Proceedings of the Seminar on the DoD Computer Security Initiative Program (2nd), National Bureau of Standards, Gaithersburg, Maryland, January 15-17, 1980


Book Description

This is the second in a series of seminars to acquaint computer system developers and users with the status of 'trusted' ADP system developments within the Department of Defense and current planning for the integrity evaluation of commercial implementations of similar systems. This seminar will go into more detail both on the technical experiences of the DoD research efforts in this area and the implications of trusted systems on the use of computers. Following the first day of topics of general interest the seminar will divide into two parallel sessions. The technical session, intended for operating system developers and sophisticated computer science technical experts, will provide a detailed analysis of the Trusted Computing Base concept which is the emerging generalized basis upon which high integrity operating systems may be evaluated, followed by discussions by the principal designers of the major DoD trusted system developments relating their systems to the Trusted Computing Base Concept. The non-technical session will provide indepth discussion of policy issues as they apply to multilevel secure computer systems, an analysis of applications of such systems within the DoD and beyond, and a not-so-technical review of the Trusted Computing Base concepts. The Trusted Computing Base concept being introduced at this seminar is a first draft specification against which the integrity of computer systems may be evaluated. This draft specification is the result of much interaction within the DoD community and is being introduced here to obtain reactions from industry and other users.







Proceedings of the Seminar on the DoD Computer Security Initiative Program (3rd), National Bureau of Standards, Gaithersburg, Maryland, November 18-20, 1980


Book Description

This is the third in a series of seminars to acquaint computer system developers and users with the status of 'trusted' ADP system developments within the Department of Defense and current planning for the integrity evaluation of commercial implementations of similar systems. The two previous seminars have stressed user requirements for trusted computer systems within both the government and private sector. The first day of this seminar includes presentations by five computer manufacturers of the trusted system development activities within their organizations. Following these presentations there will be a panel discussion on 'How can the government and the computer industry solve the computer security problem?' Panelists are drawn from industry and government. The second day of the seminar opens with a discussion of the technical evaluation criteria that have been proposed as a basis for determining the relative merits of computer systems. The assurance aspects of those criteria provide the context for the second and third days of the seminar. After the context has been set, we provide an introduction to formal specification and verification technology to include descriptions of the basic types of formal specification and the implications of design and program verification. Representatives of several prominent specification and verification research groups will then discuss their systems.













Proceedings of the Seminar on the DoD Computer Security Initiative Program, National Bureau of Standards, Gaithersburg, Maryland, July 17-18, 1979


Book Description

The objective of this seminar is to acquaint computer system developers and users with the status of the development of 'trusted' ADP systems within the Department of Defense and the current planning for the integrity evaluation of commercial implementations of these systems. The seminar will present an overview of a number of topics essential to the development of 'trusted' ADP systems. Much of the material to be presented will be of a technical nature that is intended for computer system designers and software system engineers. However, the sophisticated computer user in the Federal government and in private industry should find the seminar useful in understanding security characteristics of future systems. This is the first in a series of technical seminars; future sessions will include detailed presentations on: Security Kernel Design Experience, KSOS, KVM, SCOMP, Secure Unix Prototypes, MULTICS AIM, Specification and Verification Techniques, and Secure System Applications.










Proceedings of the Seminar on the DOD Computer Security Initiative (4th) Held at the National Bureau of Standards, Gaithersburg, Maryland on August 10-12, 1981


Book Description

Contents: Welcoming Address; Keynote Address; Introductory Comments; Burroughs Efforts in Computer Security; CR80-A Fault Tolerant Computer for Implementation in Secure Systems; Computer Security and Control Data; SAC Digital Network Security Methodology; COS/NFE Overview; WIS Security Strategy; Trusted Computing Research at Data General Corporation; The iAPX-432 Microcomputer System; ICL Efforts in Computer Security; GNOSIS: A Progress Report; Computer Security Evaluation Center; Trusted Computer Systems; The SDC Communications Kernel; The MITRE Trusted Packet Switch; Experience with KVM; SCOMP (KSOS-6) Development Experience Update; KSOS-11 Summary and Update; ACCAT and FORSCOM Guard Systems; A Security Model for a Military Message System; EUCLID and Verification; and The Evaluation of Three Specification and Verification Methodologies.