Proceedings of the Seminar on the DOD Computer Security Initiative (4th) Held at the National Bureau of Standards, Gaithersburg, Maryland on August 10-12, 1981


Book Description

Contents: Welcoming Address; Keynote Address; Introductory Comments; Burroughs Efforts in Computer Security; CR80-A Fault Tolerant Computer for Implementation in Secure Systems; Computer Security and Control Data; SAC Digital Network Security Methodology; COS/NFE Overview; WIS Security Strategy; Trusted Computing Research at Data General Corporation; The iAPX-432 Microcomputer System; ICL Efforts in Computer Security; GNOSIS: A Progress Report; Computer Security Evaluation Center; Trusted Computer Systems; The SDC Communications Kernel; The MITRE Trusted Packet Switch; Experience with KVM; SCOMP (KSOS-6) Development Experience Update; KSOS-11 Summary and Update; ACCAT and FORSCOM Guard Systems; A Security Model for a Military Message System; EUCLID and Verification; and The Evaluation of Three Specification and Verification Methodologies.