An abstract of “Operating System Structures to Support Security and Reliable Software”

Security has become an important and challenging goal in the design of computer systems. This survey focuses on two system structuring concepts that support security; namely, small protection domains and extended-type objects. These two concepts are especially promising because they also support reliable software by encouraging and enforcing highly modular Read more…

An abstract of “Subversion: The Neglected Aspect of Computer Security”

This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and Read more…

An abstract of “Secure Minicomputer Operating System (KSOS): Executive Summary Phase I: Design”

The long-term goal of the KSOS effort is to develop a commercially viable computer operating system for the DEC PDP-11/70 that is compatible with the Bell Telephone Laboratories’ UNIX*tm, is capable of efficiency comparable to standard UNIX*tm, enforces multilevel security and integrity, and is demonstrably secure. In order to achieve Read more…

An abstract from “Trusted Computer System Evaluation Criteria”, the “Orange Book”

The trusted computer system evaluation criteria defined in this document classify systems into four broad hierarchical divisions of enhanced security protection. They provide a basis for the evaluation of effectiveness of security controls built into automatic data processing system products. The criteria were developed with three objectives in mind: (a) Read more…

An abstract of “Computer Security Technology Planning Study Volume II”

Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering program to obtain an open-use, multilevel secure computing capability is described. Plans are also presented for the related developments of communications security products and the interim solution to present secure computing problems. Finally a Exploratory development plan complementary Read more…