Skip to main content

A Guide to Understanding Trusted Facility Management

  • Chapter
The ‘Orange Book’ Series
  • 1019 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baldwin, R. W., “Rule-Based Analysis of Computer Security,” Technical Report MIT/LCS/TR-401, March 1988.

    Google Scholar 

  2. Bell, D. E., and L. J. LaPadula, “Secure Computer System: Unified Exposition and Multics Interpretation,” MITRE Corp., Rep. No. MTR-2997, 1976 (available as NTISAD-A023588).

    Google Scholar 

  3. Biba, K. J., “Integrity Considerations for Secure Computer Systems,” Mitre Corp., MTR-3153, Bedford, Mass., June 1975.

    Google Scholar 

  4. Bishop, M., “How to Write a Setuid Program”; login, vol. 12, no. 1, January/February 1987.

    Google Scholar 

  5. Bishop, M., “Managing Superuser Privileges under Unix,” Research Institute for Advanced Computer Science, Technical Report, NASA Ames Research Center, Moffet Field, Calif., (June 1986).

    Google Scholar 

  6. Clark, D. D., and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., April 1987.

    Google Scholar 

  7. Department of Defense, A Guide To Understanding Audit In Trusted Systems, NCSC-TG-001, version-2, 1 January 1988.

    Google Scholar 

  8. Department of Defense, A Guide To Understanding Design Documentation In Trusted Systems, NCSC-TG-007, version-1, October 1988.

    Google Scholar 

  9. Department of Defense, A Guide to Understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003, version-1, September 1987.

    Google Scholar 

  10. Department of Defense, Password Management Guideline, CSC-STD-002-85, April 1985.

    Google Scholar 

  11. Department of Defense, Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.

    Google Scholar 

  12. Gligor, V. D., C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, M. S. Hecht, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Design and Implementation of Secure Xenix,” IEEE Trans. on Software Engineering, vol. SE-13, No. 2, February 1986.

    Google Scholar 

  13. Gligor, V. D., J. C. Huskamp, S. R. Welke, C. J. Linn, and W. T. Mayfield, “Traditional Capability-Based Systems: An Analysis of their Ability to Meet the Trusted Computer Security Evaluation Criteria,” Institute for Defense Analysis, IDA Paper P-1935, February 1987

    Google Scholar 

  14. Hecht, M. S., M. E. Carson, C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, V. D. Gligor, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Unix Without the Superuser,” Proc. of the Usenix Conference, Phoenix, Arizona, June 1987.

    Google Scholar 

  15. Intel Corp., iAPX 286 Programmers Reference Manual, Chapter 7, section 5, Intel Corp., 1983.

    Google Scholar 

  16. Knowles, F., and S. Bunch, “A Least Privilege Mechanism for Unix,” Proc. of the 10th National Computer Security Conference, Baltimore, Maryland, September 1987.

    Google Scholar 

  17. Lee, T. M. P., “Using Mandatory Integrity to Enforce ‘Commercial’ Security,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., 1988.

    Google Scholar 

  18. Saltzer, J. H., and M. D. Schroeder, “The Protection and Control of Information Sharing in Computer Systems,” Proc. of the IEEE, vol. 63, no. 9, September 1975.

    Google Scholar 

  19. Schroeder, M. D. and J. H. Saltzer, “A Hardware Architecture for Implementing Protection Rings,” Communications of the ACM, vol. 15, no. 3, March 1972.

    Google Scholar 

  20. Thompson, K., “Reflections on Trusting Trust,” Turing Award Lecture, Communications of the ACM, vol. 27, no. 8, August 1984.

    Google Scholar 

Download references

Author information

Consortia

Editor information

Copyright information

© 1985 National Computer Security Center

About this chapter

Cite this chapter

US Department of Defense. (1985). A Guide to Understanding Trusted Facility Management. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-12020-8_16

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-0-333-53947-7

  • Online ISBN: 978-1-349-12020-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics