Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baldwin, R. W., “Rule-Based Analysis of Computer Security,” Technical Report MIT/LCS/TR-401, March 1988.
Bell, D. E., and L. J. LaPadula, “Secure Computer System: Unified Exposition and Multics Interpretation,” MITRE Corp., Rep. No. MTR-2997, 1976 (available as NTISAD-A023588).
Biba, K. J., “Integrity Considerations for Secure Computer Systems,” Mitre Corp., MTR-3153, Bedford, Mass., June 1975.
Bishop, M., “How to Write a Setuid Program”; login, vol. 12, no. 1, January/February 1987.
Bishop, M., “Managing Superuser Privileges under Unix,” Research Institute for Advanced Computer Science, Technical Report, NASA Ames Research Center, Moffet Field, Calif., (June 1986).
Clark, D. D., and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., April 1987.
Department of Defense, A Guide To Understanding Audit In Trusted Systems, NCSC-TG-001, version-2, 1 January 1988.
Department of Defense, A Guide To Understanding Design Documentation In Trusted Systems, NCSC-TG-007, version-1, October 1988.
Department of Defense, A Guide to Understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003, version-1, September 1987.
Department of Defense, Password Management Guideline, CSC-STD-002-85, April 1985.
Department of Defense, Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.
Gligor, V. D., C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, M. S. Hecht, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Design and Implementation of Secure Xenix,” IEEE Trans. on Software Engineering, vol. SE-13, No. 2, February 1986.
Gligor, V. D., J. C. Huskamp, S. R. Welke, C. J. Linn, and W. T. Mayfield, “Traditional Capability-Based Systems: An Analysis of their Ability to Meet the Trusted Computer Security Evaluation Criteria,” Institute for Defense Analysis, IDA Paper P-1935, February 1987
Hecht, M. S., M. E. Carson, C. S. Chandersekaran, R. S. Chapman, L J. Dotterer, V. D. Gligor, W. D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Unix Without the Superuser,” Proc. of the Usenix Conference, Phoenix, Arizona, June 1987.
Intel Corp., iAPX 286 Programmers Reference Manual, Chapter 7, section 5, Intel Corp., 1983.
Knowles, F., and S. Bunch, “A Least Privilege Mechanism for Unix,” Proc. of the 10th National Computer Security Conference, Baltimore, Maryland, September 1987.
Lee, T. M. P., “Using Mandatory Integrity to Enforce ‘Commercial’ Security,” Proc. of the IEEE Symp. on Security and Privacy, Oakland, Calif., 1988.
Saltzer, J. H., and M. D. Schroeder, “The Protection and Control of Information Sharing in Computer Systems,” Proc. of the IEEE, vol. 63, no. 9, September 1975.
Schroeder, M. D. and J. H. Saltzer, “A Hardware Architecture for Implementing Protection Rings,” Communications of the ACM, vol. 15, no. 3, March 1972.
Thompson, K., “Reflections on Trusting Trust,” Turing Award Lecture, Communications of the ACM, vol. 27, no. 8, August 1984.
Author information
Consortia
Editor information
Copyright information
© 1985 National Computer Security Center
About this chapter
Cite this chapter
US Department of Defense. (1985). A Guide to Understanding Trusted Facility Management. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_16
Download citation
DOI: https://doi.org/10.1007/978-1-349-12020-8_16
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-0-333-53947-7
Online ISBN: 978-1-349-12020-8
eBook Packages: Computer ScienceComputer Science (R0)