Proceedings of the Seminar on the DOD Computer Security Initiative (4th) Held at the National Bureau of Standards, Gaithersburg, Maryland on August 10-12, 1981


Book Description

Contents: Welcoming Address; Keynote Address; Introductory Comments; Burroughs Efforts in Computer Security; CR80-A Fault Tolerant Computer for Implementation in Secure Systems; Computer Security and Control Data; SAC Digital Network Security Methodology; COS/NFE Overview; WIS Security Strategy; Trusted Computing Research at Data General Corporation; The iAPX-432 Microcomputer System; ICL Efforts in Computer Security; GNOSIS: A Progress Report; Computer Security Evaluation Center; Trusted Computer Systems; The SDC Communications Kernel; The MITRE Trusted Packet Switch; Experience with KVM; SCOMP (KSOS-6) Development Experience Update; KSOS-11 Summary and Update; ACCAT and FORSCOM Guard Systems; A Security Model for a Military Message System; EUCLID and Verification; and The Evaluation of Three Specification and Verification Methodologies.



















Proceedings of the Seminar on the DoD Computer Security Initiative Program (3rd), National Bureau of Standards, Gaithersburg, Maryland, November 18-20, 1980


Book Description

This is the third in a series of seminars to acquaint computer system developers and users with the status of 'trusted' ADP system developments within the Department of Defense and current planning for the integrity evaluation of commercial implementations of similar systems. The two previous seminars have stressed user requirements for trusted computer systems within both the government and private sector. The first day of this seminar includes presentations by five computer manufacturers of the trusted system development activities within their organizations. Following these presentations there will be a panel discussion on 'How can the government and the computer industry solve the computer security problem?' Panelists are drawn from industry and government. The second day of the seminar opens with a discussion of the technical evaluation criteria that have been proposed as a basis for determining the relative merits of computer systems. The assurance aspects of those criteria provide the context for the second and third days of the seminar. After the context has been set, we provide an introduction to formal specification and verification technology to include descriptions of the basic types of formal specification and the implications of design and program verification. Representatives of several prominent specification and verification research groups will then discuss their systems.