Skip to main content

Currently Skimming:

Bibliography
Pages 216-240

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 216...
... 1984. Report on Computer Crime, Task Force on Computer Crime, Section on Criminal Justice, Chicago, Ill., June.
From page 217...
... 1983. "Secure computer systems: A retrospective," Proceedings of the 1983 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 25-27, pp.
From page 218...
... 1985. "Secure ADA target: Issues, system design, and verification," Proceedings of the 1985 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 22-24, pp.
From page 219...
... 1986. "An analysis of the differences between the computer security practices in the military and private sectors," Proceedings of the 1986 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 7-9, pp.
From page 220...
... 1990e. "NIST may issue civilian computer security guide: Proposed document could become federal information processing standard," Federal Computer Week, September 17, p.
From page 221...
... 1988. "The SeaView security model," Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 18-21, pp.
From page 222...
... 1986. "Building reliable secure computing systems out of unreliable insecure components," Proceedings of the 1986 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 7-9, pp.
From page 223...
... 1989. "The Digital distributed system security architecture," Proceedings of the 12th National Computer Security Conference, National Institute of Standards and Technology/National Computer Security Center, Baltimore, Md., October 10-13, pp.
From page 224...
... " 6th International Conference on Reliability and Distributed Databases, IEEE Computer Society, Engineering Societies Library, New York. Green, Virginia D
From page 225...
... 1989. "Information security as a topic in undergraduate education of computer scientists," Proceedings of the 12th National Computer Security Conference, National Institute of Standards and Technology/National Computer Security Center, Baltimore, Md., October 1~13.
From page 226...
... 1988. "Implementing commercial data integrity with secure capabilities," Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 18-21, pp.
From page 227...
... 1988. "A case study in cleanroom software engineering: The IBM COBOL structuring facility," Proceedings of COMPSAC '88, IEEE Computer Society, Washington, D.C.
From page 228...
... 1987. Covert channel capacity," Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 27-29, pp.
From page 229...
... 1989. "Access control by boolean expression evaluation," Proceedings of the Computer Security Application conference' Tucson, Ariz., December 8, IEEE Computer Society, Washington, D.C.
From page 230...
... 1981a. Guidelines for ADP Contingency Planning, Federal Information Processing Standards Publication 87, National Technical Information Service, Springfield, Va., March 27.
From page 231...
... 1990d. Security Requirements for Cryptographic Modules, draft, Federal Information Processing Standards Publication 14~1, National Technical Information Service, Springfield, Va., July 13.
From page 232...
... 1990a. "Rainbows and arrows: How the security criteria address computer misuse," Proceedings of the 13th National Computer Security Conference, National Institute of Standards and Technology/National Computer Security Center, Washington, D.C., October.
From page 233...
... 1988. Guidance for Preparation of Security Plans for Federal Computer Systems Containing Sensitive Information, OMB Bulletin No.
From page 234...
... 1990b. "Federal reserve adds security to Fedwire," Federal Computer Week, April 9.
From page 235...
... 1987. "Locking computers securely," Proceedings of the 10th National Computer Security Conference, National Bureau of Standards/National Computer Security Center, Baltimore, Md., September 21-24, pp.
From page 236...
... 1982. "Specification-to-code correlation," Proceedings of the 1982 IEEE Sympos~um on Security and Privacy, IEEE Computer Society, Oakland, Calif., April.
From page 237...
... 1990. "Information privacy issues for the 1990s," Proceedings of the 1990 IEEE Computer Society Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif, May 7-8.
From page 238...
... 1985b. Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements, Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, also known as the Yellow Book, National Computer Security Center, Fort Meade, Md., June 25.
From page 239...
... 1985. "Network security overview," Proceedings of the 1985 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 22-24, pp 62-76.
From page 240...
... 1987. Coding for a believable specification to implementation mapping," Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 27-29, pp.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.