:

verification,

methods.

Key Words:

SIM-81 a Simmons, G.J. "Half a Loaf Is Better than None: Some Novel Message

analysis,

algorithm, knapsack.

SHA-84a Shamir, A.

Integrity Problems," Proc.

'Identity-Based

1981 IEEE Symp. Sec. Privacy (5: IEE-81), pp. 65-

&

Cryptosystems and Signature Schemes," Proc. Crypto '84 Santa Barbara, CA. 1984, (8: ,

BLA-84a), pp. 45-53.

,

SIM-84 Simmons,

G.J.

"Authentication Theory/Coding Theory," Proc. Crypto '84 ,

Santa Barbara,

CA,

1984, BLA-84a), pp. 411-431.

(8:

69.

Key Words: Key Words:

authentication.

Key Words: methods, signatures.

8-23

authentication,

codes, theory.

SIM-84a Simmons, GJ. "The Subliminal Channel and Digital Signatures," Proc. Eurocrypt '84 , Paris. 1984. (8:

BET-85). pp. 364-378.

Key Words:

theory,

SIM-87a Simmons. G.J. "A Natural Taxonomy

SIM-89a Simmons,

Digital Information

Verifiable Proof of Identity

Receipts,"

and Unforgeable Transaction

.

Barbara,

CA.

88). pp.

269-288

1987. (8:

POM-

Key Words:

A

Areas pp.

^

authentication,

in

IEEE J. Selected Comm., May 1989,

435447.

Key Words: methods, protocols.

theory.

Simmons. G.J. "Message Authentication: Game on Hypergraj^." Congressus Numerantium

G.J.

Protocol to Provide

Authentication Schemes." Proc. Crypto '87 Santa

signaturtes

SIM -84b

"A

for

SLO-82

SIM-88 Sinunons. G.J. "Authentication Codes that

Sloane, N.Jj\.

1984, pp. 161-192.

Permit Arbitration,"

Cryptology, Part

Key Words: models,

Congessus Numerantium March 1988. pp. 275-290.

Cryptologia, April 1982, pp. 128-153.

Key Words:

Key Words: methods,

,

.

"Error-Correcting

Codes and 1,"

authentication.

SIM-85 Simmons, G.J. "A Secure SubUminal Channel

(?)" Proc.

codes.

SLO-82a

SIM -88a

Crypto

'85 , Santa Barbara,

authentication,

codes.

"How

CA,

Sloane,

Simmons,

N.JA.

"Error-Correcting Codes and

G.J.

to (Really)

Cryptology, Part 2,"

Share a

1985, (8: WIL-86), pp. 33-

Secret," Proc. Crypto '88 ,

41.

Santa Barbara, CA, 1988

Cryptologia, July 1982, pp. (8:

258-278.

GOL-89b).

Key Words: methods,

Key Words: methods,

theory.

Key Words: methods, SIM-85a Simmons,

"How

protocols.

Broadcast a Secret," Proc. 1985 IEEE Symp. Sec. Privacy (5: IEE-85), pp. 108-113.

&

.

SIM-88b Simmons.

G.J..

and

Multiplying Channel in a Private

Communication

G.B. Purdy "Zero-Knowledge Proofs of Identity and Veracity of

Channel," Proc. Eurocrypt '84, Paris, 1984, (8: BET-85), 339-

Transaction Receipts." Proc.

348.

Key Words: methods,

Eurocrypt '88 . Davos, 1988,

protocols.

(8:

GUN-89).

Key Words:

SIM-86 Simmons,

SME-84 Smeets, B.J.M. "On the Use of the Binary

G.J.

to (Selectively)

codes.

pp. 35.

protocols, zero.

Key Words: methods,

design.

SME-85 Smeets, B.

G.J.

"Cryptology." Encyclopedia

"A Comment on

SIM -89

Niedereiter's

Britannica, Inc., Chigaco. IL,

"Prepositioned Shared Secret

Public-Key Cryptosystem," Proc. Eurocrypt '85 Linz,

1986, pp. 913-924B.

and/or Shared Control

1985,

Key Words: methods,

Schemes," Proc. Eurocrypt '89. Houthalen 1989, (8:

Key Words:

general.

QUI-89).

key.

Britannica Encyclopaedia ,

Proc. Crypto '87

Barbara.

CA,

.

G.J.

,

SIM-87 Simmons. G.J. "An Impersonation-Proof Identity Verification

Simmons,

Key Words: methods, protocols.

analysis, public-

SPE-83 Spencer, M.E., and

"A Layered Broadcast

Scheme."

Cryptographic System," Proc. Crypto '83, Santa Barbara,

POM-

CA,

1983, 157-170.

88), pp. 211-215.

Key Words:

PIC-86), pp. 40-42.

S.E. Tavares

Santa

1987, (8:

,

(8:

authentication,

(8:

CHA-84b), pp.

Key Words: methods,

case.

8-24

case.

TAN-87

STI-87 Stinson, D.R.,

and

SA. Vanstone "A Combinatorial Approach Threshold Schemes," Proc. Crypto '87 , Santa Barbara, to

CA, 1987,

(8:

VAN-85

Tanaka, H.

POM-88),

pp.

"A

van Tilborg.

Realization

Scheme

for the

Identity-Based Cryptosystem." Proc. Crypto '87 Santa .

CA. 1987,

Barbara,

POM-

(8:

88). pp. 340-349.

Key

Encryption and Error ProbabiHty in Cryptanalysis," Proc. Crypto '85 Santa Barbara, CA. 1985. (8: WEL86), pp. 489-513. ,

330-339.

Key Words: methods, Key Words: methods,

and

J.,

D.E. Boekee "Divergence Bounds on

design.

keys.

TED-84 STI-87a

Key Words: methods,

Tedrick, T.

keys,

theory.

"A Construction of

"Fair Exchange of Secrets," Proc. Crypto '84 Santa

Authentication/Secrecy Codes

Barbara,

from Certain Combinatorial Designs," Proc. Crypto '87

84a). pp. 434-438.

R. Peralta

Key Words: methods,

Show

protocols.

Public Key," Proc. Crypto '87

Stinson, D.R.

VAN-87

,

CA. 1984.

BLA-

(8:

CA,

1987.

(8:

POM-88), pp. 255-366.

Santa Barbara,

Key Words:

authentication,

codes, design, case.

STI-88

and

J.,

"A Simple and Secure Way the VaUdity of Your

,

Santa Barbara,

van de Graaf,

CA,

1987, POM-88), pp. 128-134.

TOM-86 Tompa, M.. and H. Woll "How to Share a Secret With

Key Words: methods,

Cheaters," Proc. Crypto '86

key.

,

to

public-

Stinson, D.R.

Santa Barbara, CA, 1986,

"Some Constructions and Boimds for Authentication

ODL-87), pp. 261-265.

Codes," Journal of Cryptology Vol. 1, No. 1988, pp. 37-64.

Key Words: methods,

An

protocols.

Kluwer Academic PubUshers, NorweU. MA. 1988.

,

1,

(8:

VAN-88 van Tilborg,

J.

Introduction to Cryptology

TSU-89

Key Words:

authentication,

Tsujii, S.,

Key Words: book,

and T. Itoh

Based on Discrete Logarithm Problem," IEEE Journal on

STI-88a

Selected Areas in

Stinson, D.R.

"A Construction

Communic ations May

for

.

Authentication/Secrecy Codes

1989,

pp. 467-473.

.

Key Words: RSA,

VAL-88

authentication,

codes, design, theory.

Struik. R.

"How

and

,

J.

van

B., et al.

Break Okamoto's Cryptosystem by Reducing

(8:

to

GUN-89),

pp. 281-291.

Tilburg

"The Rao-Nam Scheme in

Key Words:

Insecure Against a Chosen

methods.

analysis,

POM-88).

Varadharajan, V.

'Trapdoor Rings and Their in Cryptography," Proc. Crypto '85 Santa Barbara, CA, 1985, (8: WIL-86), pp. 369-395.

Use

,

theory.

WAG -84

,

(8:

VAR-85a

Key Words: methods,

Plaintext Attack," Proc.

Crypto '87 Santa Barbara,

CA, 1987,

theory,

case.

Lattice Bases," Proc. Eurocrvpt '88 , Davos, 1988,

STR-87

"Extension of RSA Cryptosystems to Matrix Rings," Cryptologia April

case.

2,

VaUee,

Key Words:

Varadharajan, V.

,

Key Words: methods,

Designs," Journal of

VAR-85

1985, pp. 140-153.

from Certain Combinatorial Cryptology Vol. 1, No. 1988, pp. 119-127.

general.

"An ID-Based Cryptosystem

theory design, codes.

pp.

Wagner, N.R.

445-457.

"A Public-Key Cryptosystem

Key Words:

Based on the Word Problem,"

analysis, case.

Proc. Crypto '84

Barbara,

,

Santa

CA, 1984,

(8:

BLA-

84a), pp. 19-36.

Key Words: methods,

8-25

,

(8:

case.

,

WAG-84a

WIL-82

WIN-83 M.

Wagner, N.

WiUett,

"Search for Public-Key Cryptosy stems," Proc. Crypto '84 Santa Barbara, CA, 1984, (8: BLA-84a), pp. 91-

on Public Key Cryptosy stems," Computer

,

"A

Tutorial

Security

,

&

January 1982, pp.

Wintemitz, R.S. "Producing a One-Way Hash Function from DES," Proc. Crypto '83 Santa Barbara, ,

CA, 1983,

72-79.

(8:

CHA-84b), pp.

203-207.

98.

Key Words: methods,

Key Words: methods,

public-

public-

Key Words: DES, methods,

key.

design.

key.

WIL-84

WAG-85

WIN-84

Williams, H.C.

Wagner, N.R., P.S. and M.R. Cain

Putter,

"Some Public-Key CryptoFunctions As Intractable as

"Using Algorithms as Keys Stream Ciphers," Proc. Eurocrypt '85 Linz, 1985, (8: PIC-86), pp. 149-155.

Factorization," Proc. Crypto '84 , Santa Barbara, CA, 1984,

Key Words: methods,

key.

in

,

(8:

BLA-84a), pp. 66-70.

Key Words: methods, keys.

WAG-86

public-

"Large-Scale Randomization

Techniques," Proc. Crypto '86 Santa Barbara, CA, 1986, (8: ODL-87), pp. 393,

CA, 1985,

(5:

IEEE Symp. Sec

Santa Barbara,

,

(8:

WIL-86), pp.

404.

358-368.

Key Words: methods,

Key Words: methods,

Key Words: DES, methods,

random.

key.

Wintemitz, R., and

M. Hellman "Chosen-Key Attacks on a Block Cipher," Cryptologia

,

CA,

Barbara,

1985, (8:

WIL-

WOL-85 Wolfram, S. "Cryptography with Cellular Automata," Proc. Crypto '85

Williams, H. (Ed.) in Cryptology, Proceedings of Crypto '85 ,

Santa Barbara, CA, 1985, WIL-86), pp. 429-432.

Santa Barbara, CA, August 1985, Lecture Notes in

Key Words: methods,

Advances

Computer Science, No. 218,

86), pp. 523-534.

Springer- Verlag,

Key Words: DES,

analysis,

New

York,

proceedings,

general.

Publication,"

Security

,

Computers

&

Jan. 1983, pp. 41-

48.

case.

WUN-83 "Factoring

Key Words: Weingarten, F.W. "Controlling Cryptographic

,

(8:

Wunderlich, M.C.

1986

design.

WEI-83

analysis, methods.

public-

WIL-86

Webster, A.F., and S.E. Tavares "On the Design of S -Boxes," Proc. Crypto '85 Santa

,

January 1987, pp. 16-20.

Key Words:

WEB-85

,

IEE-84), pp. 121-126.

WIN-87

WiUiams, H.C. "An M3 PubUc-Key Encryption Scheme," Proc. Crypto '85

Proc. 1984

design.

WIL-85

Wagner, N.

Wintemitz, R.S. "A Secure One-Way Hash Function Built from DES,"

Numbers on

the

Massively Parallel Computer," Proc. Crypto '83 Santa ,

Barbara,

WIN-82

CA, 1983,

(8:

CIL\-

84b), pp. 87-102.

Wintemitz, R.S. "Security of a Keystream with Secret Initial Value," Proc. Crypto '82 Santa Barbara,

Key Words:

analysis, methods,

hardware.

,

Key Words:

policy, research.

CA, 1982,

(8:

CHA-83b), pp.

WIL-80 Williams, H.C.

"A Modification of the RSA Public-Key Cryptosystem,"

WUN-83 a WunderUch, M.C. "Recent Advances

133-137.

Key Words:

analysis,

methods.

in the

Design and Implementation of Large Integer Factorization Algorithms," Proc. 1983 IEEE

&

IEEE

Privacy Symp. Sec. IEE-83a), pp. 67-71.

Trans, on Inform. Theory November 1980, pp. ,

726-729.

Key Words:

Key Words: RSA, methods,

algorithms.

design.

8-26

analysis,

,

(5:

YAO-82a

YAC-89

YUN-84 Yung, M.

Yacobi, Y., and Z. Shmuley

Yao, A.C.

"On Key

"Protocol for Secure

"Cryptoprotocols: Subscription

Computation," Proc, 23d

to a Public

Distribution

Systems," Proc. Crypto '89

Santa Barbara, CA. 1989

.

IEEE Symposium on

(8:

Foundations of Computer Science November 1982, pp. 160-164.

BRA-89).

.

Key Words: methods,

keys.

Key, the Secret Blocking and die Multi-Player Mental Poker Game," Proc. Crypto '84 Santa Barbara, ,

CA. 1984.

(8:

BLA-84a), pp.

439-453.

YAG-85

Key Words: methods,

Yagisawa,

M.

"A New Method

Key Words: methods,

protocols. for

protocols.

Realizing Public-Key Cryptosy stems," Cryptologia. October 1985, pp. 360-371.

Key Words: methods,

public-

YAO-86 Yao. A.C. "How to Generate and Exchange Secrets." Proc, 27th

IEEE Symposium on Foimdations of Computer Science October 1986, pp. 162-167.

key.

,

YAM-86 Yamamoto, H. "On Secret Sharing Communication Systems with

Two IEEE

May

Key Words: methods,

Zheng, Y., T. Matsumoto, and H. Imai "On the Construction of Block Ciphers and Not Relying on

Any Unproved

Hypotheses,"

Proc Crypto '89 Santa Barbara, CA, 1989 (8: BRA,

89).

protocols.

Key Words: methods,

or Three Channels,"

Trans. Inform. Theory

ZHE-89

,

Yu. K.W.. and T.L. Yu "Data Encryption Based on

1986.

Key Words: methods, protocols.

design.

YUK-89 ZOR-87 Zorbette, G.

"Breaking the Enemy's Code,"

Time Reversal Algorithms." The Computer Journal (U.K.).

IEEE Spectrum September

June 1989. pp. 241-245.

1987, pp. 47-51.

Key Words: methods,

Key Words:

.

.

YAO-82 Yao, A.C. "Theory and Applications of Trapdoor Functions," Proc,

algorithms.

23d IEEE Symposium on Foundations of Comp. Science , November 1982, pp. 80-91.

Key Words: methods,

theory.

8-27

analysis, methods.

9.

Privacy

This section cites publications on the problem of protecting information privacy in computer-based record-keeping systems, descriptions of the privacy problem, legislative measures in the United States and internationally, privacy aspects of international transborder data flows (TDF), and problems in specific application areas (e.g., credit reporting, criminal justice, employment, health care). ABA-82

ADA-84

on Privacy: Law, Ethics, and Technology. National Symposium on Invited Papers

Personal Privacy and Information Technology

,

American Bar Association and AFIPS, Washington. DC,

AUE-83

Adams. J.M. "Canada's Future TDF Policy: Reconciling Free Flow of Information with National Sovereignty," Transnational Data Report. Oct/Nov. 1983,

Key Words: TDF, proceedings,

Adler, A. Litigation

Symposium on Personal

Freedom of Information Act and Privacy Act Center for

Under

the Federal

Key Words: management, records.

laws,

in Africa,"

Transnational Data Report Aug/Sept. 1984, pp. 325-326.

Information Privacy,"

Computers

and Crime Control University Press of America, Lanham, MD, 1984.

1985, pp. 103-107.

Justice, Privacy,

Under the Federal Freedom of Information Act and Privacy Act, American

Key Words:

laws, criminal,

BAS-84 Basche,

AUen, F.A. "1984 and the Eclipse of Private Worlds," Michigan Quarterly Review Fall 1983. ,

laws,

Managing

The Impact on

International

Business, Report No. 852,

Conference Board,

New

Key Words: TDF. foreign.

"Privacy Rights in Personal Information," Annual Survey

of American

Law

,

June 1987.

pp. 495-666.

Key Words:

laws, protection.

9-1

The

York.

1984.

ASA-87 Key Words: FOI, PA.

Transmission:

analysis, general.

Washington, DC, 1989.

use.

J.R., Jr.

Regulating International Data

Key Words:

Civil Liberties Union,

Key Words: managemnt. records.

ALL-83

Litigation

Security , June

,

guidelines,

ACL-89

&

Albanese. S.

records, use. foreign, laws.

I.L.

"Professional ResponsibiUty for

,

Key Words:

AUE-85 Auerbach,

ALB-84

Laws

.

Washington, DC. 1985.

general.

Abass. O. "Guidelines for Informatics

Information Privacy." Proc. fflP/Sec. '84 Toronto, 1984, (2: FIN-85), pp. 3-10.

,

use.

ABA-84

I.L.

National Security Studies,

Key Words: FOI, PA. proceedings,

laws, foreign.

.

35+

"Professional Responsibility for

Report on a National

Key Words:

Key Words:

Auerbach.

ADL-85

.

p.

AUE-84

foreign.

Privacy and Information Technology American Bar Association and AFIPS. Washington, DC. 1982.

March 1983.

policy,

general.

ABA-82a

Regulation."

Telecommunications Policy

pp. 405-411.

1982.

Key Words:

Auerbach. L. "Privacy and Canadian Telecommunication

policy,

BEM-82

BAS-89 Bass, G., and D. Plocher

"Strengthening Federal

Information Policy: Opportunities and Realities at

0MB," Journal

Software

Summer

,

Law

BIG-86

Bemer, R.W. "Incorrect Data and Social Harm," Computer Security Journal Winter 1982, pp. 51-

Bigelow, R. "Computers and Privacy

— An

American Perspective,"

56.

Information Age (U.K.), July 1986, pp. 134-140.

Key Words: management,

Key Words:

.

.

1989, pp.

413-459.

rights, laws.

threats.

Key Words:

BIN-83

policy,

BEQ-81

government.

Bing,

BEC-84

The Cashless

Becker, a

New

Sons.

Society:

Crossroads

at the

J.

Information Technology and

J.

"New Technology and

Bequai, A.

New

J.

,

EFTS

Wiley

&

York, 1981.

the

Law: Likely Impact and Future Trends," Computers & Law ,

February 1983, pp. 2-6.

International Order ,

Transnational Data Reporting Service, Springfield,

Key Words:

book, general.

VA,

Key Words:

rights, laws,

records.

BER-87

1984.

Berman.

Key Words: book,

general.

BEE-84

BIN-83a

J.J.

"National Security vs. Access

Bing,

to

"Computers and

Computer Databases: A New Threat to Freedom of

Beer, B.

Information," Software

"Legal Aspects of Automatic

Journal

Trade Data Exchange," Transnational Data Report,

15.

Jan/Febr., 1984, pp. 52-57.

Key Words: FOI,

,

Law

Winter 1987, pp.

1-

Law — The

Regulatory Envirorunent of Information Services," Proc. mP/Sec. '83 Stockholm, 1983, (2: FAK-83), pp. 253,

264. threat,

Key Words:

policy.

Key Words: TDF,

J.,

laws, case.

requirements,

rights.

BER-89 BEL-83

Berkvens,

Beling, C.T.

'Transborder Data Flow: International Privacy Protection and Free

Flow of

BIN-86

J.

"Dutch Banks' Privacy Code of Conduct," Transnational Data Report, June/July 1988, pp. 12-17.

Information," Boston College

&

International

Law Review

,

Computer

Spring 1983,

Key Words:

policy, foreign,

Key Words: TDF,

policy,

laws.

BEL-83a al.

"Mass-Informatics and Their

Berman, J.J. "The Right to Know: Public Access to Electronic Public Journal .

Summer

Law

1989, pp.

491-530.

proceedings,

J., and H.H. Bruggeman "The Personal Model of Data," Computers & Security

Biskup,

,

Key Words:

Key Words: BER-89b Berman,

A

J.,

and

J.

Goldman

Federal Right of

Information Privacy:

Need

for

The

Reform Benton ,

Foundation, Washington, 1989.

Key Words: book, PA, general.

pp. 575-597.

rights, records.

83. Proc. IFIP Congr. Paris .

North-Holland. Amsterdam, 1983.

BIS-88

December 1988,

on Every-Day

Life," Information Processing

requirements,

laws.

Information," Software

Belkin, N. et

general.

Information Age (U.K.), April 1986, pp. 85-94.

Key Words: BER-89a

Key Words:

J.

"Beyond 1984: The Law and Information Technology in Tomorrow's Society,"

case.

pp. 591-624.

Implications

Bing,

DC,

records, general.

A

BIS-89

BUR-84b

Biskup,

CHA-84a

Burton, R.P.. and

J.

"Protection of Privacy and Confidentiality in Medical

Information Systems:

Privacy

Problems and Guidelines,"

Deceased Persons," Transnational Data Report,

Proc.

m WG

11.3 (Data

Base) Workshop

(6:

.

in-89),

Laws on

J., and F. Chamoux "French Data Protection: The First Five Years," Transnational Data Report, April/May 1984, pp. 163-166.

Chamoux,

R.D. Malmrose "The Effects of Recent Rights of

June/July 1984, pp. 237-242.

Key Words:

laws, foreign.

1989.

Key Words:

Key Words:

laws, case.

protection,

BUR-85

medical.

BRA-84 Branscomb, A.W. "The Legal Infrastructure

for

Global Information Flows,"

Shut: Enhancing the

Burgess, B.C.

Right to Know and Right to Privacy Canadian House of

"Restrictions in Data Transfer

Commons, Canadinan

and Use," Transnational Data

Government Printing, Ottawa, March 1987.

,

Report. June 1985, pp. 217219.

Transnational Data Report, June/July 1984. pp. 247-251.

CHC-87 Open and

Key Words: Key Words: TDF,

laws, rights,

foreign.

requirements.

Key Words: TDF,

CHE-84

laws,

BUR-87

design.

BRO-84 Brown, R.W.

"A Model Code

for

Burton, R.P., and

Cheah, C.W. "An Econometric Analysis of

R.D. Malmrose "Impact of Privacy Laws on

Transnational Data Report

Religious Organizations,"

December 1984,

Transnational Commerce?,"

Transnational Data Report.

Transnational Data Report,

June 1987. pp. 5-9.

March 1984,

regulation,

Flow

A

CHP-87

New

Information Technology and the Erosion of Privacy Report

and Data Protection

of the Commission on Humanities and Public Affairs,

Information and Communication Technologies

Plan For Action The ,

Business Roundtable, York, January 1985.

New

analysis,

laws, case.

CEC-84 International Information

,

pp. 475-479

case.

TDF.

BRT-85

Regulation,"

Key Words: TDF,

pp. 117-124.

Key Words:

Key Words:

TDF

,

Information Technology Task Force, Council of European

,

Claremont Graduate School, Claremont.

CA,

1987.

Communities, Brussels, 1984.

Key Words: TDF,

Key Words:

guidelines.

Key Words:

BUR-84 Bumham, D. The Rise of State ,

Key Words:

requirements,

rights.

rights.

CLA-81 the

Computer

Random House,

Westminster,

requirements,

MD,

1984

threats, general.

CHA-83

Clariana, G.G.

'TDF,

DaU

Chavda, H. "Data Protection in the

International

Computing Industry—

Transnational Data Report,

Survey," Information

Age

Protection and

Law,"

July/August 1981, pp. 31-35.

(UK), October 1983, pp. 211-

BUR-84a

Key Words: TDF,

221.

Burkert, H.

"Information Law Problems For the Eighties," Transnational Data Report, Aug/Sept. 1984, pp. 331-336.

Key Words: requirements.

rights,

foreign.

laws,

Key Words:

protection, case.

CLA-88

CHA-84

Clarke, R.A.

Chaum. D. "A New Paradigm

"Information Technology and for

Dataveillance,"

Individuals in the Information

Communications of

Age," Proc. 1984 IEEE Symp. on Sec. & Privacy (5: lEE-

May

the

ACM

1988, pp. 498-512.

,

84), pp. 99-103.

Key Words: rights.

Key Words:

protection, rights.

9-3

surveillance,

,

CLU-88

COE-86

COL-85

Clukey, L.

Protection of Personal Data

"The Electronic Communications Privacy Act of 1986: The Imact on Software Communication

Used

Technologies," Software

for Purposes of Direct

Marketing Reconunendation R(85)20, Council of Europe, ,

Strassbourg, France, 1986.

Law

Journal. Spring 1988, pp.

Key Words:

243-263.

foreign private, records.

Key Words:

analysis, laws.

protection,

COE-86a Used

Purposes Recommendation R(88)l, Council of Europe, Strassbourg, France, 1986.

Europe, Strassbourg, France,

Key Words:

28 January 1981.

foreign, soci^, records.

jwotection,

Challenges to the U.S.

European Community: Data Protection Laws," N.Y.U. Journal on International Law and Politics Summer 1985, .

pp. 893-947. foreign,

analysis.

for Social Security

Convention on Protection of Individuals with Regard to Automatic Processing of Personal Data, Council of

Key Words:

"New

Multinational Corporations in

Key Words: TDF.

Protection of Personal Data

COE-81

Cole, P.E.

,

protection,

COE-88

COM-83 "Computerized Bank Accounts, Credit Cards, and George Orwell's 1984," Computers and

People March/April 1983, pp. ,

27-1-

Key Words:

threats, rights.

Regulating the Use of

foreign.

Personal Data in the Police

COE-81 a

Sector

,

Recommendation

CON-80 International Data

Flow

,

Regulations for Automated

R(87)15, Council of Europe,

Hearings Before Committee on

Medical Data Banks

Strassbourg, France, 1988.

Government Operations, House

Coimcil of Europ>e,

Key Words:

Strassbourg, France, 1981.

foreign, criminal, records.

of Representatives, U.S. Congress, Washington, DC, 1980.

,

Recommendation R(81)l,

Key Words:

protection,

foreign medical, records..

COE-89

Key Words: TDF,

"Protection of Personal Data

Used

COE-83 The

protection,

for

laws.

Congress.

Employment

Purposes," Coimcil of Europe

CON-80a

Recommendation No. R(89)2,

International Information

Computerized Legal

Transnational Data Report,

Flow: Forging a

Information Services , Recommendation R(83)3, Coimcil of Europe,

March 1989,

Framework House Report No. 96-1535, U.S. Congress, Washington, DC, December

Strassbourg, France, 1984.

records,

Protection of Users of

Key Words:

protection,

foreign private, records.

Key Words:

protection,

employment.

COE-89a

New

Technologies:

Challenge

COE-84

pp. 26-28.

to

A

Privacy

New

,

11, 1980.

Key Words: TDF,

Congress.

CON-83

Protection? , Council of

Oversight of Computer

Protection of Personal Data

Europe, Strassbourg, France,

Matching

Used

1989.

Mismanagement in Government Programs

and

for Scientific Research

Statistics ,

Recommendation R(83)10,

Key Words:

Council of Europe,

foreign.

requirements,

to Detect

Fraud and ,

Hearings, Senate Subcommittee

on Oversight of Government

Strassboiu'g, France, 1984.

Affairs,

Washington, DC,

1983.

Key Words:

Flow

protection,

Key Words: Congress,

foreign, statistical, social.

matching.

9-4

CON-83a

CON-87

Who

Cares About Privacy? Oversight of the Privacy Act of 1974 by Office of Management and Budget and by Congress No. 98-455,

CUL-87

Computer Matching and Privacy Act of 1987,

"Protecting Individual Privacy

Hearings, Subcommittee of

House of Representatives,

House Committee on Government Operations, U.S. Congress, Washington, DC,

U.S. Congress, Washington,

1987.

.

DC.

Shadow of a National Data Base," Capital University Law Review Fall '87. pp. 117-141. in

.

Key Words:

threats,

government

1983.

Key Words: Key Words:

Congress, PA,

DAM-83

Congress,

matching.

oversight.

CON-88

CON-83b

Operations, U.S. Congress,

Computer Matching and Privacy Act of 1988, Report 100-802. House Committee on Government OpCTations. U.S. Congress, Washington, DC,

Washington, DC, 1983.

July 27.1988.

Key Words:

Key Words:

Oversight of the Privacy Act of 1974 Hearings, House ,

Committee on Government

Danunan, U. "Auditing Data Protection" Transnational Data Report April-May 1983, pp. 161-163.

Key Words: management records.

DOC-88 Dockrill, C.

Congress, PA,

"Computer Data Banks and

Congress,

Personal Information:

matching.

oversight.

Protection Against Negligent

CON-88a

CON-85 Unauthorized Access to Individual Medical Records Hearings,

on on

The Computer Matching and ,

House Committee

Judiciary,

Subcommittee

Civil and Constitutional

Rights, U.S. Congress, Washington, DC, 1985.

Privacy Act of 1988

.

P.L.

100-503. (5 U.S.C. 552a), U.S. Congress, Washington,

DC

Key Words:

Criminal Justice Information Policy: Intelligence

Cooper, G.R., and

Computer Matching and Privacy Act of 1986 Hearings, Subcommittee on Oversight of Government Management, Senate Commitee on Government ,

R.R. Belair Privacy and the Private Employer Bureau of Justice Statistics, U.S. Department of ,

Justice.

Washington, DC,

Key Words:

Washington. DC, 1986.

employment

Congress,

Electronic Communications

Privacy Act of 1986

,

P.L.

99-508, (18 U.S.C. 2703), 1986, U.S. Congress, Washington, DC, 1986.

policy, criminal,

"Data Protection's

Many

Comp. Sec. Symposium Phoenix.

Tentacles," Proc.

COO-83 S.L. Kirk

&

Priv.

.

"Privacy, Data Protection and

AR. 1981.

Transborder Data Flows: Corporate Response," The

13-24.

Business Lawyer November 1983, pp. 33-66. ,

Key Words: TDF, case.

Key Words:

Key Words:

Donovan, T.G.

A

CON-86a

February 1985.

DON-81

guidelines,

Coombe, G.W., and

matching.

Department of Justice, Bureau of Justice Statistics. NCJ95787. Washington, DC.

rights.

1981.

Affairs, U.S. Congress,

Key Words:

and

Investigative Records , U.S.

COO-81

CON-86

protection,

DOJ-85

Congress,

protection,

medical.

Key Words: records.

1988.

matching.

Key Words:

Disclosure," Dalhousie Law Journal March 1988, pp. 546580.

Congress, laws.

policy,

(1:

Key Words:

HON-81).

pp.

laws, records,

general.

DUB-83 Dubrow. A. "Your Medical Records: How Private Are They?." California Lawyer Apr. 1983, p. 33+. .

Key Words: records.

9-5

threats, medical,

FAR-83

DUF-82 Duffy. D.J. "Privacy vs. Disclosure:

FLA-85

Famsworth, D.P.

Balancing Employee and

"Data Privacy: An American View of European

Employer Rights," Employee

Legislation," Transnational

Relations

Law

Journal

,

Data Report July/August ,

Spring 1982, pp. 594-609.

1983, pp. 285-290.

Key Words:

Key Words:

Flaherty, D.H.

Protecting Privacy in

Way

laws, foreign.

,

Knowledge Industry Publicat., White Plains, NY. 1985.

Key Words: book, rights,

Two-

Electronic Services

rights,

laws.

employment.

FLA-85a

FIS-80 Fishman, W.L.

EAT-86

Flaherty. D.H.

Eaton, J.W.

"Introduction to Transborder

Privacy and Data Protection:

Card-Carrying Americans: Privacy, Security, and the National ID Card Debate,

Data Flow," Stanford Jotmial

An

Rowman &

Law Summer

of Intemat.

.

1980, pp. 1-26.

International BibUography.

Knowledge Industry Publicat.. White Plains. NY, 1985.

Littlefield,

Key Words: TDF.

Totowa, NJ, 1986.

policies,

Key Words: book,

general.

rights.

Key Words: book,

FLA-86

laws,

ns-81

rights.

Flaherty, D.

Fisher. J.F.

ENN-84

"Access

Ennison, T.,

to Fair Credit

Reports: Current Practices and

Jr.

"Sovereignty Considerations

Proposed Legislation."

Perspective," Transnational

American Business Law Journal FaU 1981. pp. 319-

Data Report April/May 1984,

342.

in

TDF: Developing-Country ,

pp. 175-181.

.

rights,

Societies," Science,

Technology and Human Values No. 1, 1986, pp. 1-12. ,

Key Words:

Key Words: TDF,

"Governmental Surveillance and Bureaucratic AccoimtabiUty: Data Protection Agencies in the Western

credit, laws,

Key Words:

laws, rights,

foreign.

rights.

foreign.

FLA-86a

FLA-84

EVA-81

Flaherty. D.H.

Evans, A.C. "Eiu-opean Data Protection Law," American J. of

Law

Comparative

,

Fall 1981,

pp. 571-582.

Key Words: TDF.

.

Ontario, laws, foreign,

Flaherty, D.

Nineteen Eighty-Four and After Final Report of Bellagio Conf. University of Western Ontario, London,

May

Key Words:

15, 1984.

proceedings,

"On Making Data

Protection

Effective," Transnational

Data

Report, April 1986, pp. 15-16.

Key Words:

laws, protection.

FLA-89 Flaherty, D.H.

rights.

Protecting Privacy in

EVE-80

FLA-84a

Surveillance Societies .

Everest, G.C.

Flaherty, D.H., E.H. Hanis,

University of North Carolina

"Nonxmiform Privacy Laws:

and S.P. Mitchell Privacy and Access to Government Data for

Press,

Implications at Attempts at

Uniformity," Hoffman, L.J.

An

Computers and Privacy in the Next Decade Academic Press, New York,

Bibliography Knowledge

1980, pp. 141-150.

Plains,

Key Words:

Key Words: book,

(Ed.),

,

Research:

International

Chapel

Hill,

Key Words: book,

NC,

1989.

laws,

foreign.

,

Industry Pubhcat., White

NY,

1984.

FLE-86 Fletcher, P.T.

"Current Issues in guidelines, laws.

general.

Confidentiality:

Computerized

Information Systems, Medical Records, and Patients' Rights,"

Computers & Society Summer/Fall 1986. pp. 8-18. .

Key Words:

9-6

rights, medical.

FLR-84 "Damages Under

GAO-86 the Privacy

Act of 1974: Compensation and Deterrence," Fordam Law Review March 1984, p. ,

611+.

GOT-84

Privacy Act: Federal Agencies' Implementation

Be Improved GAO/GGD-86,

107, U.S. General Accounting

DC,

Office, Washington,

Key Words: PA,

Can

August 1986.

Key Words: PA,

GRA-84 Gray, J., L.B. McSweeney, and J.C. Shaw Information Disclosure and the Multinational Corporation John Wiley & Sons, Ltd., Chichester. UK, 1984.

GAR-85

"The Vulnerability of Computerized Society," Transnational Data Report, July/August 1981. pp. 21-25.

Key Words:

Garzon, G. "Legal Framework for International Information" Transnational Data Report. March 1985, pp. 101-107.

.

Key Words:

threats, laws.

Key Words: TDF. FRE-83

,

447-449. rights, foreign.

"Computerized Medical Data

Gassman, H.P. (Ed.) Transborder Data Flows. Proceedings of 1973 OECD Conference North-

Issues," Proc. IFIP/Sec. '86 ,

Monte

Carlo, 1986, (2:

GRI-

89).

New

Key Words:

York,

records, medical.

1985.

Freedman, W.

GRE-80

The Right of Privacy in Computer Age Quorum

the

,

Books,

New

Key Words:

Greguras, F.M.

proceedings,

"Information Systems and Privacy Issues in the U.S.A.." Information Privacy (U.K.). May 1980. pp. 90-97.

general.

York, 1987

GEB-88

Key Words:

book, rights,

FUT-83 "Orwell's 1984: to the

How

Gebhardt, H.-P.

"Data Protection in Telecommunication Services," Transnational Data Report,

laws.

The

~

Privacy and Delinquency

Holland/Elsevier Science Publishing Co..

FRE-87

laws.

Grandjean, J.R.

GAS-85

,

Key Words:

TDF,

GRA-86

J.

"The Right to Be Alone in Sweden," Transnational Data Report December 1983, pp.

book.

laws,

foreign.

Freese,

FIN-

Key Words:

laws. J.

'84, Toronto, 1984, (2:

oversight,

FRE-81 Freese,

Information," Proc. IFIP/Sec. 85). pp. 29-39.

protection,

uses.

Godieb. C.C. "Equity in Access to

Close

December 1983.

Greguras. F.M.

Key Words: TDF.

protection.

"Anticipating the Impact of

EFTS on Key Words:

threats, general.

GES-82

Eligibility Verification

and

Privacy in Federal Benefit

Programs: A Delicated Balance GAO/HRD-85-22. U.S. General Accounting Office, Washington, DC,

"Report on Privacy: Who Is Watching You," U.S. News

World Report, July

1.

1985.

&

matching.

goverrunent,

Comp.

Sec.

&

Phoenix, AR, pp. 25-45.

Symp. HON-81),

Priv. (1:

.

Key Words: EFTS,

pp. 34-37.

requirements.

Key Words:

threats, rights.

GRO-82 GOL-89 Golden,

Key Words:

&

12, 1982,

,

March

Privacy

Information Practices." Proc.

Gest, T.. and P.M. Scherschel

GAO-85

rights, general.

GRE-81

June/July, 1988, pp. 18-23.

Truth?," Special Issue,

Futurist ,

Key Words:

J.S.

"Information on the Federal

Government's Electronic Databases: Is There a First

Grossman. G.S. 'Transborder Data Flow: Separating the Privacy Interests of Individuals and Corporations." Northwestem

Amendment Right of Access?," Software Law

Journal of International

Journal Winter 1989. pp. 65-

9-11.

.

.

90.

Key Words: TDF, Key Words: government, laws.

9-7

Law

and Business Spring 1982, pp.

general.

laws,

HAR-86

GUR-84

HIR-89

Harding, N.G.L

Gurry, F.

Breach of Confidence Oxford University Press, Clarendon (UK), 1984.

Key Words: book,

Hiramatsu, T. "Japan Adopts Privacy Protection Act," Transnational

Data Protection in Medicine, Proc. of a National Meeting, Oxford, England, February 1986, HMSO Pubhcations Center, London. 1986.

,

rights,

Data Report, February 1989, pp. 22-29.

Key Words:

laws.

Key Words:

HAE-84

HOF-80

medical.

Hoffman, L.J. (Ed.) Computers and Privacy in the Next Decade Academic Press.

Haeck, L.

HEL-85

'Transborder (Private) Data

Flow and

Hely, M.H., and

the International

Airlines," Transnational Data

.

New

M.T. Morrison

Report, Aug/Sept. 1984, pp.

Data Protection Act of 1984

343-345.

The Computer

Key Words:

proceedings,

general.

U.K., 1985.

policy,

HON-80

foreign.

Key Words:

laws, foreign.

HAM-84 HER-88

Hamelink, C.J. Transnational Data Flows in the Information

Age

,

Hernandez, R.T. "ECPA and Online Computer

Communic. November 1988,

Transnational Data Reporting

Privacy," Federal

Service, Springfield, Va,

Law

1984.

pp. 17-41

Key Words: TDF,

Journal ,

Key Words:

policy,

laws,

government.

foreign.

HAR-84

Catalog of Automated Front-

al.

The Road After

1984: Impact

of Technology on Society. Public Opinion Study Southern New England Telephone Company, New Haven, CT, 1984.

A

,

End

threats, rights,

,

111.

Key Words:

Techniques OAI-85-H-51, U.S. Department of Health and Human Services. Washington. DC. 1985. .

guidelines,

matching.

IBI-80 Transborder Data Flow Policies Papers Presented at IBI Conference in Rome, June 1980. Unipub, New York, 1981.

Key Words:

Privacy Begins

An Economic

Measures," Transnational Data Report. March 1984, pp. 109-

Key Words:

laws, foreign.

laws, foreign.

NY,

Key Words:

1983. policy, rights,

case.

Business Guide to Privacy and Data Protection Legislation ,

No. 384, International

Chamber of Commerce,

HIR-87 Hiramatsu, T.

Key Words:

Corporation, White

ICC-85

112.

,

pp. 133-152.

Home-IBM

Experience with Developing and Administration of Employee Privacy Practices Plains,

Hiramatsu, T. "Japan's Privacy Protection

Analysis," International

Review of Law and Economics December 1985,

at

TDF.

,

HIR-84 Hartmann, J., and S.M. Renas "Anglo-American Privacy

proceedings,

IBM-83

IBM

laws.

HAR-85

laws, foreign.

Eligibility Verification

Key Words:

Key Words:

Hondius, F.W. "Data Law in Europe," Stanford J. of International Law Summer 1980, pp. 87-

,

HHS-85

Harris, L. et

Law:

York, 1980.

,

Services, Ltd.,

Easterton, Devizes, Wilts,

Key Words: TDF,

laws, foreign.

rights, laws,

"Japan's

New

Personal Data

Data Report. October 1987, pp. 14-

Bill," Transnational

16.

Key Words:

Paris,

1985.

laws, foreign.

9-8

Key Words: TDF, laws.

guidelines,

KEN-86

ICC-85a Issues in Computing,

Telecommunications and

Kenny, J.J. (Ed.) Data Privacy & Security.

Information Policy. -No. 385,

Pergamon

International

Commerce,

Chamber of

KIR-87 Kirby,

Press, Elmsford.

The Ten Information Commandments," University of Cincinnatti Law Review 1987.

NJ. 1986

.

Key Words: book,

general.

pp. 745-759.

policy,

KIR-80

foreign.

Kirby.

IRV-86

Key Words:

M.D.

'Transborder Data Flows and

Irving, R.H.,

C.A. Higgins,

and F.R. Safayeni "Computerized Performance Monitoring Systems: Use and Abuse," Communications of the August 1986, pp. 794-801.

ACM

.

Key Words: rights, employment

the 'Basic Rules' of Privacy,"

Stanford Journal of International

Law Siunmer

Key Words: TDF,

Law Review

Summer

'88, pp.

Key Words:

,

703-902.

rights, laws,

general.

Model

Statute."

UCLA Law

Key Words:

p.

Review

A

rights,

medical.

KUS-84

History of in the

Federal Government,

Computerworld, December

14,

1981, pp. 2ff.

Key Words:

matching,

Kusserow, R.P. "The Government Needs Computer Matching to Root Out Waste and Fraud." Communications of the ACM. June 1984. pp. 542-545.

Key Words: M.D.

Kirby,

"Right to Financial Privacy:

"Urgent Need to Solve Legal Difficulties,"

Jan./Febr. 1988, pp.

TDF

Landever, A.R. "Electronic Surveillance,

Aug/Sept. 1984. pp. 347-350.

Computers and the Fourth Amendment." University of Toledo Law Review Winter

Key Words: TDF, rights, laws,

LAN-84

Transnational Data Report.

37-51.

Key Words:

requirements,

case, matching, rights.

Jones, S.E.

Emerging Standards of Bank Compliance," Banking Law

laws,

,

1984. pp. 597-640.

rights.

EFTS.

Key Words:

KIR-86

KAT-88

Kirby.

M.D.

surveillance,

rights.

Katz. J.E.

'Ten Information

"Public Policy Origins of

Commandments."

Telecommunications Privacy and the Emerging Issues."

Transnational Data Report,

Lauffer. S.

June 1986. pp. 19-22.

International Issues in

Key Words:

Communication Technology and Policy Academy for

Information Age (U.K.), July 1988, pp. 169-176.

LAU-83

rights, laws, use.

,

Educational Development,

Key Words: case.

policy, laws,

Washington, DC, 1983.

KIR-86a Kirby,

,

1349-h.

J.

KIR-84

,

Proposal

general.

JON-88

Journal

A

Patient Access

August 1983.

"Privacy:

Marshall

Klugman. E. 'Toward a Uniform Right to

and Information Practices rights,

foreign.

Kirchner,

The John

KLU-83

for a

Computer Matching

"Privacy Edition,"

rights, laws, use.

Medical Records:

.

1980. pp. 27-66.

KIR-81

JML-88

Information and

to

Privacy:

Paris, 1985.

Key Words: TDF,

M.D.

"Access

M.D.

"Human Rights - The Challenge of New Technology," Information (U.K.). October 1986, pp. 200-207. Key Words:

Key Words: book, foreign.

Age

rights, general.

9-9

policy,

MAR-80

LAU-86

MCC-80

Laudon, K.C.

Marchand. D.A.

Dossier Society: Value

The

Choices in the Design of National Information Systems Columbia University Press, New York, 1986

Criminal Justice Records . Information Resources Press,

.

McConnell, R.M.

Politics of Privacy,

Arlington,

VA,

Key Words:

and

1980.

"Designing for Privacy: The Data Vault." in RuUo, T.A.

Advances in Computer Management. Vol. 1, Heyden, Philadelphia, PA. (Ed.).

Security

policy, criminal.

1980. pp. 106-121.

Key Words: book,

MAR-84

surveillance.

Key Words: "protection,

Marx. G.T.. and N. Reichman

LAU-86a Laudon, K.C. "Data Quality and Due Process in Large Interorganizational Record

MCK-83

"Routinizing the Discovery of Secrets:

Computers as

Informants." Americ.

Systems," Communications of the January 1986, pp. .

ACM

Behavioral Scientist, 1984.

Key Words:

5-11.

design.

McKay, G.A.

A

"Privacy Call for Action." Proc. IFIP/Sec. '83 .

March

Stockhohn, 1983,

(2:

FAK-83),

pp. 47-55.

threats, rights.

Key Words:

protection,

general.

Key Words:

MAR-86

requirements,

Marx. G.T., and

S. Sherizen "Monitoring the Job: How to Protect Privacy as well as

case.

LEA-86 Leahy.

Property." Technology

P.

Review.

"Privacy and Progress." Computers & Security

MEL-82

rights, general.

LER-84

Meldman,

Marx. G.T. "Surveillance:

E.J.

Data Wars Are Brewing," IEEE Spectrum. "International

July 1984. p.

rights, criminal.

threats, rights.

MAR-86a Lemer,

Justice,"

Information Privacy (U.K.). March 1981. pp. 43-49.

Key Words:

pp. 347-349.

Key Words: Key Words:

1986, pp.

McLaughlan, W. "Privacy and Criminal

63-72.

.

December 1986.

Nov ./Dec.

MCL-81

Game

A

Dangerous

Played With Matches."

Abacus

.

J.A.

"Privacy Expectations in an

Fall 1986. pp. 60-64.

Information Age," Information Privacy (U.K.). Winter 1982, pp. 81-89.

454-1-.

Key Words: Key Words: TDF.

threats,

matching.

Key Words:

rights, laws.

policy.

MON-88

MAR-88

LIN-89 Linowes. D.F. Privacy in America:

Your

W.

Marx, G.T.

Monssen,

Undercover: Police

"Airline Industry Takes Data

Surveillance in America,

Protection Seriously,"

Private Life in the Public

University of California Press,

Transnational Data Report.

Eye? University of

Berkeley,

Is

Illinois

.

CA, 1988

January 1988, pp. 17-20.

Press, Urbana, IL. 1989.

Key Words: book, Key Words: book,

Madey, B.G. "Computer Privacy

MAI-81 Maisonrouge. J.G. "Regulation of International Information Hows,"

Information Society 1.

Key Words:

.

The Vol.

1981. pp. 17-30.

1,

in

America: Conflicting Practices and Policy Choices." Proc. 1986 IEEE Symp. Sec. & Priv. (5: IEE-86), pp. 219,

Mowshowitz. A. "On Approaches

to the Study of Social Issues in Computing." Communications of the November 1981. . pp. 146-155.

ACM

223.

Key Words: Key Words: TDF.

policy, rights.

MOW-81

MAT-85

rights.

No.

threats.

threats,

policy,

Key Words:

policy, laws.

laws.

9-10

policy, social.

NIB-84

OEC-84 An Exploration

Niblett, B.

Data Protection Act of 1984

Longman Group

.

Limited,

OTA-86

of Legal Issues In Informationa and

Telecommunication

London, 1984.

Technologies

.

Electronic Record Systems and

OECD,

Paris,

1984.

Key Words: book,

Key Words: TDF,

OTA-CIT-

,

Technology Assessment, Washington, DC. June 1986.

laws,

policy.

NOV-80 'Transborder Data Flows and International

Framework

Law:

A

1984

And Beyond: The

Social

Technology Proc. 1984 Berlin

for Policy-

.

Journal of International

Law

.

Conf. 1986.

OECD,

Paris,

March

Key Words:

jwlicy, social.

laws,

OMB-85

foreign.

Management of Federal Information Resources

NOV-82

,

Novotny,

Computer/Law Journal

A- 130, Office of Management and Budget, Washington, DC, December 1985.

New

Electronic Supervisor

Key Words:

Key Words:

threats, rights,

government, policy.

OTA-88

Criminal Justice, New Technologies and the

OTA-CIT-366,

U.S. Congress, Office of

policy,

Techn. Assessment, Washington, DC, May 1988.

guidelines.

Key Words: TDF, OSV-83

requirements.

Key Words:

Osvald, T.

NYC-80

"The Data Act and Documentation Requirements,"

Nyciun, S.H., and

Proc. IFIP/Sec. '83 .

Courmey-Saunders 'Transborder Data Flow:

S.

Legal Persons in Privacy Protection Legislation," Proc, 1980 National Comp. Conf. ,

Press, Arlington,

Stockhohn, 1983, 83), pp. 265-268.

(2:

policy, criminal.

PAG-84 Pagels, H.R. (Ed.)

FAK-

Computer Culture: The

Key Words:

laws, foreign.

and Computer

Scientific Intellectual

Social of the the

VA,

,

The New York Academy of Sciences,

New

York, 1984.

OTA-85

pp. 587-593.

Federal Government

Key Words: TDF,

policy,

Civil Liberties ,

OEC-80

OTA-CIT-293,

U.S. Congress, Office of

Information,

Computer and Communications Policies for

Techn. Assessment, Washington, DC, October

1980s Proc. of a High-Level

^985.

.

OECD,

Key Words: book,

policy.

Information Technology: Electronic Surveillance and

laws.

PAR-83 Parent,

W.A.

"Recent Work on the Concept of Privacy," Americican Philosophical Quarterly

,

1983,

pp. 341-355.

Paris, 1980.

Key Words: proceedings,

rights,

surveillance,

Key Words:

policy, general.

government, policy.

PAR-84

general.

Enslow (Eds.) 1984 NorthHolland, Amsterdam, 1984. Parkhill, D., P.

So This

OEC-81 Guidelines for the Protection of Privacy & Transborder ,

OECD,

Paris,

1981.

Key Words: TDF,

is

,

Key Words: book,

Data Flows of Personal Information



Technology, New Tensions OTA-CIT-333, U.S. Congress, Office of Techn. Assessment, Washington, DC, September 1987.

Constinition,

,

Winter 1982. pp. 105-124.

Key Words:

The

Circular No.

E.7.

'Transborder Data Flow Regulation: Technical Issues of Legal Concern,"

AFIPS

OTA-87

.

1980, pp. 141-199.

Key Words: TDF,

rights, records,

laws, government, policy.

Challenge of Information

Oriented Inquiry," Stanford

Summer

Key Words:

OEC-86

Novotny, EJ.

Conf.,

Individual Privacy

296, U.S. Congress, Office of

laws,

foreign.

Federal Government Information Technology:

guidelines.

9-11

general.

RAS-86a

PAT-89

ROB-86

Patrick.

Rasor, P.B.

"Public Access to

"Privacy Implications of

Government Databanks," Proc, 12th Natl. Comp. Sec. Conf.. 1989. (5: NCS-89).

Consumer Credit Laws," The John Marshall Law Review ,

Summer

1986. pp. 941-957.

Robinson, P. "Legal Issues Raised by Transborder Data Flow," Canadian-U.S. Law Journal 1986, pp. 295-316.

,

pp. 609-610.

Key Words:

Key Words:

privacy, credit.

Key Words: TDF,

laws,

foreign.

policy, rights,

RIC-86

laws.

RUB-89

Rice, R.

PIE-83

"I*rivacy,

Pietarinen,

I.

"Finland's Privacy Legislation," Transnational

Freedom and

Rubenfeld,

J.

PublicKey Cryptography," Information Age, (U.K.), October 1986, pp. 208-214.

'The Right of Privacy," Harvard Law Review February

Key Words:

Key Words:

.

1989, pp. 737-807.

Data Report, March 1983, .

pp. 101-103.

Key Words:

laws, foreign.

PIP-84 Pipe, G.R.

"Getting on the

TDF

Track,"

Datamation Jan. 1984, 200-211. ,

Rule,

The

Privacy Act," Transnational

American Library,

Data Report. January 1987.

1980.

Plesser, R.

"Issue of Data Flows Across

Be

Faced,"

ABA

Journal

February 1982, pp.

Banking

RAD-84

Sauvant, K.P.

"The Growing Dependence on

"Enhancing Canadians' Right to Know and to Privacy." Transnational Data Report,

Transborder Data Flows," Computerworld, June 25, 1984. pp. ID/19-24.

Key Words: TDF. rights, foreign.

Services, Springfield,

1987.

,

VA,

Key Words: book,

York, 1984.

policy,

TDF,

policy.

RAS-86 Rasor, P.B.

Government

Personal Financial

Washbum Law

rights, laws.

Seller. R.S.

An

Enforceable Expectation of

RIL-88 RUey, T. "Data Commissioners Consider Wider Horizons: Conference Report," Transnational Data Report,

December 1988,

pp. 10-18.

Review Spring 1986, pp.

Confidentiality."

Key Words:

policy, laws,

Forum Spring .

1980. pp. 628-659.

Key Words:

rights, laws. case.

SEI-86 Seipel. P. "Pitfalls

,

417-436.

Key Words: book,

"Privacy and Insurance:

foreign.

of the Electronic

Revolution." Information

Age

.

(U.K.). October 1986. pp. 215-

foreign.

Key Words:

Schoeman, F.D. (Ed.) Philosophical Dimensions of Privacy Cambridge University Press. New York, 1984

SEI-80

Elsevier Science PubUshers,

to

SCH-84

Transnational Data Reporting

and International Business

Records,"

policy,

laws.

,

Perspectives and Trends ,

Communications Regulation

Access

rights.

Riley. T.

Records: International

Rada, J.F. and G.R. Pipe (Eds.)

"Controlling

York,

laws, foreign.

RIL-87b RUey, T. Access to Government

policy,

laws.

book,

New

SAU-84

Key Words:

Key Words:

New

June 1987, pp. 23-25.

71-78.

New

of Privacy,

Key Words: book,

PLE-82

Key Words: TDF,

Politics

pp. 11-13.

p.

RIL-87a

,

et al.

J.,

"Quebec's Unique Access and

general.

National Borders Must

rights, laws.

RUL-80

RIL-87 RUey, T.

Key Words:

Key Words: TDF,

policy, rights.

219.

policy, records.

Key Words:

9-12

threats, rights.

SEL-88

SIM-85

Selmer, K. "Data Protection Policy Trend," Transnational Data Report,

December 1988,

pp.

19-25.

SMI-86

Simitis, S.

Smith. R.E.

"Data Protection: New Developments, New

Collection and

Challenges," Transnational

Joumal Publication,

Data Report, March 1985, pp.

Washington, DC, 1986.

Security

Use of Social Numbers Privacy .

95-96.

Key Words:

Key Words:

policy, laws.

Key Words:

SHA-84

SMI-88

laws.

Shattuck,

policy, rights.

policy, rights,

Smith, R.E.

J.

"Computer Matching

a Serious Threat to Individual Is

SIM-87

Compilation of State Federal Privacy

Simitis, S.

&

Laws Privacy ,

Communications of

"Reviewing Privacy in an

Joumal Publication,

June 1984, pp.

Washington, DC, 1988.

538-541.

Information Society," University of Peimsylvania

Law Review March

Key Words:

Key Words: matching,

707-746.

Rights," the

ACM

,

,

1987, pp.

STE-81

threats.

Key Words: SHA-85

Stevenson, R.B.,

policy, rights,

Corporations

laws.

Shattuck,

Age of

and P.

Newman

Sizer, R.

Data Report, July/August

The Data Protection Act (U.K.) Gower Publishing

1985, pp. 259-260.

Key Words:

Co..

,

Ltd.,

:

Disclosure

,

Key Words: book,

policy,

rights, laws.

Key Words:

laws, foreign.

STE-83 Steriing.

Presidential Initiative

on

Slansky, P. (Ed.) Nineteen Eighty-Four

On

Information Policy," Software

W.H. Freeman

Law

York, 1983.

,

Summer

1989,

&

Co.,

Common Law - A

Comparative Study in the

,

New

Private Sector,"

Review Vol.

Gozanga Law

18, 1982/83, pp.

,

567-604.

pp. 461-490.

Key Words: book,

Key Words:

R.A.

"Privacy Information Systems

SLA-83

and Spence J.,

Journal

&

laws.

London, 1985.

SHA-89

"A

Jr.

Information

Johns Hopkins University Press, Baltimore MD, 1981.

SIZ-85

Information," Transnational

M.M.

«fe

Secrecy, Access

J.

"Privacy in the

Shattuck,

laws, general.

rights.

Key Words:

policy, rights,

policy, rights,

law.

SMI-83

laws.

Smith, R.E. Shultz, G.P.

Workrights , Privacy Joumal Publication, Washington, DC,

"Consequences of the Age of

1983.

SHU-86

May

1986, pp.

Key Words:

Key Words:

polciy, rights.

MD.

Simitis, S.

,

"Data Protection~A Few Critical Remarks," Transnational Data Report,

Publication, Washington,

March 1983,

Key Words:

pp. 93-96.

DC,

1985. laws, general.

Lanham.

1986

Key Words: book,

SMI-85 Smith, R.E. Fair Information Practices in Seven States Privacy Joumal

SIM -83

Jr.

Press of America.

rights,

employment.

16-19.

Strunk, O.,

Privacy: Studies in Social and Cultural History . University

Information," Transnational

Data Report,

STR-86

general.

STR-88 Strong, D.R.

"The Computer Matching and Privacy Protection Act of 1988: Necessary Relief from

Erosion of the Privacy Act of 1974," Software Law Joumal Summer 1988. pp. 391-422. ,

Key

Words: protection, laws.

Key Words: matching,

9-13

laws.

SWA-83

TLR-87

Swan,

"Privacy, Computers, and the

J.C.

"Public Records and Library Privacy," Library Journal, Sept. 1983.

Commercial Dissemination of Personal Information," Texas Law Review June 1987, pp. ,

TUR-80 Tum,

R. 'Transborder Data Flows,"

Computerworld, March 1980, pp. IDI-IDIO.

3,

1395-1439.

Key Words:

Key Words: TDF,

policy, records.

Key Words:

policy, records.

policy,

laws.

TDR-83 Transborder Data Flow Issues Guide , Transnational Data Reporting Service,

VA,

Springfield,

TRA-85 Traub, J.F. (Ed.) Cohabiting with Computers

William Kaufmaim,

1983.

Altos,

Key Words: TDF,

CA,

Inc.,

,

Los

1985.

guidelines.

TUR-80a Tum, R. "An Overview of

Transnational

Dataflow Issues," Proceedings, Pacific Telecommunications Conference January 1980, pp. .

Key Words:

book, general.

1D31-1D40.

TDR-83a "Statistical

Data Privacyand

Confidentiality,"

Transnational Data Report,

Oct./Nov. 1983, pp. 368-386.

Key Words:

statistical,

laws.

Key Words: TDF,

TRE-88 Tremper, C.R., and M.A. Small "Privacy Regulation of

Computer Assisted Testing and Instruction," Washington Law Review October 1988, ,

TDR-84

pp. 841-879,

"Surveys Show Strategic Importance of TDF," Transnational Data Report, Jan/Febr. 1984, pp. 20-36.

Key Words: TDF,

policy.

TDR-84a "New Technologies' Impact

On

threats, rights.

.

(U.K.), January 1980,

Key Words: TDF,

TRU-86 Trubow, G. "Peeping Sam: Uncle Is Watching You," Computer Security Joumal No. 1, 1986, ,

policy,

design.

TUR-SOc Tum,

R.

"Privacy Protection and

pp. 15-20.

Key Words:

Transborder Data Flows," Proceedings, 1980 National Computer Conference AFIPS

surveillance.

,

TRU-87 Key Words:

'Technical ImpUcations of Privacy Protection Requirements," Information pp. 2-6.

policy, rights.

Data Protection,"

Transnational Data Report, June/July 1984, pp. 204-215.

TUR-80b Tum, R.

Privacy

Key Words:

policy,

laws.

Press, Reston,

Trubow, G.B.

VA,

1980, pp.

581-586.

"National Information Policy

TDR-84b "Second World

TDF

and the Management of

Key Words: TDF,

Personal Records," Software

foreign.

Conference: Special Report,"

Law Joumal

Transnational Data Report,

101-112.

,

Winter 1987, pp.

TUR-80d Tum, R.

Aug./Sept. 1984, pp. 253-283.

Key Words: Key Words: TDF,

policy,

"Privacy Protection and

policy,

Security in Transnational Data

management.

Processing," Stanford Joumal of International Law Summer

foreign.

TRU-89 TDR-85

,

Trubow, G.B. "Watching the Watchers: The

1980, pp. 7-86.

Coordination of Federal Privacy Policy," Software

Key Words: TDF,

Data Report, April/May 1985, pp. 115-117.

Joumal Summer 1989, pp.

"OECD

Sets

TDF

Rules of

the Road," Transnational

,

391-411.

Key Words: TDF,

laws,

guidelines.

Key Words:

policy, rights,

laiws.

9-14

Law

foreign.

laws,

TUR-82b

TUR-80e

UCD-81

Turn, R.

Turn, R.

"An Overview of Transborder

"Situation in the U.S.: Privacy

Dataflow Problems," Proc. 1980 IEEE Symp. Sec. &

Protection

1980s," Transnational Data

Davis

Privacy

Report, July/August 1982, pp.

1981, pp. 473-492.

,

(5:

IEE-80). pp. 3-8.

"Confidentiality of Persoimel

Needs

Files in the Private Sector."

University of California at

in the

Law Review

Winter

,

257-258.

Key Words: TDF,

laws,

Key Words:

foreign.

requirements,

Key Words: rights, employment

laws.

TUR-81

UNI-82

Turn. R., (Ed.) 'Transborder Data Flows: Issues and Organizations," Information Privacy . (U.K.),

TUR-83

Transnational Corporations

Turn, R. "Privacy Protection in the

Computer Age," Information

,

Age, (U.K.), April 1983, pp.

January 1981, pp. 6-20.

Key Words: TDF,

105-109.

Key Words: TDF,

&

Transborder Data Flows United Nations, New York, 1982. policy,

laws.

policy.

Key Words:

rights, laws.

VEE-89

TUR-81 a TUR-83a

Turn, R.. (Ed.)

'Transborder Data Flows:

Veeder, R.N.

Privacy Protection,"

Information Privacy (U.K.), March 1981, pp. 56-67. ,

,

VA,

Eligibility for Federal

Benefits Determinations under

Resiliency of the U.S. Information Society AFIPS Press, Reston,

Key Words: TDF,

"Making

Turn, R., et al. Observations on the

1983.

the

Computer Matching and

Privacy Protection Act of 1988," Proc. 12th Natl. Comp. Sec. Conf. , 1989, (5: IEE-89),

laws,

Key Words:

foreign.

requirements,

pp. 606-608.

policy.

Key Words: matching,

TUR-81b

Privacy (U.K.), pp. 98-119. .

May

laws.

TUR-83b

Turn, R.. (Ed.) 'Transborder Data Flows: Implementation of Privacy Protection," Information

Turn, R. "Privacy Protection in the 1980s," Information Age (UK), April 1983. pp. 105,

1981,

109.

VIT-83 Vitro, R.A.

"Information Sector

Development Planning: Toward Balanced TDF," Transnational Data Report December 1983, ,

Key Words: TDF,

protection.

Key Words:

rights, laws.

Key Words: TDF,

TUR-83C

TUR-82

Turn, R., and E.J. Novotny

Turn, R. "Security Issues in

"Resiliency of the

Transborder Data Flows,"

Computerized Society," Proc, 1983 Natl. Comp. Conf.

Computer Security Journal

,

Winter 1982, pp. 71-79.

Key Words: TDF,

,

AFIPS

May

Press, Reston,

Key Words:

requirements,

policy.

WAL-88 Walden, N., and R.N. Savage "Data Protection and Privacy Laws: Should Organisations Be Protected," International

Computer Law

&

C)uarterly , April

1988, pp. 337-347.

policy.

Turn. R. "Privacy Protection in the 1980s," Proc. 1982 IEEE Privacy (5: Symp. Sec. IEE-82), pp. 86-89.

&

Key Words:

VA,

1983, pp. 341-349.

protection.

TUR-82a

pp. 461-468.

.

rights, laws.

Key Words:

TUR-84

policy, laws.

WAR-80

Turkic, S.

The Second

Self:

Computers

and the Human Spirit, Simon and Schuster, New York, 1984.

Ware, W.H. "Privacy and Information Technology," in Hoffman, L.J. (Ed.), Computers and Privacy in the Next Decade Academic ,

Key Words: book,

societal.

Press.

New

York, 1980, pp. 9-

22.

Key Words: general.

9-15

proceedings,

WAR-81

WES-83

Ware. W.H.

WRI-83

Westin, A.F.

"Security, Privacy,

"New

and

Wright.

Issues of

Computer

J.

"Protection of Corporate

National Vulnerai)ility," Proc.

Privacy in the 1980s,"

Privacy." Transnational Data

Comp.

Information Processing 83, Proc, IFIP Congress Paris,

235.

&

Sec.

Phoenix,

AR.

Priv.

Symp.

,

1981, pp. 107-

,

North-Holland, Amsterdam,

111.

Key Words:

1983.

Key Words:

policy, rights.

policy, rights,

Key Words:

laws.

policy, rights,

YOU-83 Yourow.

laws.

WAR-86a

J.H.

Issues in International

Ware, W.H. "Emerging Privacy Issues," Computers & Security June ,

1986, pp. 101-113.

Key Words:

1983, pp. ID/11-18.

Telecommunications Policy: A Source Book Center for Telecommimications Studies, George Washington University, Washington, DC, 1983.

Key Words:

Key Words: TDF.

WES-83a Westin. A.F.

,

"New Eyes on

Privacy,"

Computerworld. November 28,

policy, rights.

WES-80

policy, rights,

,

York, 1980.

WES-84

YUR-83

Westin, A.F.

The Changing Workplace: A Guide to Managing People, Organizational, and

Key Words:

book,

employment

policy,

laws.

laws.

Westin, A.F., and S. Salisbury Individual Rights in the Corporation Pantheon Books,

New

Report. June 1983, pp. 231-

Yurow.

J.

"Privacy Legislation and Restriction of Transborder

Data Row." Information Age (UK). January 1983, pp. 11-15. ,

Regulatory Aspects of Office

Technology Knowledge ,

Industry Pubhcations, Inc..

WES-80a

White

NY.

Plains,

1984.

Key Words: TDF,

laws,

policy.

Westin, A.F.

"Long-Term Implications of Computers for Privacy and Protection of the Pubhc Order," in Hoffman, L.J. (Ed.), Computers and Privacy in the Next Decade, Academic Press, New York, 1980, pp. 167-181.

Key Words: book, laws, employment

guidelines,

Zaki, A.S.

"Regulation of Electronic

WIG-84 Wigand. R.T., et al. 'Transborder Data Flow, Informatics and National

policy, rights,

Funds Transfer: Impact and Legal Issues," Communications of the

ACM

,

February 1983,

pp. 112-118.

PoUcies," Journal of

Communications Winter

Key Words: EFTS, poUcy.

1984.

laws.

,

Key Words:

ZAK-83

laws.

Key Words: TDF,

policy,

laws.

WLL-81 "Employee Medical Records and Constitutional Right of Privacy," Washington & Lee

Law Review

,

Fall 1981, pp.

1267-1284.

Key Words: employment.

rights,

9-16

10.

Pre-1980 Publications

This section cites pre-1980 publications listed under the following four subject models and database security, communications

categories: security environment, security security,

and privacy.

A. Security Environment BRO-71

DIN-78

Brown, W.F. (Ed.) AMR Guide to Computer and Software Security Advanced ,

Management Research, New

GAO-77

New

Dinardo, C.T. (Ed.)

Computers and Security

AFIPS

Press, Reston.

VA,

Key Words:

book, general.

DOJ-79 Computer Crime: Criminal Justice Resource Manual.

P.S.

Security:

Check

Press, Reston,

,

VA,

1979.

Key Words: book,

Law

Enforcement Assistance

List for

Computer Center Self-Audits

AFPS

general,

BUR-78 J.L. Sardinas

Federal Agencies Should

Key Words:

Data, LCD-78-123, U.S.

guidelines, crime.

M., B. Chadwick, and K. Wong

Computer

Security for

1978.

England, 1972.

,

Security:

Strengthen Safeguards Over Personal and Other Sensitive

General Accounting Office, Washington, EXT, 23 January

Computer Control and Audit: Total Systems Approach Wiley & Sons, New York,

A

GAO-79 Automated Systems

Farr,

and

Key Words: threats, management.

Department of Justice, Washington, DC, 1979.

FAR-72 J.G.,

1977.

Administration, U.S.

risk.

Burch,

November

general.

BRO-79 Brown,

for

.

1978.

York, 1971.

Key Words: book,

Methods Needed

Checking Payments Made by Computers FGMSD-76-82, U.S. General Accounting Office, Washington, DC, 7

.

Systems National Computer ,

1979.

Key Words:

threats,

government

Centre, Ltd., Manchester,

HAM-73 Hamilton, P.

Key Words: book,

auditing.

Key Words: book,

general,

CAR-77

,

NJ, 1973.

Carroll,

GAO-76

JM.

Computer Sectirity Security World Publ. Co., 1977. ,

Key Words: book, methods, general.

Computer-Related Crimes in Federal Programs FGMSD76-27, U.S. General Accotmting Office, Washington, DC, 27 April

Key Words: book,

general.

.

HEM-73 C, and JM. Hemphill Hemphill,

Security Procedures for

1976.

Computer Systems Dow-Jones

COU-77

,

Courtney, R.H., Jr. "Security Risk Assessment in

Key Words:

crime,

Conf.

,

AFIPS

Co.,

Homewood, IL

1973.

government.

Key Words: book, methods,

Electronic Data Processing,"

Proc. 1977 Natl.

VA,

Computer Security Auerbach Publishers, Inc. Pennsauken,

risk.

Comp.

general.

Press, Reston,

pp. 97-104.

Key Words: risk, management.

10-1

NBS-75

IBM-74 Data Security and Data Processing Report in 6 Volumes on a Study by TRW, MIT. and the State of ,

Illinois,

White

IBM

Plains.

PAR-76a

Computer Security Guidelines

Parker. D.B.

Implementing the Privacy Act of 1974 FIPS PUB 41. National Bureau of Standards.

"Computer Abuse Perpetrators and Vulnerabilities of

for

,

Corporation,

Gaithersburg,

NY,

1975.

1974.

MD, 30 May

Computer Systems."

Proc.

1976 Natl. Comp. Conf.

AFIPS

Press. Reston,

.

VA,

1976.

Key Words: methods,

Key Words:

management.

methods, privacy.

KRA-79

guidelines,

Key Words:

NBS-76

PAR-79

Krauss, LJ.

Glossary for Computer

Computer Fraud and

Systems Security FIPS 39, National Bureau of

Countermeasures PrenticeHaU, Englewood CUffs, NJ, ,

1979.

Key Words: book,

crime,

methods.

crime, threats.

.

Standards. Gaithersburg,

PUB

Parker, D. (Ed).,

Computer

Ethical Conflicts in

Science and Technology

MD,

AFIPS

Press, Reston,

15 Febr. 1976.

1979.

Key Words:

Key Words:

guidelines,

,

VA,

ethics, general.

standards.

PAT-74

MAR-73

NBS-77

Martin.

J.

Accuracy and Privacy in Computer Systems Prentice-Hall, Security,

,

Englewood

Cliffs,

NJ. 1973.

Patrick, R.L. (Ed.)

Evaluation of Techniques for Automated Personal

FIPS PUB 48, National Bureau of Standards, Identification .

Gaithersburg,

MD,

April

1

Security: AFIPS System Review Manual AFIPS Press. .

Reston.

VA,

Key Words:

1974. risk,

management.

1976.

Key Words: book, methods,

MOW-78

authentication.

NBS-79

Mowshowitz, A. "Computers and Ethical Judgement in Organizations." Proc. 1978 Nad. Comp. Conf. .

VA,

PET-67

Key Words:

privacy.

AFIPS

Press. Reston,

pp. 675-683.

Guidelines for Automatic Data Processing Risk Analysis .

FIPS PUB 65, National Bureau of Standards, Gaithersburg. MD. 1 August

Petersen, H.E., and R. Turn,

"System ImpUcations of Information Privacy." Proc. Spring Joint Comp. Conf AFIPS Press. 1967, pp. 291.

300.

Key Words:

threats,

methods.

1979.

REE-73

Key Words:

awareness,

Key Words:

guidelines, risk.

OMB-78 NBS-74

Bibliography

Automated

Security of Federal

Guidelines for Automatic

Information Systems

Data Processing Physical Security and Risk Management FIPS PUB 31, National Bureau of Standards,

No. A-71. Transmittal Memo. No. 1. Office of Management and Budget, Washington. DC,

,

Gaithersburg.

MD,

,

Circ.

M. Gray

guidelines,

,

TN

780.

National Bureau of Standards. Gaithersburg,

Key Words:

MD,

June 1973.

awareness,

general.

July 27, 1978.

REN-74

1974.

Key Words: Key Words:

Reed. S.K.. and

Controlled Accessibility

ethics.

requirements,

physical, methods, risk.

PAR-76

Systems.

Crime by Computer

New

TN

809. National

Bureau of Standards.

Parker, D.B. Scribners,

Renninger, C. and D. Branstad

Government Looks at Privacy and Security in Computer

risk.

,

York, 1976.

Key Words: book,

crime, risk.

Gaithersburg.

Key Words: general.

10-2

MD,

February

1974. proceedings,

WON-77

VAN-72

REN-74a

C,

Renninger,

Van

(Ed.)

Approaches to Privacy and Secimty in Computer Systems SP 404, National Bureau of Standards, Gaithersburg, MD, September ,

Wong, K.

Tassel, D.

Computer Security Management Prentice-Hall, Englewood Cliffs, NJ, 1972 ,

Key Words:

Computer Security Risk

A

Analysis and Control:

Guide

DP Manager Hayden Book Co, New Rochelle Park, to the

,

NJ, 1977.

book, general.

1974.

WAL-77 Key Words:

proceedings,

general.

Key Words: book,

Walker,

and

Blake Computer Security and B.J.,

I.F.

Protection Structures

TAB-79

Hutchison and Ross,

,

Dowden,

"On Computer Crime Computer/Law

(S.B.

Journal ,

240),"

Key Words: book,

WOO-73 Wooldridge, S., C. Corder, and C. Johnson Security Standards for Data

Inc.,

Stroudsburg, PA, 1977.

Taber, J.K.

risk,

control.

techniques.

&

Processing Wiley ,

Winter 1979, pp. 517-544.

New

Key Words:

Key Words: book,

crime, laws.

Sons,

York, 1973. general.

Models and Database Security

B. Security

AND-73

ABR-77 Abrams, M.D., et al. (Eds.) Tutorial on Computer Security and Integrity IEEE Computer Society, Long ,

Beach. CA, 1977.

BAY-76

Anderson,

Bayer. R.. and J.K. Metzger "On the Encipherment of

J.P.

Computer Security Technology Planning Study ESD-TR-73-51, James P. Anderson and Co., Fort Washington. PA, 1973.

,

Search Trees and Random Access Files," ACM Trans. Database Systems March ,

1976, pp. 37-52.

Key Words: book, Key Words:

techniques.

policy, models,

Key Words:

database, crypto.

techniques.

AMB-77

BEL-73

Ambler, A.L., and C.G. Hoch "A Study of Protection in Programming Languages," Proc. ACM Conf. on Language Design for Reliable Software 1977, pp. 25-40. ,

ATT-76 Attanassio.

C.

P. Markstein.

and R. Phillips "Penetrating an Operating System: A Study of VM/370 Integrity." IBM Systems Journal January 1976. pp.

BeU, D.E. Secure Computer Systems: A Refinement of the Mathematical Model, Vol. HI, ESD-TR-73-278, Mitre Corp.. Bedford,

MA.

1973.

.

Key Words: methods,

102-116.

Key Words:

policy, models.

software.

Key Words: OS,

threats, case.

Anderson,

BEL-75 BeU, D.E., and

AND-72 J.P.

"Information Security in

Multiuser Computer Environment," in Rubinoff,

Advances in Computers Vol. 12, Academic Press, New York, R., (Ed.),

,

1972, pp. 1-35.

BAR-64

On

LaPadula, Secure Computer Systems Unified Exposition and Multics

L.J.

Baran.

P..

:

Distributed

Communications: IX. Security. Secerecy, and Tamper-Free Considerations Report RM3765-PR. The Rand Corp.. Santa Monica, CA, 1964. ,

Interpretation ,

policy, methods.

Key Words:

threats, policy.

10-3

MA.

1975.

Key Words: case.

Key Words:

ESD-TR-75-306,

Mitre Corp., Bedford.

policy, models,

DOD-78

DEN-76

BER-79

Army

Denning, D.E.,

Proceedings. U.S.

"KSOS—Development

"A

Automation Security

Methodology

Information Flow."

Berson, T., G. Barksdale,

Jr.

for a Secure Operating System," Proc. 1979 Natl. Comp. Conf. .

AFIPS

Lattice

Model of Secure

May

OACSI/DAMI-AMP,

1976. pp. 236-242.

Key Words: models,

pp. 365-371.

Key Words: OS,

ACM.

VA,

Press. Reston,

kernel, case.

BIB -77 Biba, K.J.. Integrity Considerations for

Secure Computer Systems ESD-TR-76-372, Mitre Corp., Bedford, MA, 1977. ,

Workshop Leesburg, VA, December 1978, .

Communications of the

flow.

Key Words:

DEN-77 Denning, D.E., Denning, P.J., "Certification of Programs for Secure Information Flow," Communications of the July 1977, pp. 504-513.

ACM

.

proceedings,

general.

DOD-79 Proceedings, Seminar on the

DOD

Computer Security Program

Initiative

Key Words:

verification, flow.

.

DEN-78

models,

Denning, D.E. "Are Statistical Data Bases

integrity.

CON-72 Conway, R.W., W.L. Maxwell, and H.L. Morgan "On the Implementation of

Secure?," Proc. 1978 Nad.

Key Words: trusted.

statistical, threats.

DEN-79

April 1972, pp. 211-

220.

Key Words: OS,

Security

Workshop Virginia Beach, VA. September 1979. ,

Denning, D.E., Denning, P.J., "Data Security," Computing Surveys . September 1979, pp. 227-250.

Department of the Army, Washington. DC, 1979.

Key Words:

Key Words:

ACM

OACSI/DAMI-AMP.

U.S.

techniques.

DAV-78

databases,

methods.

Davida, G.I., et al. "Data Base Security," IEEE Trans. Software Engr. November 1978, pp. 531-533. ,

Key Words:

Proceedings. Second U.S.

Army Automation

Communications of the

ACM,

proceedings,

DOD-79a Key Words:

Security Measures in

Information Systems,"

July 1979.

U.S., Department

of Defense. Washington, DC, 1979.

Comp. Conf. AFIPS Press. Reston. VA. pp. 525-530. .

MD.

Gaithersburg.

OSD(CCCI).

Key Words:

U.S.

Department of the Army, Washington, DC. 1978.

DON-75

DEN-79a

methods.

Donovan,

and

Denning. D.E., et al., 'The Trackers: A Threat to Statistical Database Security," Trans. Database Systems March. 1979. pp.

"Hierarchical Approach to Computer System Integrity," IBM Systems Joumal No. 2,

76-96.

1975, pp. 188-202.

ACM

database,

proceedings,

general.

,

S.E.

J. J.,

Madnick

,

DEM-77 DeMillo, R.A., et al. "Even Databases that Lie

Can Be Compromised," IEEE

Key Words:

statistical, threats.

January 1977, pp. 73-75.

Key Words:

Inference,"

,

"Protection Against User threats, database.

ACM

Trans.

and

in Security. Integrity,

IBM

Systems Joumal No. ,

3,

1976, pp. 270-278.

Key Words: inference.

New

and

1979. pp. 97-106.

Computation Academic Press,

J. J.,

Madnick "Virtual Machine Advantages

S.E.

Decision Support Systems,"

Demillo, R., et al. (Eds.), Foundations of Secure .

Donovan,

Database Systems March ,

DEM-78

integrity, design.

DON-76

DOB-79 Dobkin, D.A., A.K. Jones, and R. Lipton

Trans. Software Engr.

Key Words:

databases,

Key Words:

York, 1978.

design.

Key Words: book, models, theory.

10-4

integrity,

methods,

DOW-77

GRA-72

FEI-79

Downs, D., and G.J. Popek "A Kernel Design for a Secure Database Management System," Proc. 3rd International Conf. on Very Large Data Base Systems .

IEEE Computer Society, Los Angeles, CA, 1976, pp. 507-

Feiertag, R.J., and

P.G.

Graham, G.S., and PJ. Denning,

Neumann

Comp. Conf. AFIPS

Comp. Conf. AFIPS Press, Reston, VA, 1979, pp. 329-

Reston, VA., 1972, pp. 417479.

.

Principles and

.

GRI-76

design.

design.

Griffiths, P.P.,

Friedman, T.D.

Downs, D., and G.J. Popek "Data Base Management Systan Security and Ingres," Proc. 5th Intemat. Conf. on Very Large Data Base Systems IEEE Computer Society, Los Angeles, CA, ,

"The Authorization Problem Shared Files," IBM Systems Journal No, 4, 1970,

in

,

pp. 258-280.

Key Words:

and

B.W. Wade "An Authorization Mechanism

FRI-70

DOW-79

Press.

Key Words: models, methods.

Key Words: MLS, OS, kernel,

"Protection

Practice," Proc. Spring Joint

334.

514.

Key Words: DBMS,

~

"The Foundations of Provably Secure Operating Systems (PSOS)," Proc. 1979 Natl.

for a Relational

System,"

ACM

Database Systems . September 1976, pp. 242-255.

Key Words:

authorization,

databases, methods.

Database Trans.

authorization,

database, relational.

1979, pp. 280-290.

Key Words: DBMS, case.

EVA-74 Evans, A.,

W.

GUD-76

GLA-77 design,

Kantrowitz,

and E. Weiss "A UsCT Authentication

Gudes, E., H.S. Koch, and FA. Stahl 'The Application of Cryptography for Data Base Security." Proc. 1976 Natl.

Glaseman, S., R. Turn, and R.S. Gaines "Problem Areas in Computer Security Assessment," Proc. 1977 Natl. Comp. Conf.,"

AFIPS

Press, Reston,

VA,

pp.

105-112.

Comp. Conf. AFIPS Press, Reston. VA. pp. 97-107. ,

Scheme Not Requiring Secrecy in the Computer," Communications of the ACM August 1974, pp. 437.

Key Words: methods,

Key Words:

risk.

database, crypto.

HAN-76

GLA-78

King

Gladney, H.M.

Hantler, S.L., and J.C.

"Administrative Control of

"An

Computing Service," IBM Systems Journal No. 2, 1978, pp. 151-178.

Correcmess of Programs," ACM Computing Surveys December 1976, pp. 331-353.

Fabry, R.,

Key Words: management,

Key Words:

"Capability-Based

control.

general.

412.

Key Words:

authentication,

techniques.

,

FAB-74

Addressing," Communications

ACM

of the 403-411.

.

July 1974, pp.

Gold, B.D., et

Key Words:

"Protection in Operating

Natl.

Systems," Communications of August 1976, pp. ,

Comp. Conf. AFIPS Press, Reston, VA, pp. 335-344. ,

Feiertag, R.J., KJ«J. Levitt,

Key Words: MLS. OS,

and L. Robinson,

design, case.

the

A System Design," ACM Symposium

Proc.

on

Operating System Principles , 1977, pp. 57-65.

Key Words: models,

Key Words: MLS, verification,

GRA-68 Graham, R.M., "Protection in an Information

Processing Utility," Communications of the

May

ACM

1968. pp. 385-369.

methods, design.

Key Words:

policy, models.

10-5

ACM

461-471.

"Proving Multilevel Security 6th

W.L. Ruzzo,

and J.D. Ullman,

Security Retrofit of

FEI-77

of

verification,

Harrison, M.A.,

al.

VM/370," Proc. 1979

ciq}ability,

methods.

,

HAR-76

GOL-79 "A

Introduction to Proving

.

theory.

HAR-78

HOF-78

JON-75a

Harrison, M.A.,and

Hoffman,

W.L. Ruzzo

E.

L.J.,

and

W.

Jones, A.K., and

Michelman

Wulf,

'Towards the Design of Secure

"Monotonic Protection

"SECURATE ~

Systems," in De Millo, R.A., (Ed.), Foundations of Secure Computations. (10: DEM-78), pp. 337-363.

Evaluation and Analysis Using

Security

Fuzzy Metrics," Proc. 1978 Nad. Comp. Conf. AFIPS Press, Reston, VA, pp. 531-

Systems," Software Practice & Experience Oct.-Dec., 1975, pp. 321-336. ,

.

Key Words: models, methods.

540.

Key Words: models,

JON-78

theory.

Key Words: HIN-75

risk,

methods,

Jones, A.K.. and R. Lipton,

Hinke, T.H. and M. Schaefer, Secure Data Management

Models: Their Usefulness,"

HOY-73

De

System RADC-TR-75-266, System Development Corp., Santa Monica, CA, 1975.

Computer Security Handbook

Key Words: DBMS,

Key Words: book,

,

design,

Mechanism

"Protection

case.

Hoyt, D.B. (Ed.)

McMiUan, New York, 1973.

,

general.

in

Millo, R.A., (Ed.),

Foundations of Secure Computations 1978, (10: ,

DEM-78).

pp. 237-252.

Key Words: models,

theory.

case.

JON-78a

HSI-76

HOF-70

Hsiao, D.K., and R.L

Hoffman, L.J., and W.F. Miller

in Yovits,

"Getting a Person's Dossier

in

from a Statistical Data Bank," Datamation, May

pp. 231-272.

Baum

"Information Secure Systems,"

M., (Ed.) Advances

Computers Vol. 15, 1976, Academic Press, New York, ,

Jones, A. K., and

B.H. Liskov

"A Language Extension for Expressing Constaints on Data Access," Commimications of the May 1978, pp. 358,

ACM

367.

1970, pp. 74.

Key Words: methods, Key Words:

threats,

Key Words: models,

database.

control,

case.

statistical.

HSI-79

HOF-71

Hsiao, D.K., D.S. Kerr,

Hoffman, L.J. "The Formulary Method for Flexible Privacy and Access Control," Proc. Fall Joint

Comp. Conf. AFIPS Press, Reston, VA, 1971, pp. 587,

601.

and C. Nee "Data Base Access Control in the Presence of Context Dependent Protection Requirements," IEEE Trans. Software Engr., July 1979, pp. 349-358.

KAM-77 Kam, J.B. "A Model of

Statistical Data Bases and Their Security," Trans. Database Systems March 1977, pp. 1-

ACM

,

10.

Key Words: Key Words:

control, methods.

Key Words:

statistical,

models.

database, control.

KAT-73 HOF-73

HSI-79a

Hoffman, L.J., (Ed.) Security and Privacy in Computer Systems Melville Publishing Co., Los Angeles, ,

Katzan, H.,

Computer Data Security

S.E. Madnick, (Eds.)

J.Wiley

Computer Security Academic Press, New York 1979.

1973.

,

Key Words: book, Key Words: book,

Sons.

New

.

York.

general.

JON-75

KIE-78

Jones, A,K., and R.J. Lipton, L.J.,

Modem

"Capability Managers,"

Pohcies for Computation," Operating Systems

Trans. Software Engr.

ACM

Privacy

Review No.

Prentice Hall, Cliffs, NJ, 1977.

Key Words: book, methods.

Kieburtz. R.B.. A. Silberscatz

"The Enforcement of Security

Methods for Computer Security and

Englewood

general.

general.

HOF-77

,

&

Key Words: book, methods,

CA, 1973.

Hoffman,

Jr.

Hsiao, D., D.S. Kerr, and

,

5,

November

1978, pp. 467-477.

1975, pp.

Key Words:

197-206.

Key Words:

policies,

10-6

IEEE

,

methods.

control, cj^ability.

LAM-69

MAC-79

LIN-76

Lampson, B.W., "Dynamic Protection

Linden, T.A.. (Ed.) Security Analysis and

MacCauley,

Structures," Proc. Fall Joint

Comp. Conf. AFIPS Press, Reston, VA, 1969, pp. 27-38.

Enhancements of Computer Operating Systems IR 761041, National Bureau of

Secure Operating System," Proc. 1979 Natl. Comp. Conf.

Key Words: models,

April 1976.

.

,

Standards, Gaithersburg,

AFIPS

MD,

Key Words: OS,

LAM-71 "Protection," Proc. 5th

Princeton Conference on 1971, pp. 437-443.

,

Key Words:

LIN-76a Linden, T.,

"Operating System Structures

Information Systems

models, theory,

to

Support Security and

ReUable Software," ACM Computing Surveys December ,

1976, pp. 409-445.

methods.

Key Words: OS,

LAM-73 Lampson, B.W., "A Note on the Confinement Problem," Communications of ,

October 1973, pp.

345-353.

Key Words:

covert channel.

LAM-76 Lampson, B.W., and

,

252.

Key Words: OS.

MiUen,

J.,

"Security Kernel Vahdation In

LIP-77

Communications of

Practice,"

Lipton, R.J., and L. Snyder

the for

Deciding Subject Security," July Journal of the 1977, pp. 455-464.

ACM

Key Words:

,

control, theory.

ACM May ,

1976. pp. 243-

250.

Key Words:

verification,

kernel.

MIL-78 Millen, J.K.

"Reflections on an Operating

System Design," Commimications of ,

McPhee, W.S. "Operating System Integrity of OSA'S2," IBM Systems Journal No. 3, 1974, pp. 230-

MIL-76

design,

methods.

H.E. Sturgis

ACM May

design.

vulnerabiHties.

"A Linear Time Algorithm

613-615.

,

pp.

MCP-74

design.

ACM

VA,

threats,

Lampson, B.W.,

the

Press. Reston,

A

of

Key Words: MLS. OS,

methods.

Sciences

Drongowski,

E., P.

"KSOS - The Design

"Constraints and Multilevel

LIP-78 Lipton, R.J., and T.A.

the

1976, pp. 251-

"On Classes of

Budd

Protection

De

Security," in DeMillo, R., al.

Millo, R.A.,

Secure Computing (10:

(Eds.), Foundations of

78), 1978, pp. 205-222.

Systems," in

265.

et. al.,

Key Words: OS, methods,

Secure Computations 1978, (10: DEM-78), pp. 281-296.

et.

Foundations of

(Eds.),

,

DEM-

,

Key Words: MLS, models, theory.

design.

Key Words: models,

theory.

MIN-76

LAN-79

Minsky, N.

LIP-78a

Lange, A.G. Fraud and Abuse in

Lipton, R.J. and L. Snyder

Government Benefit

"On Synchronization and

Programs U.S. Department of Justice, Washington, DC, November 1979.

Security," in

,

Key Words:

De

Millo, R.A.,

Foundations of Secure Computations , 1978 (10: DEM-78), pp. 367-385.

et

al.,

(Eds.),

crime,

Key Words: models,

govenunent.

"Physical Integrity in a Large

"Operating System Penetration," Proc, 1975

Nad. Comp. Conf. Press, Reston,

,

VA,

AHPS

pp. 361-

Segmented Data Base," ACM Trans. Database Systems ,

March 1977,

pp. 91-104.

368.

Key Words: Key Words: OS.

ACM

,

March 1976,

pp.

148-159.

Key Words:

database, methods.

MIN-78

Lorie, R.A.

Linde, T.A.

the

theory.

LOR-77

LIN-75

"Intentional Resolution of Privacy Protection in Database Systems," Communications of

Minsky, N. "The Principle of Attenuation of Privileges and Its Ramifications," in DeMillo. R., (Eds.) Foundations of Secure

Computing Academic ,

New

Press,

York, 1978, pp. 255-276.

database,

integrity.

vubierabiUties.

10-7

Key Words: models,

theory.

MOR-73

NEU-77

A

Programming Languages," Commtmications "Protection in

of the

ACM

PET-67

Neumann,

Morris, J.H.

Peters, B.

al.

Provably Secure Operating

"Security Considerations in a Multi-Purpose Computer Systems," Proc. 1967 Spring Joint Comp. Conf. AFIPS Press, Reston. VA, pp. 283286.

System: The System, Its Applications, and Proofs , Stanford Research Institute, Menlo Park, CA, 1977.

January 1973,

,

P.G., et

pp. 15-21.

,

Key Words: methods, Key Words: OS,

software.

verification,

Key Words: methods,

methods, design.

design.

MOR-79 Morris, R., and K.

Thompson

"Password Security: A Case History," Communications of

the

ACM

,

POP-78

Neumann,

Popek,

P.G.,

"Computer Security Evaluation," Proc. 1978

November 1979,

G

,

and C. Kline.

'Issues in Kernel Design,"

Proc, 1978 Natl. Comp. Conf.,

Natl.

AFIPS

Comp. Conf. AFIPS Press, Reston, VA, pp. 1087-1095.

pp. 594-597.

Key Words:

NEU-78

,

Press, Reston.

VA.

pp.

1079-1086.

control, case.

Key Words:

NEE-72

Key Words: OS.

threats, risk,

methods.

kernel,

design.

Needham. R.M. "Protection Systems and

Comp. Conf. Reston. VA,

Proc. Fall Joint

AFIPS

Press.

POP-78a

NIE-75 Nielsen, N.R.

Protection Implementation," ,

pp. 571-578.

"Computers, Security, and the Audit Function," Proc, 1975 Nad. Comp. Conf. AFIPS Press, Reston, VA, pp. 947,

Key Words: models,

Popek, G.J., and D.A. Farber, "A Model for Verification of Data Security in Operating Systems," Communications of the

ACM

,

September 1978. pp.

737-749.

954.

methods.

Key Words:

Key Words: OS,

control, auditing.

verification.

NEE-77 Needham, R.M., and R. Walker "The Cambridge CAP Computer and Its Protection

ACM

POP-79

NIE-76 Nielsen, N.R., B.Ruder, and

D.H. Brandin, "Effective Safeguards for

Operating Systems Review, No. 4,

Computer System

1977, pp. 1-10.

AFIPS

System,"

Integrity,"

Comp. Conf Reston. VA. pp.

Proc. 1976 Natl. Press,

.

Popek, G., et al., "UCLA Secure Unix," Proc. 1979 Natl. Comp. Conf. , AFIPS Press, Reston, Va, pp. 355-364.

Key Words: OS,

75-84.

design, case.

Key Words: OS, methods, Key Words:

case.

PUR-74

integrity,

Purdy, G.

methods.

NEU-76 Neumann,

"A High P.O., et

ORC-78

al.

ACM

"Software Development and

Orceyre, M.J., and

the

Proofs of Multilevel

R. Courtney,

442-445.

Jr.

Security," Proc, 2nd Intemat. Conf. on Software Engr.

Considerations in the

October 1976,

Measures

,

Log-In

Seciffity

Procedure," Communications of ,

August 1974, pp.

Key Words:

Selection of Security

Key Words: MLS.

Automatic Data Processing Systems SP 50050, National Bureau of

verification.

Standards, Giathersburg,

control, methods.

for

,

June 1978.

MD,

REE-74 Reed, S.K., D. Branstad, (Eds.) Controlled Accessibility Workshop Report TN 827, National Bureau of Standards, ,

Key Words:

guidelines,

methods.

Gaithersburg,

Key Words: models.

10-8

MD, May

proceedings,

1974.

SCH-72

REI-78 Reiss, S.P.

Schroeder, M.A., and

"Medians and Database

J.Sal tzer,

De

Security," in

Millo, R.A.,

STO-76 Stonebraker, M., P. Rubenstein

'The

"A Hardware

eL al. (Eds.), Foundations of Secure Computing 1978 (10:

Architecture for Implementing Protection Rings," Communications of

DEM-78),

the

,

pp. 57-91.

ACM

.

March 1972,

Computer Misuse SP 5(X)-25, National Bureau

Intentional

VER-78 al.

"Program Confinement in KVM/370," Proc. 1977 ACM

of Standards, Gaithersburg, MD, January 1978.

Key Words:

Verhofstad, J.S.M.

Schaefer. M., et

,

threads methods.

National Conf.. pp. 404-410.

ACM,

1977,

Key Words: OS, methods,

Ruthberg, Z., R.

McKenzie

(Eds.)

MD,

October

Cleveland.

ACM

,

ACM,

1977, pp. 43-56.

Key Words: OS.

control, auditing.

.

OH.

1974.

Key Words: MLS. models,

WAR-67

kernel,

Ware, W.H. "Security and Privacy in

design.

Computer Systems," Proc.

Schwartz, M.D.,

Spring Joint

D.E. E)enning, and

AFIPS

P.J.

SAL-74

Primitive

theory.

SCH-79 proceedings,

al.

Project," Proc. 6th

1977.

Key Words:

darabase,

and J.H. Saltzer "The Multics Kemel Design

Systems Principles

Gaithersburg,

Key Words: rceovery.

Models for Computer Security ESD-TR-4-117. Case Western Reserve University.

Computer Security

National Bureau of Standards,

1978. pp. 167-195.

Walter. K.G. et

Symposium on Operating

,

ACM

Computing Surveys. June

WAL-74

SCH-77a

Audit and Evaluation of Proceedings of an Invitational Workshop, SP 500-19,

"Recovery Techniques for Database Systems,"

case.

Schroeder, M.D., D.D. Clark,

RUT-77

control,

control, hardware.

SCH-77

Ruder, 6., and J.D. Madden An Analysis of Computer Security Safeguards for Detecting and Preventing

80-84.

case.

Key Words:

RUD-78

ACM

Key Words: DBMS,

statistical,

methods.

Protection

pp.

157-170.

Key Words:

INGRES

System," Proc. 1976 Nad. Conf. . ACM, 1976. pp.

Denning

Comp. Conf. VA, ,

Press, Reston,

1967, pp. 279-282.

"Linear Queries in Statistical

Saltzer,

ACM

Databases,"

J.,

Key Words:

Trans.

"Protection and Control of

Database Systems , March

Information Sharing in

1979, pp. 156-167.

WAR-67a

MULTICS," Communications of the ACM. July 1974. pp. 388-402.

Key Words:

threats, statistical.

STO-74

Key Words:

control, methods,

Ware, W.H. "Security and Privacy: Similarities and EHfferences," Proc. Spring Joint

Stonebraker, M.. and E.

Wong

Conf.

VA,

"Access Control in a

case.

policy, general.

.

AFIPS

Comp.

Press. Reston,

1967, pp. 287-290.

Relational Data Base

SAL-75 Saltzer,

J.,

and

Management System by Query

Key Words:

Modification," Proc. 1974

general.

M.A. Schroeder,

ACM

'The Protection of

1974, pp. 180-186.

Information in Computer Systems," Proceedings of the

Key Words: DBMS,

IEEE September

case.

,

1975, pp.

Annual Conf.

ACM.

WAR-70 Ware, W.H., (Ed.)

control,

Security Controls for

Computer

Systems Report R-609, Rand Corporation, Santa Monica, CA, February 1970, (Reissued as R-609- 1. October 1979). .

1278-1308.

Key Words:

.

requiremnets,

control, methods.

Key Words: methods.

10-9

policy, models,

WOO-77

WEI-69 Weissman, C,

WOO-79

"Security Controls in the

Wood, H. The Use of Passwords

ADEPT-50 Time-Sharing

Controlled Access to

System," Proc. Fall Joint Comp. Conf. . AFEPS Press, Reston, VA, 1969, pp. 119-

Computer Resources SP 5009, National Bureau of

Woodward,

Secure Operating Systems." Proc. 1979 Nad. Comp. Conf.

,

May

Key Words: MLS. OS,

Key Words:

models, case.

control.

AFIPS

MD,

Standards, Gaithersburg,

133.

J.P.L.

"Applications of Multilevel

for

Press, Reston,

VA,

.

pp.

821-830.

1977.

Key Words: MLS, OS, guidelines,

general.

WEI-75 Weissman, C. "Secure Computer Operation with Virtual Machine Partioning," Proc, 1975 Natl.

Comp. Conf. AFIPS Press, Reston, VA, pp. 929-934. .

Key Words: OS, methods, design.

C. Communications Security

AME-78 Ames,

BRA-78

COL-78

Branstad, D.K.

S.R.,

D.R. Oesterreicher "Design of a Message

"Security of

Cole. G.D.. and F. Heinrich

Computer

Design Alternatives for

Processing System for a

Commimications," IEEE Communications Magazine

Multilevel Secure

November

Environment," Proc. 1978 Natl. Comp. Conf. AFIPS, Reston, VA. pp. 765-771. ,

Key Words: MLS,

design,

Computer Network Security SP 500-21, National Bureau of ,

.

1978, pp. 33-40.

Standards, Gaithersburg,

Key Words: methods, Key Words:

networks.

"Safeguarding Cryptographic

"Cryptography Using Modular Software Elements," Proc. 1976 Natl. Comp. Conf. AFIPS. Reston, VA, pp. 113-

Keys," Proc. 1979 Nad.

123.

Comp. Conf. AFIPS Press, Reston, VA, pp. 313-317.

Key Words:

BLA-79 Blakely, G.R.,

Denning, D.E. "Secure Personal Computing in an Unsecure Network," Communications of the ACM, August 1979, pp. 476-482.

.

Key Words: PC,

,

Key Words:

BRA-78 Branstad, D.K. (Ed.)

Computer Security and

the

Data Encryption Standard SP 500-27, National Bureau of ,

Standards. Gaithersburg.

crypto, software.

MD,

DIF-76

Burris, H.R.

Diffie,

"Computer Network Cryptography Engineering," Proc. 1976 Nad. Comp. Conf.

"New

AFIPS

Press, Reston.

VA.

pp.

W.. and M. Hellman, Directions in

IEEE

Cryptography." .

Trans, on

Inform. Theory November 1976. pp. 644-654. .

91-96.

Key Words: Key Words:

crypto, design.

February 1978.

Key Words: DES,

network,

crypto.

BUR-76

crypto, keys,

control.

networic, design.

DEN-79

BRI-76 Bright, H.S., and R.L. Enison

case.

MD,

January 1978.

crypto,

general.

10-10

crypto, theory.

GAO-77

DIF-77 W.. and M.E. Hellman "Exhaustive Cryptanalysis of the

NBS

Data Encryption

Standard,"

LEM-79

Vulnerabilities of

Diffie,

IEEE Computer

,

Telecommunications Systems to Unauthorized Use LSD-77102, U.S. General Accounting Office, Washington, DC, 31 ,

June 1977, pp. 74-84.

March 1977.

Key Words: DES,

Key Words:

analysis.

W., and M. HeUman,

ACM

network,

threats.,

in Transition,"

Computing Surveys December 1979, pp. 285-303. .

Key Words:

crypto, general.

LEN-78 Lennon, R.E., "Cryptography Architecture for

HEL-77

DIF-79

Lempel, A. "Cryptology

Hellman, M.E. "An Extension of Shannon

Information Security,"

"Privacy and Authentication:

An

Theory Approach

pp. 138-150.

Diffie,

Introduction to

IEEE

Crtyptography," Proceedings

Cryptography,"

of the IEEE March 1979, pp. 397-429.

Informal. Theory

Key Words:

Key Words:

.

to

,

IBM 2,

1978,

Trans.

May

,

Systems Journal No.

1977,

Key Words:

crypto, design.

pp. 289-294.

LIE-78 crypto, genral.

crypto, theory.

and

Lientz, B.P.,

I.R.

Weiss

'Tradeoffs of Secure

KAH-67

EHR-78 Ehrsam, W.F., et al. "A Cryptographic Key

Management Scheme

Kahn, D. The Codebreakers Macmillan, New York, 1967.

Processing in Centralized vs. Distributed Networks," Computer Networks February 1978, pp. 35-43.

Key Words: book,

Key Words:

,

for

,

Implementing the Data Encryption Standard,"

Systems Journal No. ,

IBM

KAM-78 crypto,

keys.

Kam, J.B., and G.I. Davida "A Structured Design of Substitution Permutation

and

De

Encryption Network,"

FEI-75 Feistel H., J.

W.

Foundations of Secure

Smith,

Computing 1978,

Techniques for Machine-toMachine Data Communications," Proceedings of the IEEE November 1975, pp. 1545-

78), pp. 95-131.

,

Key Words:

(10:

DEM-

crypto, general.

crypto, design.

crypto, methods,

MAT-79 "Digital Signatures:

An

'The Lattice Model in a

Networks April 1979, pp. 87-

Public Computing Network,"

94.

ACM

,

Natl.

,

Comp.

1978, pp. 453-459.

Key Words:

signatures,

general.

Key Words: modesl, network.

Hardware

Implementations of the Data Encryption Standard, SP 50020, National Bureau of Standards, Gaithersburg,

MD,

November 1977.

Key Words: DES,

Key Words:

Systems Journal 1978, pp. 126-137.

Overview," Computer

J.

Validating the Correctness of the

,

2,

Karger, P.A.

Conf.

Gait,

IBM

Keys,"

Maty as, S.M.

KAR-78

Proc.

GAI-77

"Generation, Distribution, and Installation of Cryptographic

keys.

,

1554.

Maty as, S.M., and C.H. Meyer

No.

Millo, R.A., (Ed.),

Notz,

"Some Cryptographic

Key Words:

networks, design.

MAT-78

1978, pp. 106-125.

Key Words: DES,

crypto,

general.

2,

KLI-79 Kline, C.S., and G.J.

"PubHc-Key

Key

vs.

Conventional

Encryption," Proc. 1979

Comp. Conf. Press, Reston, VA,

Natl.

crypto,

Popek

,

ARPS

pp. 831-

838.

hardware.

Key Words:

crypto, public-

key.

10-11

MER-78 Merkle, R., "Secure Communication Over Insecure Channels," Communications of the , April 1978, pp. 294-299.

ACM

Key Words:

crypto, methods.

NEE-78

MER-78a

POP-79

Merkle, R.C.. and

Needham, R. and

M.E. Hellman

Schroeder. M..

ACM

"Hiding Information and

"Using Encryption for

Signatures in Trapdoor

Authentication in Large

Knapsacks," IEEE Trans, on

Networks of Computers." Communications of the ACM.

Inform. Theory . September 1978. pp. 525-530.

Key Words:

crypto,

knapsack.

,

December 1978. pp. 993-999.

Key Words:

Popek. G.J.. and C.S. Kline "Encryption and Secure Computer Networks," Computing Surveys December 1979, pp. 331-356.

crypto, control,

Key Words:

cryoto, networks.

RAB-78 Rabin. M.O.

authentication.

"Digitalized Signatures." in

MEY-73

PAD-79 Padlipsky. M.A.. et

Meyer, C.H. "Design Considerations for Cryptography," Proc. 1973

Applications." Proc. 1979 Na.

Comp. Conf. AFIPS Press. Reston. VA. 1973.

Comp. Conf. AFIPS Press, Reston, VA. pp. 373-382.

Natl.

.

Key Words:

crypto, design.

al.

"KSOS - Computer Network .

Key Words: OS. network,

of Secure Computing . 1978. (10: DEM-78). pp. 155-168.

Key Words:

signatures,

general.

RrV-78 Rivest. R., A. Shamir,

methods.

MEY-78

and L. Adieman

"A Method

PEL-79

Meyer. C.H.

and A. Rosenfeld

"Ciphertext/Plaintext and

Peleg. S.,

Ciphertext/Key Dependence

"Breaking Substitution Ciphers Using a Relaxation AJgorithm," Communications of the ACM November 1979,

Number

of Rounds for the Data Encryption

vs.

De

Millo. R.A., (Ed.), Foundations

Standard," Proc. 1978 Natl.

Comp. Conf. AFIPS Press, Reston. VA. pp. 1119-1126. .

design.

Key Cryptosystems," Communications of the

ACM.

February 1978. pp. 120-126.

,

pp. 598-605.

Key Words: RSA.

public-key,

signatures.

Key Words: Key Words: DES.

for Obtaining

Digital Signatures and Public-

analysis, crypto,

SHA-49

algorithms.

Shannon. C.E..

MIC-79

"A Communications Theory of Secrecy Systems." Bell System Techn. Journal October 1949, pp. 656-715.

PLE-77

Michelman. E.H. "The Design and Operation of Public-Key Cryptosystems." Proc. 1979 Nad. Comp. Conf. AFIPS Press. Reston, VA, pp. 115.

Pless, V.S.

"Encryption Schemes for Computer ConfidentiaUty." IEEE Trans, on Computers

November 1977,

.

,

pp. 1133-

Key Words:

control, crypto.

POP-78

MD.

15

Key Algorithms and Signatures in

November 1979.

ACM.

pp. 612-613.

EHgital

Networks." in De Millo. R.A., (Ed.), Foundations of Secure ,

(10:

DEM-

78). pp. 133-153.

Key Words: DES.

crypto,

Key Words:

Key Words:

crypto, protocols.

Computer

Computing 1978.

January 1977.

general.

Share a Secret,

"Encryption Protocols. Public

Data Encryption Standard. FIPS PUB 46. National Bureau of Standards, Gaithersgurg,

to

Communications of the

Popek, G.J., and C.S. Kline

NBS-77

Shamir, A.

"How

crypto, public-

key, design.

crypto, theory.

SHA-79

119.

Key Words:

Key Words:

1136.

crypto, protocols.

SKA-69 Skatrud. R.O.

"A Consideration of Applying Cryptographic Techniques to Data Processing." Proc. Fall Joint Comp. Conf. AFIPS Press, Reston, VA, 1969, pp. 111-117. .

Key Words:

10-12

crypto, methods.

SIM-79 Simmons,

TUR-73 G.,

"Symmetric and Asymmetric Encryption,"

WOO-77

Turn, R.

ACM

Computing Surveys December 1979, pp. 117-128. .

Wood, HJ^.

"Privacy Transformations for Databank Systems," Proc.

1973 Natl. Comp. Conf. .

AFIPS

Press. Reston,

VA,

pp.

589-600.

Key Words:

Smith,

WA.

J.L.,

.

crypto, general.

Key Words:

WIN-74

Notz,

and P.R. Osseck "An Experimental Application of Cryptography to a Remotely Accessed Data System," Proc. Natl. Conf. 1972, pp. 282-297.

ACM

.

Remote Computer Systems and Services," Ptoc. 1977 Nad.

Comp. Conf. AFIPS Press, Reston, VA, pp. 27-33.

crypto, methods.

Key Words: SMI-72

"Using Passwords for Controlling Access to

control, network,

passwords, methods.

Winkler,

S., and L. Danner "Data Security in the

Enviroiunent,"

WOO-79 Wood, H.M.

Communications

IEEE

Computer February 1974, pp. .

23-31.

"Access Control Mechanisms Network Operating System." Proc. 1979 Natl. Comp. Conf. AFIPS Press. Reston, VA, pp. 821-830. for a

,

Key Words:

Key Words: methods,

crypto, case.

network.

SMI-79

Key Words: OS,

Smid, M.E.

A

control,

network.

Key

Notarization System Computer Networks SP 500-54, National Bureau of for

.

Standards, Gaithersburg,

MD,

October 1979.

Key Words: crypto, management, keys, case.

D. Privacy BER-75

Security Costs: a

Workshop

CON-74

COE-74

Berg, J. (Ed.) Exploring Privacy and Data

.

Summary

TN

of

Protection of the Privacy of

Privacy Act of 1974

Individuals Vis-a-Vis

579), U.S. Congress.

Electronic Data

Banks

in the

.

(P.L. 93-

Washington, DC, 1974.

Public Sector. Resolution

876.

National Bureau of Standards, Gaithersburg. MD. August

(74)29. Council of Europe,

1975.

September 1974.

Strassbourg, France. 20

Key Words: PA.

privacy, laws.

CON-76 Legislative History of the

Key Words:

privacy, design.

COE-73

Key Words:

privacy, policy.

Privacy Act of 1974

Book on

.

Source

Privacy. Senate

Committee on Government

CON-68

Operations, U.S. Congress,

Protection of the Privacy of

Privacy and the National

Individuals Vis-a-Vis

Washington, DC. 1976.

Private Sector . Resolution

Databank Concept, House Report No. 1842, House Committee on Government

(73)22, Council of Europe,

Operations, U.S. Congress,

privacy.

Slrassbourg, France, 26

Washington, DC,

September 1973.

1968.

Electronic Data

Key Words:

Banks

in the

privacy, policy.

Key Words:

May

Congress,

privacy.

10-13

2,

Key Words: Congress, PA,

HUN-74

GOL-76

CrF-72 Privacy and Computers,

Report of A Task Force of Departments of

Communication and

Justice,

Goldstein. R.C., H.H. Seward,

and R.L. Nolan

A

Methodology

for Evaluating

Alternative Technical and

Information

1972.

Approaches to Privacy Requirements TN 906, National Bureau of Standards, ,

privacy, foreign.

MD,

Gaithersburg,

Databank Systems: An Annotated Bibliography R1361-NSF, The Rand Corporation. Santa Monica, .

Management

Information Canada, Ottawa,

Key Words:

Hunt, M.K.. and R. Turn Privacy and Security in

June 1976.

DUN-67

CA.

1974.

Key Words:

privacy,

awareness.

Dunn, E.S., Jr. "The Idea of National Data Center and the Issue of Personal Privacy," American February 1967,

Statistician ,

pp. 21-27.

Key Words:

privacy, methods.

KIR-79

HAR-67

Kirby,

Harrison, A.

The Problem of Privacy

in the

Computer Age: An Annotated Bibliography RM-5495PR/RC, The Rand ,

Key Words:

privacy, threats,

methods.

M.D.

"Developing International Rules to Privacy," Computer Networks June 1979, pp. 149,

163.

Corporation, Santa Monica,

Key Words:

CA, December

foreign, laws.

1967.

privacy, policy,

FLA-79 Flaherty. D.H.

Key Words:

Privacy and Government

awareness.

Data Banks: International Perspective Mansell Publishing, London, 1979. ,

Key Words: book,

privacy,

foreign.

FON-77 Fong, E. Data Base Management Approach to Privacy Act Compliance SP 500-10, National Bureau of Standards. Gaithersburg. MD, June

A

.

Harrison, A.

Linowes, D.F. (Chrmn.) Personal Privacy in an Information Society Report of the Privacy Protection Study

The Problem of Privacy in the Computer Age: An Annotated

Commission, Government Printing Office, Washington,

Bibliography, Vol. 2

DC,

HAR-69

,

,

RM-

5495/1 -PR/RC, The Rand Corporation, Santa Monica, CA, December 1969.

Key Words:

privacy,

PA.

ACM

A

Computing

Report of the Committee on Data Protection, Cmnd. 7341, Her Majesty's Stationery Office, London, December 1978.

Key Words:

103.

privacy, general,

policy, foreign.

Key Words:

Goldstein. B.

The Cost of Privacy

privacy, general.

MAS-79

.

Honeywell Information

MA,

1975.

HON-75

Masuda, Y,

Hondius, F.W.

"Privacy in the Future

Emerging Data Protection in Europe North-Holland Publishing Co., Amsterdam,

Information Society,"

,

design.

privacy, general,

policy, laws.

,

GOL-75

Key Words: book,

PA,

Surveys June 1969, pp. 85-

methods.

Systems, Brighton,

Key Words:

Lindrop, N. (Chrmn.)

HOF-69

Survey,"

1977.

LIN-78

privacy,

awareness.

Hoffman, L.J. "Computers and Privacy:

1977.

Key Words:

LIN-77

privacy,

privacy,

Computer Networks June ,

1979, pp. 164-170.

1975.

Key Words: Key Words:

privacy, foreign.

10-14

privacy, general.

ONL-76

MIL-69 MiUer. A.R. "Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society,"

STA-79

Privacy and the Computer.

OnLine Conferences,

Ltd.,

Uxbridge, England, 1976.

Legislation," Computer Networks June 1979, pp. 174-

Key Words:

186.

,

proceedings,

privacy, policy, foreign, laws.

Michigan Law

Review April 1969, ,

G. "Survey of National Data

Stadler,

Key Words:

ONL-78

pp.

1089-1247.

privacy, Iwas,

foreign.

Transnational Data Regulation,

Proceedings of Brussels Conf.,

Key Words:

threats, privacy,

OnLine Conferences,

Ltd.,

Uxbridge. England, 1978.

policy, requirements.

MIL-71 MiUer, A. The Assault on Privacy University of Michigan Press, Ann Arbor, MI, 1971.

Key Words: proceedings. TDF, privacy, foreign.

STE-79 Steinmueller, W.,

"Legal Problems of Computer Networks: A Methodical Survey," Computer Networks

,

June 1979, pp. 187-198.

,

ROO-79 J.D.

Key Words: book,

privacy,

Key Words:

Rooms, P.L.P, and

Rooms

"Problems of Data Protection

Law

policy, threats, laws.

MUR-72 J.A., (Ed.)

Turn, R., and W.H. Ware "Privacy and Security Issues in Information Systems," IEEE

1979, pp. 205-218.

Trans, on Computers

Key Words: TDF,

privacy,

1361.

laws.

North Americans University of Windsor Press, Windsor, Canada, 1972.

Key Words:

,

TUR-77

Rosenberg, J.M. Privacy,

Random House, New York,

proceedings,

1969.

privacy, policy, foreign.

privacy, general.

ROS-89 The Death of

Key Words:

,

December 1976, pp. 1353-

Infonnation Processing and the Right of Privacy: A Crossroads Oecision for

TUR-76

Commimications Networks," Computer Networks June

for Private Multinational

,

Murray,

privacy, laws,

networks.

Turn, R. "Privacy Protection in Information Systems," in

M.C. (Ed.), Advances Computers Vol. 16, 1977,

Yovits,

Key Words: book,

OEC-76 Policy Issues in Data Protection and Privacy

1974

OECD

privacy,

Proc,

Key Words:

SIE-76

Seminar in

Paris, Organization for

Sieghart, P.

Economic Cooperation and

Privacy and Computers, Latimer, London, 1976.

Development,

Key Words:

Paris, 1976.

Key Words: book,

proceedings,

privacy,

general.

privacy, policy, foreigiL

Turn R. (Ed.) Transborder Data Flows, Vol. 1: Concerns for Privacy and Free Flow of Information ,

SMI-79 Smith, R.E.

Proc. 1977

What's Left of

Symposium in Vienna, (>ganization for Economic Cooperation and Development, Paris, 1979.

Privacy

Press, Reston,

VA,

1979.

Transborder Data Flows and the Protection of Privacy ,

privacy, general.

TUR-79

AFIPS

OEC-79

OECD

,

pp. 221-335.

threats. ,

in

— How

to Protect It,

Press/Doubleday,

Anchor

New

Key Words: TDF,

policy,

general.

York,

UCL-68

1979.

'The Computerization of

Key Words: book, general.

Key Words: proceedings, privacy, TDF, poUcy, foreign.

privacy,

Government Files: What Impact on Individual?," UCLA Law Review September 1968, ,

pp. 1371-1498.

Key Words:

10-15

privacy, threats.

WAR-73 Ware, W.H. (Chmn.) Records. Computers, and Rights of Citizens.

HEW

Secretary's Advisory Commit, on Automated Personal Data

Systems, Dept. of Health, Education and Welfare, Washington, DC, July 1973.

Key Words:

Westin, A.F., and

MA.

WES-79 Baker

Databanks in a Free Societv Quadrangle Books, New York, .

1972.

Key Words:

privacy, general.

WES-76 Westin, A.F.

privacy, policy.

Computers. Health Records, and Citizen Rights NBS

Westin, A.F.

Computers. Personnel Administration, and Citizen Rights . SP 500-50, National

Bureau of Standards, Gaithersburg, MD, DC, July 1979.

Key Words: privacy, employment

policy,

.

WES-67 Westin, A.F. Privacy and Freedom

Atheneum

WES-72

Monog.

Bureau

of Standards, Gaithersburg,

.

Publishers,

New

York, 1967.

Key Words:

157, National

MD, December Key Words:

1976.

privacy, medical.

privacy, general.

YOU-72 Younger, K. (Chrmn.) Report to the Committee on Privacy. Cmnd. 5012, Her Majesty's Stationery Office, London, July 1972.

Key Words:

10-16

privacy, foreign.

Appendix A: This appendix contains a

Assets Protection

of the periodicals cited in

Computer Law and Security

.

Paul D. Shaw, Editor. Assets Protection Publishing,

PO Box

list

Periodicals

5323, Madison,

WI

53705. 608-231-3817 (Vol. 5 in 1989).

Auerbach Data Security

IEEE Cipher

Security (^arterly. Paul Evans, Editor. Elsevier Science Publishing

Eclipse Publications Ltd., 18-20

Highbury Place, London, N5 IQP, U.K., Tel:01 -354-5858. Ed: 0703-593404 (Vol. 5 in 1989).

(Quarterly.

Newsletter of the IEEE Computer Society's Technical Committee on Security and Privacy.

Dave Bailey, Editor. IEEE Computer Society, 1730 Massachusetts Ave. N.W., Washington, DC 20036-1903. 505-846-4600 (Vol. 10 in 1989).

COM -AND.

Computer Audit

Bimonthly. J.F.

Kuong,

617-235-2895 (Vol. 7 in 1989).

Computer Control Quarterly

Computer/Law Joumal Michael D.

Quarterly.

Scott, Editor.

Center for Computer/Law, PO Box 3549, Manhattan Beach, CA 90266. 213-470-6361 (Vol.

9 in 1989).

Bulletin Monthly.

Michael Comer, Editor. Elsevier Science Publishing Ltd., Mayfield House, 256 Bradbury Road, Oxford 0X2 7DH, U.K. (Vol. 11 in 1989).

Rosenberg, Editor.

ACM

Special

Group on Computers

Interest

and Society (SIG/CAS), 11 Street, New York, NY 10036. Ed: 604-228-4142

West 42nd

Computer Security Newsletter

COM-SAC: Computer

Auditing and Controls (Quarterly. J.F.

Computer Security Institute, 360 Church Street, Northboro,

MA 90

01532. 508-393-2600 (No.

in Oct. 1989).

Koimg,

Security,

Editor.

Management Advisory Publicat., PO Box 81151, WeUesley Hills, MA 02181. 617-235-2895 (Vol. 16

in

1989).

Computer Sectnity Digest Monthly. Jack Bologna and Tim Schabeck, Editors.

Corporate Security Digest Weekly. Betty B. Borsage, Editor.

3918 Prosperity Ave., Suite

Computer Protection Systems, Inc., 150 Nortii Main St.,

Computer Security Joumal Irregular.

Russel Kay, Editor.

01532. 508-393-2600 (Vol.

5 in 1989).

Fairfax,

VA

22031-3334. 703-573-1600 (Vol. 3 in 1989).

CPR-J: Contingency Planning & Recovery Joumal Quarterly. J.F. Koung and CM. Winters, Contingency Planning & Recovery Institute and Management Advisory Publications, PO Box 81151, WeUesley HUls, 02181. 617-235-2895 (Vol. 3 in

MA

Computer Security Products Report Quarterly. Paul D. Shaw, Editor.

1989).

Territorial Imperative Inc.,

PO Box

318,

Editors.

Computer Security Institute, 360 Church Street, Northboro,

The Computer Fraud and Security

Newsletter,

(Vol. 19 in 1989).

K.J. Fitzgerald, Editor.

26 Washington Avenue, East Malvem, Victoria, 3145 Australia. (Vol. 9 in 1989).

Society Quarterly.

S.

Bimonthly. Russell Kay, Editor.

MA .

&

Richard

Editor.

Management Advisory Publicat., PO Box 81151. WeUesley Hills, MA 02181.

Ltd., Mayfield House, 256 Bradbury Road, Oxford 0X2 7DH, U.K. (Vol. 8 in 1989).

Computers

Plymouth, MI 48170. 313-459-8787 (Vol. 7 in 1989).

News and Developments

&

Computers

Report Bimonthly. Stephen Saxby, Editor.

Management Bimonthly. Rich Mansfield, Editor. Auerbach Information Management Series, Auerbach Publishers Inc., a Warren, Gorham & Lamont company. One Perm Plaza, New York, NY 10119. 212-971-5000 (Vol. 9 in 1989).

this bibliography.

5323, Madison,

WI

53705. 608-231-3817 (New in

Cryptologia Quarterly.

David Kahn, et al.. Editors. Rose-Huhnan Institute of Technology, Terre Haute, IN 47803. 812-877-1511 (Vol. 13

1986).

in 1989).

A-1

Cryptosystem Journal Irregular.

Tony

Patti, Editor.

9755 Oatley Lane, Burke, VA 22015. 703-451-6664 (Vol. 2 in 1989).

EDP

Auditor Quarterly. William E. Perry, Editor.

EDP

Auditors Association, 373 Schmale Rd, Carol Stream, IL 60187. 312-653-0950 (Vol. S.

18 in 1989).

Data Processing Auditing Report Monthly. Belden Menkus, Editor. John Wiley & Sons. 600 3rd Avenue, New York, NY 10158. 212-692-6000 (Vol. 11 in 1989).

Data Processing & Communications Security

Security BuUetin/Securite de

Paul D. Shaw, Editor. Assets Protection Publishing,

5323, Madison,

WI

53705. 608-231-3817 (Vol. 13 in 1989).

Datapro Reports on Information Security Monthly. Kristen A. Noakes-Fry,

Linda Kirk, Editor. EDP Security Branch, Royal Canadian Mounted Police, 1200 Vanier Parkway, Ottawa, KIA OR2 Canada. 613-993-8783

G.B. Agnew, Editor. Editor: Dept. of Electrical Engineering, University of Waterloo, Waterloo, Ontario 3G1, Canada. 519-885-1211 Ext. 3041 (Vol. 6

N@L

Age

Quarterly.

1989).

Theresa F. Lunt, Editor. Berson & Limt, PO Box 1593, Palo Alto, CA 94302. 415-325-3662 (Vol. 3 in

Richard Arnold, Editor-in-Chief.

5712 Meramar Drive,

MO

St.

63129. 314-846-1001 (Vol. 2 in 1989)

EDPACS: EDP

Audit, Control

and Security Newsletter Monthly. Belden Menkus, Editor-in-Chief.

Warren, Gorham

One Penn

NY

Plaza,

&

York,

ISPNews: INFOSecurity Product

News

Bimonthly.

Farmington,

Street,

MA

01701. 508-879-7999 (New in 1990).

ISSA Access

Quarterly.

Cherie G. Smith, Editor. Information Systems Security

PO Box

in 1989).

Journal of Cryptology Irregular.

Ernest F. Brickell, Editor-in-Chief.

Verlag

Age

New York, Inc., 175 New York, NY

Fifth Ave..

10010. 212-460-1612 (Vol.

Inc.

A

Warren, Groham and Lamont Company, 210 South Street, Boston, 02111. 212-971-5271.

MA

Information Security Monitor

Jack Smith, Editor. IBC Technical Services Ltd., 57/61 Mortimer Street, IBC House, Canada Road, Byfleet,

KT14

1

in 1989).

Journal of Information Systems Security Quarterly.

Gregory

W.

Therklasen,

Peter S. Browne, and

WiUiam H. Murray. Consulting Editors.

Auerbach Publishers. Division of

Lamont,

Gorham

Inc.,

A &

210 South

MA

Boston, 02111-9990. 800-950-1217 Street,

(New

in 1989)

7JL, U.K.

Lamont,

10119. (Vol. 17 in

1989).

See Information

Surrey,

New

1

Cryptologic Research. Springer Information Privacy

Auerbach Publishers,

Quarterly.

TX

International Association of

Monthly. Sanford Sherizen, Editor.

Disaster Recovery Journal

Louis,

J.

Information Security Advisor

1989).

Drive, Dallas,

75240. 214-404-0897 (Vol.

9457, Newport Beach, CA 92658. 714-250-4772 (Vol. 2

year.

08075.

Quorum

Association, Inc.,

in 1989).

Data Security Letter 9 times a

NJ

Info Gnformation Security and Access Control) Bi-monthly. Isolation Systems Inc., 14800

498 Concord

Research.

Hayes, Editor. Butterworth Scientific Ltd., PO Box 63, Westbury House, Bury Street, Guilford, Surrey GU2 5BH, England. (Vol. 11 in

Parkway, Dekan, 609-764-0100.

ISAC

Newsletter Quarterly.

Newsletter of the International Association for Cryptologic

Information

Corporation, 600 Delran

1989).

in 1989).

Editor.

Datapro Research

Advisor Monthly. Michael Scott, Editor. Law and Technology Press, PO Box 3280, Manhattan Beach, CA 90266. 213-470-9976 (Vol. 3 in

L'informatique Irregular.

lACR

Quarterly.

PO Box

EDP

Computer Law

International

Journal of Security Administration

Lntemal Auditor Bimonthly. of Internal Auditors, 149 Maitland Avenue, Altamonte Springs, PL 32701. 305-830-7600. Institute

Semiannual.

Norman

Press, 1550 Northwest Highway, Park Ridge, IL 60068. 305-279-9437 (Vol. 11 in

1989).

A-2

R. Bottom, Editor.

London House

News

PIN: Personal Identification 11 times a year.

Ben

Tom

Miller and George

Warfel, Editors.

Warfel

&

Security, Audit

&

Control Review

Quarterly.

Miller. Inc.,

PO

11018. Washington. DC 20008. 301-652-9050 (Vol. 5

Box

in 1989).

Privacy Journal Monthly.

Robert E. Smith. Editor. PO Box 15300. Washington DC 20003. 202-547-2865 (Vol. 15 in 1989).

ACM

Richards, Editor. Special Interest

Group on

Security, Audit and Control

(SIG/SAC), 11 West 42nd Street, New York. NY 10036. 817-565-3110 (Vol. 6 in 1989). Biweekly. Robert McCrie, Editor. Security Letter, 166 East 96th St., New York, NY 10128. 212-348-1553 (Vol. 20 in

Sectirity Letter

Software Law Journal Quarterly. Michael D. Scott, Editor. Center for Computer/Law, PO Box 3549, Manhattan Beach, CA 90266. 213-470-6361 (Vol. 2 in 1989).

Software Protection Monthly. Michael Scott, Editor.

Law and Technology

Press,

PO Box

3280, Manhattan Beach. CA 90266.

213-470-9976 (Vol. 8

in

1989).

1989).

Privacy Times Bi-weekly. Evan Hendricks. Editor.

PO Box

DC

21501. Washington, 20009. 202-526-2415

(Vol. 7 in 1986).

Quality Assurance Quest Monthly.

W.E.

Perry. Editoi

Quality Assurance Institute. Suite 350. Dr. Phillips Blvd.

FL

32819. 407-363-1111 (Vol. 9 in Orlando, 1989).

Transnational Data Report

Management Monthly.

Security

American Association

for

North Fort Myer Drive, Suite 1200, Arlington. VA 22209. 703-522-5800 (Vol. 33 in

2039, 22152. 202- 488-3434 (Vol. 12 in

1989).

1989).

Security Systems Administration

Monthly.

Thomas

PTN

S. Kapinos. Editor.

Publishing Co.. 101

Analysis.

1989).

in

New

Security

World Monthly.

Frances Bouchoux, Editor-in-

Kerrigan Lyndon, Editor. Cahners Publishing Co.. Cahners Plaza, 1350 E. Touchy Avenue, PO Box 5080, Des Plaines, IL 60018. 312-635-8800 (Vol. 26 in

Chief.

1989).

York,

Rutgers Computer and Technology Law Journal Semiannual. .

Rutgers

Law

Service. Inc.. Springfield,

PO Box

VA

The EDP Auditor Journal The EDP Auditors Foimdation, PO Box 88180. Carol Stream. IL. 60188-0180.

Virus Bulletin Monthly. Edward Wilding. Editor. Virus Bulletin. Ltd..

Curtis Travis. Editor-in-Chief.

10013. (Vol. 9 in 1989).

Editor.

Transnational Data Reporting

Risk Analysis Quarterly. Journal of the Society for Risk

Spring Street,

Timothy G.Donovan.

Industrial Security (ASIS), 1655

Crossways Park West, Woodbury. NY 11797. 516-496-8000 (Vol. 18

Plenum Publishing Co.. 233

Monthly.

School, 15

Washington Street, Newark. NJ 07102. 201-648-5549 (Vol. 12 in 1986). Security Monthly.

Cahners Publishers. 44 Cook Street, Denver. CO 80206. 303-388-4511 (New in 1989).

A-3

Haddenham. Aylesbury, HP17 8JD, U.K. +44 844 290396, or PO Box 875, 454 Main Street,

CT 06877. 203- 431-8720 (Vol. 1 in Ridgefield,

1989).

Appendix B: This appendix contains a Section

1

:

list

of

all

List of

the

Key Words

keywords used

in

each of the sections.

General

awareness, book, crime, computer virus, Congress, contingency, ethics, general, government, PC [personal computer], physical, policy, risk, software piracy, techniques, threats, virus, vulnerabilities. guidelines, hackers, integrity, international, laws, legislation,

Section 2

:

Management

computer virus, control [access control], denial [of government, guidelines, hackers, hardware, integrity, management, methods [mechanisms, procedures], PC [personal computer, microcomputer], personnel, physical, policy, proceedings, recovery [operational, disaster], requirement, risk [management], software, techniques, theory, virus [worm], vulnerabilities. auditing, awareness, book, certification, service], general,

Section 3

:

Foundations

authentication, capability, case [specific description], control, covert channel, database, discretionary, flow, formal, inference [non-inference], integrity,

methods, models,

MLS

[multi-level security],

LAN

[local area network],

network [also distributed system], policy,

proceedings, safety, specification, take-grant [specific access control model], theory, trusted [systems], verification, virus.

Section 4

:

Access Control

control [access], architecture, authentication [identification], book, capability [for access control], case [case study], design, discretionary, government, guidelines, hardware, integrity,

PC

management, mandatory, methods,

OS

[operating system], passwords, proceedings

[personal computer], safety, software, techniques, trusted [system].

Section 5

:

Trusted Systems

architecture, authentication, book, capability, case [case study], certification, control, covert

channel, criteria, cryptography, denial [of service], design, discretionary, general, government, guidelines, integrity, kemel, methods, MLS, models, network, OS [operating system], proceedings, specifications, software, TCB [trusted computing base], threat, techniques, theory, trusted [system], verification.

B-1

Section 6 Database Security :

auditing, authentication, case [case study, example], control [access control], criteria,

database

[files,

records], design, discretionary, distributed, encryption, government,

guidelines, inference, integrity, kernel,

methods, models,

MLS, network

DBMS

[database

management system], mandatory,

[distributed], policy, privacy, proceedings, relational,

requirements, software, statistical [databank], techniques, theory, trusted, verification, views [of database].

Section 7

:

Communication and Network Security

architecture, auditing, authentication, book, case [case study], controls, criteria, crypto

[cryptography],

DES

[data encryption standard], design, distributed,

general, government, guidelines, hardware, keys [cryptographic],

management, methods, MLS, models, network system],

OSI [open systems

interconnect],

PC

EM

LAN

[electronic mail],

[local area network],

[also distributed system],

OS

[operating

[personal computer, terminal], physical,

policy, proceedings, protocols, public-key [cryptography], requirements,

RSA

[Ri vest-Shamir- Adleman public-key algorithm], software, standards, techniques, threats [also

covert channels], trusted [system], verification [also assurance], vulnerabilities.

Section 8

:

Cryptography

algorithms, analysis [also crypto-analysis], authentication [identification], book, check-sum,

DES [data encryption standard], design, evaluation, hardware, integrity, keys [cryptographic keys, management], knapsack [public-key algorithm], methods, proceedings, protocols, public-key [cryptographic method], oblivious [transfer protocol], one-way [functions], poUcy, random, RSA, research, signatures [digital], software, codes, complexity,

techniques, theory, threats, trap-door [functions], verification, vulnerabilities, zero

[zero-information protocol].

Section 9

:

Privacy ("privacy"

is

implicit in all entries).

analysis, book, case [case study], confidentiality. Congress, credit [data], criminal [justice records], databank, design, EFTS [electronic funds transfer system], employment [records],

information], foreign [countries other than the U.S.], general, government, guidelines, identifier, laws [legislation], management, matching, medical [records], oversight [of laws], PA [U.S. Privacy Act of 1074], proceedings, profiling, protection [of rights],

FOI [freedom of

records, requirements, rights [individual], social [sciences], statistical [data, databanks], surveillance, threats,

TDF

[transborder dataflow], use.

B-2 oV.S.

GOVERNMENT PRINTING OmCE: l990.28l.6l^23^e9

NIST-114A

DEPARTMENT OF COMMERCE OF STANDARDS AND TECHNOLOGY

U.S.

NATIONAL INSTITUTE

(REV. 3-89)

BIBLIOGRAPHIC DATA SHEET

1.

PUBLICATION OR REPORT NUMBER

NIST/SP-800/1 PERFORMING ORGANIZATION REPORT NUMBER 3.

PUBLICATION DATE

December 1990 TITLE

AND SUBTITLE

Bibliography of Selected Computer Security Publications January 1980 - October 1989 AUTHOR(S)

5.

compiler; Lawrence E. Bassham III, editor

Rein Turn,

PERFORMING ORGANIZATION

6.

(IF

JOINT OR OTHER THAN NIST, SEE INSTRUCTIONS)

SPONSORING ORGANIZATION NAME AND COMPLETE ADDRESS (STREET,

9.

7.

Rein Turn Associates 15239 Earlham St. Pacific Palisades, CA

DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY GAITHERSBURG, MD 20899 U.S.

8.

CONTRACT/GRANT NUMBER

43NANB922203

TYPE OF REPORT AND PERIOD COVERED

January 1980-October 1989

CITY, STATE, ZIP)

Same as item #6

'

!

!

10.

SUPPLEMENTARY NOTES

11.

ABSTRACT

DOCUMENT D ESCRIBES A COMPUTER PROGRAM; SF-1B5, FIPS SOFTWARE SUMMARY, IS ATTACHED. IF DOCUMENT INCLUDES A SIGNIFICANT BIBLIOGRAPHY OR (A 200-WORD OR LESS FACTUAL SUMMARY OF MOST SIGNIFICANT INFORMATION.

LITERATURE SURVEY, MENTION

IT

HERE.)

This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre-1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography.

12.

KEY WORDS

13.

AVAILABIUTY

(6

TO

12 ENTRIES;

ALPHABETICAL ORDER; CAPITALIZE ONLY PROPER NAMES; AND SEPARATE KEY

WORDS BY SEMICOLONS)

access controls; auditing; communications security; computer crime; computer security; confidentiality; crytography; disaster recovery; integrity; privacy; risk management; trusted computing base.

Y

14.

UNUNITED FOR OFFICIAL DISTRIBUTION. DO NOT RELEASE TO NATIONAL TECHNICAL INFORMATION SERVICE

ORDER FROM SUPERINTENDENT OF DOCUMENTS, WASHINGTON, DC 20402.

U.S.

GOVERNMENT PRINTING

ORDER FROM NATIONAL TECHNICAL INFORMATION SERVICE

ELECTRONIC FORM

(NTIS),

OFFICE,

SPRINGFIELD, VA 22161.

NUMBER OF PRINTED PAGES

200

(NTIS). 15.

PRICE

!

1

ANNOUNCEMENT OF NEW PUBLICATIONS ON COMPUTER SECURITY

Superintendent of Documents

Government Washington,

Dear

Printing Office

DC

20402

Sir:

Please add my name to the annoimcement list of new publications to be issued in the series: National Institute of Standards and Technology Special Publication 800-.

Name Company Address City

(Notification key N-503)

State

Zip Code

/

i 1

A. Technical Publications

Periodical



Journal of Research of the National Institute of Standards and Technology Reports NIST research and development in those disciplines of the physical and engineering sciences in which the Institute is active. These include physics, chemistry, engineering, mathematics, and computer sciences. Papers cover a broad range of subjects, with major emphasis on measurement methodology and the basic technology underlying standardization. Also included from time to time are survey articles on topics closely related to the Institute's technical and scientific programs. Issued six times a year.

Nonperiodicals

— Major contributions to the technical literature on various subjects related to the and technical Handbooks — Recommended codes of engineering and industrial practice (including safety codes) developed in cooperation with interested industries, professional organizations, and regulatory bodies. Special Publications — Include proceedings of conferences sponsored by NIST, NIST annual reports,

Monographs

Institute's scientific

activities.

and other special publications appropriate to this grouping such as wall charts, pocket cards, bibliographies. Applied Mathematics Series

—Mathematical

tables,

manuals, and studies of special interest to physi-

engineers, chemists, biologists, mathematicians, scientific and technical work. cists,

and

computer programmers, and others engaged

in



National Standard Reference Data Series Provides quantitative data on the physical and chemical properties of materials, compiled from the world's literature and critically evaluated. Developed under a worldwide program coordinated by NIST under the authority of the National Standard Data Act (Public Law 90-396). NOTE: The Journal of Physical and Chemical Reference Data (JPCRD) is published quarterly for NIST by the American Chemical Society (ACS) and the American Institute of Physics (AIP). Subscriptions, reprints, and supplements are available from ACS, 1155 Six20056. teenth St., NW., Washington, Building Science Series Disseminates technical information developed at the Institute on building materials, components, systems, and whole structures. The series presents research results, test methods, and performance criteria related to the structural and environmental functions and the durability and safety characteristics of building elements and systems.

DC



Technical ment of a treatment under the

Notes

— Studies or reports which are complete in themselves but restrictive

subject.

Analogous

to

monographs but not so comprehensive

in their treat-

scope or definitive reports of work performed at in

in

NIST of the subject area. Often serve as a vehicle for final sponsorship of other government agencies. Voluntary Product Standards Developed under procedures published by the Department of Commerce in Part 10, Title 15, of the Code of Federal Regulations. The standards establish nationally recognized requirements for products, and provide all concerned interests with a basis for common understanding of the characteristics of the products. NIST administers this program as a supplement to the activities of the private sector standardizing organizations. Consumer Information Series Practical information, based on NIST research and experience, covering areas of interest to the consumer. Easily understandable language and illustrations provide useful background knowledge for shopping in today's technological marketplace. Order the above NIST publications from: Superintendent of Documents, Government Printing Office, 20402. Washington, Order the following NIST publications—FIPS and NISTIRs—from the National Technical Information





DC

VA 22161. Federal Information Processing Standards Publications (FIPS PUB)— Publications in 'this series collectively constitute the Federal Information Processing Standards Register. The Register serves as the official source of information in the Federal Government regarding standards issued by NIST pursuant to the Federal Property and Administrative Services Act of 1949 as amended, Public Law 89-306 (79 Stat. 1127), and as implemented by Executive Order 11717 (38 FR 12315, dated May 11, 1973) and Part 6 of Title 15 CFR (Code of Federal Regulations). NIST Interagency Reports (NISTIR)— special series of interim or final reports on work performed by NIST for outside sponsors (both government and non-govemment). In general, initial distribution is handled by the sponsor; public distribution is by the National Technical Information Service, 22161, in paper copy or microfiche form. Springfield,

Service, Springfield,

A

VA

U.S. Department of Commerce National Institute of Standards and Technology (formerly National Bureau of Standards) Gaithersburg, 20899

MD

Official Business Penalty for Private

Use $300

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.