Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Early Computer Security Papers
(1970-1985), Page 1


Introduction | Page 1 | Page 2

James P. Anderson, Computer Security Technology Planning Study Volume I, ESD-TR-73-51, Vol. I, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA (Oct. 1972)

James P. Anderson, Computer Security Technology Planning Study Volume II, ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA (Oct. 1972).

James P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Co, Fort Washington, PA (1980).

David E. Bell and Leonard J. LaPadula, Secure Computer System: Unified Exposition and Multics Interpretation, MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA (Mar. 1976); also ESD-TR-75-306, rev. 1, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA.

Related papers*:

  • David E. Bell and Leonard J. LaPadula, Secure Computer Systems: Mathematical Foundations, ESD-TR-73-278, Vols. I-III, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA (Nov. 1973 (Vols. I,II); Apr. 1974 (Vol. III)).

Richard Bisbey II and Dennis Hollingworth, Protection Analysis: Final Report, ISI/SR-78-13, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (May 1978).

Related papers*:

  • Richard Bisbey II, Gerald Popek, and James Carlstedt, Protection Errors in Operating Systems: Inconsistency of a Single Data Value Over Time, ISI/SR-75-4, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (Dec. 1975).

  • Richard Bisbey II et al., Data Dependency Analysis, ISI/RR-76-45, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (Feb. 1976).

  • James Carlstedt et al., Pattern Directed Protection Evaluation, ISI/RR-75-31, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (June 1975).

  • James Carlstedt, Protection Errors in Operating Systems: Validation of Critical Conditions, ISI/SR-76-5, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (May 1976).

  • James Carlstedt, Protection Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology, ISI/SR-78-10, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (Jan. 1978).

  • James Carlstedt, Protection Errors in Operating Systems: Serialization, ISI/SR-78-9, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (Apr. 1978).

  • Dennis Hollingworth and Richard Bisbey II, Protection Errors in Operating Systems: Allocation/Deallocation Residuals, ISI/SR-76-7, University of Southern California/Information Sciences Institute, Marina Del Rey, CA (June 1976).

  • Peter G. Neumann, Computer Security Evaluation, 1978 National Computer Conference, AFIPS Conference Proceedings 47, pp. 1087–1095 (1978).

* For some papers, the UC Davis team also identified "related papers": those papers that "added to the topic and were either written as part of the same project or are the standard reference for the work."

Back to Top


Introduction | Page 1 | Page 2