[comp.os.research] Security bibliography

benson@dove.gatech.edu (Glenn Benson) (05/24/89)

@TECHREPORT{BL,
	AUTHOR = {D. Bell and L. LaPadula},
	TITLE = {Secure Computer System Unified Exposition and Multics Interpretation},
	INSTITUTION = {{MITRE} Corp.},
	YEAR = {1975},
	NUMBER = {MTR-2997},
	ADDRESS = {Bedford, MA},
	MONTH = {July},
	ANNOTE = {Bell La Padula Model: Multics},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:48pm}
	}

@BOOK{BenAri,
	AUTHOR = {M. Ben-Ari},
	TITLE = {Principles of Concurrent Programming},
	PUBLISHER = {Prentice-Hall International, Inc.},
	YEAR = {1982},
	ADDRESS = {Englewood Cliffs, NJ},
	ANNOTE = {Contains monitors},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:50pm}
	}

@TECHREPORT{Ben:SMAFF,
	AUTHOR = {G. Benson},
	TITLE = {Secure Message and File Facility},
	INSTITUTION = {Martin Marietta Corp.},
	YEAR = {1987},
	NUMBER = {MMC-D-87-63773-012},
	ADDRESS = {Denver, CO},
	MONTH = {September},
	ANNOTE = {Secure Message and File Facility (SMAFF)},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:51pm}
	}

@TECHREPORT{Ben:HMM,
	AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz},
	TITLE = {The Hierarchical Matrix Model of Computer Security},
	INSTITUTION = {Georgia Inst. Tech.},
	YEAR = {1988},
	NUMBER = {GIT-ICS-88/17},
	ADDRESS = {Atlanta, GA},
	MONTH = {May},
	ANNOTE = {HMM: rough draft},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:54pm}
	}

@BOOK{Date:DB,
	AUTHOR = {C. Date},
	TITLE = {An Introduction to Database Systems},
	PUBLISHER = {Addison-Wesley Systems Programming Series},
	YEAR = {1987},
	VOLUME = {1},
	EDITION = {4},
	ADDRESS = {Reading, MA},
	MONTH = {November},
	ANNOTE = {Generic Data Base},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:57pm}
	}

@INPROCEEDINGS{Den:Cert,
	AUTHOR = {D. Denning and P. Denning},
	TITLE = {Certification of Programs for Secure Information Flow},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1977},
	PAGES = {504--512},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 4:59pm}
	}

@INPROCEEDINGS{FLR,
	AUTHOR = {R. Feiertag and K. Levitt and L. Robinson},
	TITLE = {Proving Multi-level Security of system Design},
	BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles},
	YEAR = {1977},
	PAGES = {57--65},
	PUBLISHER = {IEEE},
	ORGANIZATION = {ACM},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:02pm}
	}

@INPROCEEDINGS{Gla:know,
	AUTHOR = {J. Glasgow and G. MacEwen},
	TITLE = {Reasoning about Knowledge in Multilevel Secure Distributed Systems},
	BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {122--128},
	ADDRESS = {Oakland, CA},
	ANNOTE = {knowledge},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:05pm}
	}

@INPROCEEDINGS{GM,
	AUTHOR = {J. Goguen and J. Meseguer},
	TITLE = {Security Policies and Security Models},
	BOOKTITLE = {Proc. 1982 IEEE symp. Security and Privacy},
	YEAR = {1982},
	PAGES = {11--20},
	PUBLISHER = {IEEE},
	ADDRESS = {Oakland, CA},
	KEYWORDS = {'},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:06pm}
	}

@TECHREPORT{Good:gyp88,
	AUTHOR = {D. Good and B. DiVito and M. Smith},
	TITLE = {Using the Gypsy Methodology},
	INSTITUTION = {Computational Logic Inc.},
	YEAR = {1988},
	ADDRESS = {Austin, TX},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:08pm}
	}

@INPROCEEDINGS{Haigh:SAT,
	AUTHOR = {J. Haigh and W. Young},
	TITLE = {Extending the Noninterference Version of {M}{L}{S} for {S}{A}{T}},
	BOOKTITLE = {IEEE Transactions on Software Engineering},
	YEAR = {1987},
	PAGES = {141--150},
	MONTH = {February},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:10pm}
	}

@INPROCEEDINGS{HRU,
	AUTHOR = {M. Harrison and W. Ruzzo and J. Ullman},
	TITLE = {Protection in Operating Systems},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1976},
	PAGES = {461--471},
	PUBLISHER = {ACM},
	MONTH = {August},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:12pm}
	}

@INPROCEEDINGS{Jones:TG,
	AUTHOR = {A. Jones and R. Lipton and L. Snyder},
	TITLE = {A Linear Time Algorithm for Deciding Security},
	BOOKTITLE = {Proc. $17^{th}$ Annual Symp. on Found. Comp Sci.},
	YEAR = {1976},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:14pm}
	}

@INPROCEEDINGS{McC:Hook,
	AUTHOR = {D. McCullough},
	TITLE = {Specifications for Multi-Level Security and a Hook-up Property},
	BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy},
	YEAR = {1987},
	PAGES = {161--166},
	ADDRESS = {Oakland, CA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:16pm}
	}

@INPROCEEDINGS{McC:NI,
	AUTHOR = {D. McCullough},
	TITLE = {Noninterference and the Composability of Security Properties},
	BOOKTITLE = {1988 IEEE Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {177--186},
	ADDRESS = {Oakland, CA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:18pm}
	}

@INPROCEEDINGS{Pit:BL,
	AUTHOR = {P. Pittelli},
	TITLE = {The {Bell}-{LaPadula} Computer Security Model Represented as a Special Case of the {Harrison}-{Ruzzo}-{Ullman} Model},
	BOOKTITLE = {Proc. $10^{th}$ National Computer Security Conference},
	YEAR = {1987},
	PAGES = {118--121},
	PUBLISHER = {NBS},
	ADDRESS = {Gaithersburg, MD},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:20pm}
	}

@UNPUBLISHED{Rus:Up,
	AUTHOR = {J. Rushby},
	TITLE = {Security Policies for Distributed Systems},
	NOTE = {SRI International (Unpublished Draft)},
	MONTH = {September},
	YEAR = {1988},
	ANNOTE = {Unpublished draft of composable nonint for dist. sys.},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:21pm}
	}

@MANUAL{Gemini:Ov,
	TITLE = {System Overview Gemini Trusted Multiple Microcomputer Base (version 0)},
	EDITION = {0},
	ADDRESS = {Carmel, CA},
	MONTH = {May},
	YEAR = {1985},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:23pm}
	}

@INPROCEEDINGS{Dem:Soc,
	AUTHOR = {R. De Millo and R. Lipton and A. Perlis},
	TITLE = {Social Processes and Proofs of Theorems and Programs},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1979},
	PAGES = {271--280},
	PUBLISHER = {ACM},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:03pm}
	}

@BOOK{AHU,
	AUTHOR = {A. Aho and J. Hopcroft and J. Ullman},
	TITLE = {Design and Analysis of Computer Algorithms},
	PUBLISHER = {Addison-Wesley},
	YEAR = {1974},
	ADDRESS = {Reading, MA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:06pm}
	}

@PHDTHESIS{Wu:Phd,
	AUTHOR = {M. Wu},
	TITLE = {Hierarchical Protection Systems},
	SCHOOL = {U. of Iowa},
	YEAR = {1980},
	ADDRESS = {Iowa City, IA},
	MONTH = {December},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:13pm}
	}

@BOOK{Den:book,
	AUTHOR = {D. Denning},
	TITLE = {Cryptography and Data Security},
	PUBLISHER = {Addison-Wesley Publishing Co.},
	YEAR = {1982},
	ADDRESS = {Reading, MA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:16pm}
	}

@INPROCEEDINGS{Lamp:Conf,
	AUTHOR = {B. Lampson},
	TITLE = {A Note on the Confinement Problem},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1973},
	PAGES = {613--615},
	PUBLISHER = {ACM},
	MONTH = {October},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:19pm}
	}

@INPROCEEDINGS{Den:latt,
	AUTHOR = {D. Denning},
	TITLE = {A Lattice Model of Secure Information Flow},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1976},
	PAGES = {236--243},
	PUBLISHER = {ACM},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:33pm}
	}

@INPROCEEDINGS{McLean:SysZ,
	AUTHOR = {J. McLean},
	TITLE = {Reasoning about Security Models},
	BOOKTITLE = {Proc. 1988 Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {123--131},
	PUBLISHER = {IEEE},
	ADDRESS = {Oakland, CA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:35pm}
	}

@TECHREPORT{Anderson:Plan,
	AUTHOR = {J. Anderson},
	TITLE = {Computer Security Technology Planning Study},
	INSTITUTION = {AFSC},
	YEAR = {1972},
	NUMBER = {ESD-TR-73-51},
	ADDRESS = {Hanscom AFB, Bedford, MA},
	MONTH = {October},
	NOTE = {AD-758 206, ESD/AFSC},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:47pm}
	}

@INPROCEEDINGS{Brown:Newcast,
	AUTHOR = {D. Brownbridge and L. Marshall and B. Randell},
	TITLE = {The Newcastle connection, or UNIXes of the World Unite!},
	BOOKTITLE = {Software-Practice and Experience},
	YEAR = {1982},
	PAGES = {1147--1162},
	PUBLISHER = {Wiley Inter-science},
	MONTH = {December},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:50pm}
	}

@INPROCEEDINGS{Ber:KSOS,
	AUTHOR = {T. Berson and G. Barksdale},
	TITLE = {KSOS-Development Methodology for a Secure Operating System},
	BOOKTITLE = {Proc. NCC},
	YEAR = {1979},
	PAGES = {365--371},
	PUBLISHER = {AFIPS Press},
	ADDRESS = {Montvale, NJ},
	ORGANIZATION = {AFIPS},
	MONTH = {June},
	NOTE = {Vol. 48},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:52pm}
	}

@INPROCEEDINGS{Cheh:verif,
	AUTHOR = {M. Cheheyl and M. Gasser and G. Huff and J. Millen},
	TITLE = {Verifying Security},
	BOOKTITLE = {Computing Surveys},
	YEAR = {1981},
	PAGES = {279--339},
	MONTH = {September},
	NOTE = {Vol. 13, No. 3},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:54pm}
	}

@INPROCEEDINGS{Coh:Hydra,
	AUTHOR = {E. Cohen and D. Jefferson},
	TITLE = {Protection in the Hydra Operating System},
	BOOKTITLE = {Proc. $5^{th}$ SOSP},
	YEAR = {1975},
	PAGES = {141--160},
	MONTH = {November},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:56pm}
	}

@TECHREPORT{Das:CLOUDS,
	AUTHOR = {P. Dasgupta and R. LeBlanc and E. Spafford},
	TITLE = {The Clouds Project: Design and Implementation of a Fault-Tolerant Distributed Operating System},
	INSTITUTION = {Georgia Inst. Tech.},
	YEAR = {1985},
	NUMBER = {GIT-ICS-85/29},
	ADDRESS = {Atlanta, GA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:58pm}
	}

@INPROCEEDINGS{Land:MMS,
	AUTHOR = {C. Landwehr and C. Heitmeyer and J. McLean},
	TITLE = {A Security Model for Military Message Systems},
	BOOKTITLE = {ACM Transactions on Computer Systems},
	YEAR = {1984},
	PAGES = {198--222},
	PUBLISHER = {ACM},
	MONTH = {August},
	ANNOTE = {Landwehr Secure MMS},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {6-Dec-88, 0:20pm}
	}

@TECHREPORT{Aub:Ra,
	AUTHOR = {J. Bernabeu-Auban and P. Hutto and M. Khalidi},
	TITLE = {The Architecture of the Ra Kernel},
	INSTITUTION = {Georgia Institute of Technology},
	YEAR = {1987},
	NUMBER = {GIT-ICS-87/35},
	ADDRESS = {Atlanta, GA},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {6-Dec-88, 5:43pm}
	}

@INPROCEEDINGS{Mill:val,
	AUTHOR = {J. Millen},
	TITLE = {Security Kernel Validation in Practice},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1976},
	PAGES = {243--250},
	PUBLISHER = {ACM},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {6-Dec-88, 5:47pm}
	}

@INPROCEEDINGS{Pop:UCLA,
	AUTHOR = {P. Popek and D. Farber},
	TITLE = {A Model for Verification of Data Security in Operating Systems},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1978},
	PAGES = {737--749},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {6-Dec-88, 5:49pm}
	}

@INPROCEEDINGS{Land:surv,
	AUTHOR = {C. Landwehr},
	TITLE = {Formal Models of Computer Security},
	BOOKTITLE = {ACM Computing Surveys},
	YEAR = {1981},
	PAGES = {247--278},
	PUBLISHER = {ACM},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {6-Dec-88, 5:51pm}
	}

@BOOK{Gas:Book,
	AUTHOR = {M. Gasser},
	TITLE = {Building a Secure Computer System},
	PUBLISHER = {Van Nostrand Reinhold Co.},
	YEAR = {1988},
	ADDRESS = {New York, NY},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {12-Dec-88, 7:29pm}
	}

@PHDTHESIS{Bis:PhD,
	AUTHOR = {M. Bishop},
	TITLE = {Practical Take-Grant Systems: Do They Exist?},
	SCHOOL = {Purdue {U}.},
	YEAR = {1984},
	ADDRESS = {W. Lafayette, IN},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {31-Dec-88, 11:21am}
	}

@BOOK{Coh:comb,
	AUTHOR = {D. Cohen},
	TITLE = {Basic Techniques of Combinatorial Theory},
	PUBLISHER = {John Wiley \& Sons},
	YEAR = {1978},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {31-Dec-88, 4:32pm}
	}

@INPROCEEDINGS{Fra:Scomp,
	AUTHOR = {L. Fraim},
	TITLE = {{S}{C}{O}{M}{P}: {A} Solution to the Multilevel Security Problem},
	BOOKTITLE = {IEEE Computer},
	YEAR = {1983},
	PAGES = {26--34},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@cobra)},
	TIMESTAMP = {1-Jan-89, 6:40pm}
	}

@INPROCEEDINGS{ra:hawaii,
	AUTHOR = {Jos\'e M. {Bernab\'eu Aub\'an} and Phillip W. Hutto and M. Yousef A. Khalidi and Mustaque Ahamad and William F. Appelbe and Partha Dasgupta and Richard J. LeBlanc and Umakishore Ramachandran},
	TITLE = {The Architecture of {\em Ra}: A kernel for {\em Clouds}},
	BOOKTITLE = {Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences},
	YEAR = {1989},
	MONTH = {January},
	NOTE = {To appear},
	ENTEREDBY = {Yousef Khalidi (yak@boa)},
	TIMESTAMP = {12-Jan-88, 1:50pm}
	}

@INPROCEEDINGS{Lamp:mod,
	AUTHOR = {L. Lamport},
	TITLE = {Specifying Concurrent Program Modules},
	BOOKTITLE = {{A}{C}{M} Transactions on Programming Languages and Systems},
	YEAR = {1983},
	PAGES = {190--222},
	PUBLISHER = {ACM},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@cobra)},
	TIMESTAMP = {18-Jan-89, 1:21pm}
	}

@TECHREPORT{Lamp:simp,
	AUTHOR = {L. Lamport},
	TITLE = {A Simple Approach to Specifying Concurrent Systems},
	INSTITUTION = {Digital Equipment Corporation System Research Center},
	YEAR = {1986},
	NUMBER = {15},
	ADDRESS = {Palo Alto, CA},
	MONTH = {December},
	ENTEREDBY = {Glenn S Benson (benson@cobra)},
	TIMESTAMP = {18-Jan-89, 1:28pm}
	}

@INPROCEEDINGS{Lamp:form,
	AUTHOR = {L. Lamport},
	TITLE = {A Formal Basis for the Specification of Concurrent Systems},
	BOOKTITLE = {Distributed Operating Systems.  Theory and Practice.},
	YEAR = {1987},
	EDITOR = {Y. Paker et al.},
	PAGES = {4--46},
	PUBLISHER = {Springer-Verlag},
	ADDRESS = {Berlin},
	ORGANIZATION = {NATO Advanced Study Institute},
	MONTH = {July},
	NOTE = {Vol. F28},
	ENTEREDBY = {Glenn S Benson (benson@cobra)},
	TIMESTAMP = {18-Jan-89, 1:32pm}
	}

@INPROCEEDINGS{Ben:Hmodel,
	AUTHOR = {G. Benson and B. Appelbe and I. Akyildiz},
	TITLE = {The Hierarchical Model of Distributed System Security},
	BOOKTITLE = {1989 IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {194--203},
	PUBLISHER = {IEEE},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 2:59pm}
	}

@INPROCEEDINGS{Mac:Opnet,
	AUTHOR = {G. MacEwen and V. Poon and J. Glasgow},
	TITLE = {A Model for Multilevel Security Based on Operator Nets},
	BOOKTITLE = {1987 IEEE Symposium on Security and Privacy},
	YEAR = {1987},
	PAGES = {150--160},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 4:51pm}
	}

@TECHREPORT{Lev:HDM,
	AUTHOR = {K. Levitt and L. Robinson and B. Silverberg},
	TITLE = {The {H}{D}{M} Handbook},
	INSTITUTION = {Comp. Sci. lab., SRI International},
	YEAR = {1979},
	ADDRESS = {Menlo Park, CA},
	MONTH = {June},
	NOTE = {vols. 1--3},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 6:54pm}
	}

@INPROCEEDINGS{Kemm:FDM,
	AUTHOR = {R. Kemmerer},
	TITLE = {{F}{D}{M}--a specification and verification methodology},
	BOOKTITLE = {Proc. $3^{rd}$ Seminar on the DoD Comp. Security Initiative Program},
	YEAR = {1980},
	PUBLISHER = {{N}{B}{S}},
	ADDRESS = {Gaithersburg, MD},
	MONTH = {November},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 7:02pm}
	}

@TECHREPORT{Mill:AFF,
	AUTHOR = {J. Millen},
	TITLE = {Operating system security verification},
	INSTITUTION = {{M}{I}{T}{R}{E} Corp.},
	YEAR = {1979},
	NUMBER = {Tech. Rep. M79-223},
	ADDRESS = {Bedford, MA},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 7:06pm}
	}

@INPROCEEDINGS{Rus:NI,
	AUTHOR = {J. Rushby},
	TITLE = {Proof of Separability: A Verifcation Technique for a Class
of Security Kernels},
	BOOKTITLE = {Proc. $5^{th}$ Int. Symp. on Programming},
	YEAR = {1982},
	PUBLISHER = {Springer-Verlag},
	PAGES = {352--362},
	ADDRESS = {Berlin},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {19-Jan-89, 7:02pm}
	}  

@INPROCEEDINGS{Min:trans,
	AUTHOR = {N. Minsky},
	TITLE = {Selective and Locally Controlled Transport of Privileges},
	BOOKTITLE = {ACM Transactions on Programming Languages and Systems},
	YEAR = {1984},
	PAGES = {573--602},
	MONTH = {October},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {30-Jan-89, 4:36pm}
	}

@INPROCEEDINGS{Lu:MLS,
	AUTHOR = {W. Lu and M. Sundareshan},
	TITLE = {A Model for Multilevel Security in Computer Networks},
	BOOKTITLE = {Infocom},
	YEAR = {1988},
	PAGES = {1095--1104},
	ADDRESS = {New Orleans, LA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {30-Jan-89, 5:06pm}
	}

@BOOK{Pap:DB,
	AUTHOR = {C. Papadimitriou},
	TITLE = {The Theory of Database Concurrency Control},
	PUBLISHER = {Computer Science Press},
	YEAR = {1986},
	ADDRESS = {Rockville, MD},
	KEYWORDS = {see the quote around p. 102},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {1-Feb-89, 4:37pm}
	}

@INPROCEEDINGS{Dav:verif,
	AUTHOR = {G. Davida and R. DeMillo and R. Lipton},
	TITLE = {A System Architecture to Support a Verifiably Secure Multilevel Security System},
	BOOKTITLE = {Proc. 1980 Symp. Security and Privacy},
	YEAR = {1980},
	PAGES = {137--144},
	PUBLISHER = {IEEE},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:35pm}
	}

@INPROCEEDINGS{Dij:THE,
	AUTHOR = {E. Dijkstra},
	TITLE = {The Structure of the THE-Multiprogramming System},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1968},
	PAGES = {341--346},
	PUBLISHER = {ACM},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:19pm}
	}

@INPROCEEDINGS{Evan:Auth,
	AUTHOR = {A. Evans and W. Kantrowitz and E. Weiss},
	TITLE = {A User Authentication Scheme not Requiring Security in the Computer},
	BOOKTITLE = {Communications of the ACM},
	YEAR = {1974},
	PAGES = {437--442},
	PUBLISHER = {ACM},
	MONTH = {August},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:19pm}
	}

@INPROCEEDINGS{Feie:PSOS,
	AUTHOR = {R. Feiertag and R. Neumann},
	TITLE = {The Foundation of a Provably Secure Operating System (PSOS)},
	BOOKTITLE = {Proc. NCC},
	YEAR = {1979},
	PAGES = {329--334},
	PUBLISHER = {AFIPS Press},
	ADDRESS = {Montvale, NJ},
	ORGANIZATION = {AFIPS},
	MONTH = {June},
	NOTE = {Vol. 48},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:52pm}
	}

@INPROCEEDINGS{Geh:cap,
	AUTHOR = {E. Gehringer},
	TITLE = {Variable-Length Capabilities as a Solution to the Small Object Problem},
	BOOKTITLE = {Proc. $7^{th}$ SOSP},
	YEAR = {1980},
	PAGES = {131--142},
	ADDRESS = {Pacific Grove, CA},
	MONTH = {November},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 6:56pm}
	}

@TECHREPORT{Good:gyp86,
	AUTHOR = {D. Good and R. Akers and L. Smith},
	TITLE = {Report on Gypsy 2.05},
	INSTITUTION = {Computational Logic Inc.},
	YEAR = {1986},
	NUMBER = {Tech. Rep. 48 (Revision of U. Texas Tech. Report)},
	ADDRESS = {Austin, TX},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:08pm}
	}

@INPROCEEDINGS{Bell:pktswt,
	AUTHOR = {D. Bell},
	TITLE = {Security Policy for the Next-Generation Packet Switch},
	BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {212--216},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ANNOTE = {packet switch},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {21-Feb-88, 5:05pm}
	}

@INPROCEEDINGS{Wis:SMITE,
	AUTHOR = {S. Wiseman and P. Terry and A. Wood and C. Harrold},
	TITLE = {The Trusted Path Between {S}{M}{I}{T}{E} and the User},
	BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {147--155},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ANNOTE = {a lot of verified code},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {23-Feb-89, 5:05pm}
	}

@INPROCEEDINGS{Kar:CInt,
	AUTHOR = {P. Karger},
	TITLE = {Implementing Commercial Data Integrity with Secure Capabilities},
	BOOKTITLE = {Proc. 1988 IEEE Symp. Security and Privacy},
	YEAR = {1988},
	PAGES = {130--139},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ANNOTE = {Secure Implemention of Integrities},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {23-Feb-88, 5:05pm}
	}

@INPROCEEDINGS{CW:int,
	AUTHOR = {D. Clark and D. Wilson},
	TITLE = {A Comparison of Commercial and Military Computer Security Policies},
	BOOKTITLE = {Proc. 1987 IEEE Symp. Security and Privacy},
	YEAR = {1987},
	PAGES = {184--194},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {23-Feb-89, 5:05pm}
	}

@INPROCEEDINGS{Sch:Multics,
	AUTHOR = {M. Schroeder and J. Saltzer},
	TITLE = {The {M}{U}{L}{T}{I}{C}{S} Kernel Design Project},
	BOOKTITLE = {Proc. $6^{th}$ ACM Symposium on Operating Systems Principles},
	YEAR = {1977},
	PAGES = {57--65},
	MONTH = {November},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {24-Feb-88, 5:02pm}
	}

@TECHREPORT{Biba,
	AUTHOR = {K. Biba},
	TITLE = {Integrity Considerations for Secure Computer Systems},
	INSTITUTION = {Mitre},
	YEAR = {1977},
	NUMBER = {TR-3153},
	ADDRESS = {Bedford, MA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {24-Feb-89, 5:08pm}
	}

@INPROCEEDINGS{Lip:int,
	AUTHOR = {S. Lipner},
	TITLE = {Non-Discretionary controls for Commercial Applications},
	BOOKTITLE = {Proc. 1982 IEEE Symp. Security and Privacy},
	YEAR = {1982},
	PAGES = {2--10},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ANNOTE = {Commercial Implemention of Integrities},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {23-Feb-89, 5:05pm}
	}

@BOOK{Pfl:book,
	AUTHOR = {C. Pfleeger},
	TITLE = {Security in Computing},
	PUBLISHER = {Prentice-Hall International, Inc.},
	YEAR = {1989},
	ADDRESS = {Englewood Cliffs, NJ},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {24-Feb-89, 4:50pm}
	}
@INPROCEEDINGS{Say:Lock,
	AUTHOR = {O. S. Saydjari and J. Beckman and J. Leaman},
	TITLE = {Locking Computers Securely},
	BOOKTITLE = {Proc. $10^{th}$ DoD/NBS Computer Security Conference},
	YEAR = {1987},
	PAGES = {129--140},
	ADDRESS = {Gaithersburg, MD},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@panda)},
	TIMESTAMP = {28-Feb-89, 7:02pm}
	}

@INPROCEEDINGS{Lee:int88,
	AUTHOR = {T. Lee},
	TITLE = {Using Mandatory Integrity to Enforce ``Commercial'' Security},
	BOOKTITLE = {1988 IEEE Symposium on Security and Privacy},
	YEAR = {1988},
	PAGES = {140--146},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {2-Mar-89, 11:52am}
	}

@TECHREPORT{Ben:Dmodel,
	AUTHOR = {G. Benson and I. Akyildiz and B. Appelbe},
	TITLE = {A Formal Protection Model of Security in Distributed Systems},
	INSTITUTION = {Georgia Institute of Technology},
	YEAR = {1989},
	NUMBER = {GIT-ICS-89/08},
	ADDRESS = {Atlanta, GA},
	MONTH = {February},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {8-Mar-89, 11:08am}
	}


@TECHREPORT{Orange,
	TITLE = {Trusted Computer Systems Evaluation Criteria},
	INSTITUTION = {DoD Computer Security Center},
	YEAR = {1983},
	NUMBER = {CSC-STD-001-83},
	ADDRESS = {Fort Meade, MD},
	MONTH = {August},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {21-Mar-89, 3:24pm}
	}

@TECHREPORT{Red,
	TITLE = {Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria},
	INSTITUTION = {National Computer Security Center},
	YEAR = {1987},
	NUMBER = {NCSC-TG-005},
	ADDRESS = {Ft. Meade, MD},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {22-Mar-89, 11:55am}
	}

@TECHREPORT{Scomp:eval,
	TITLE = {Final Evaluation Report of {S}{C}{O}{M}{P}},
	INSTITUTION = {DoD Computer Security Center},
	YEAR = {1985},
	NUMBER = {CSC-EPL-85/001},
	ADDRESS = {Ft. Meade, MD},
	MONTH = {September},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {5-Apr-89, 11:53am}
	}

@INPROCEEDINGS{Gri:Encap,
	AUTHOR = {D. Gries and J. Prins},
	TITLE = {A New Notion of Encapsulation},
	BOOKTITLE = {Proc. {S}{I}{G}{P}{L}{A}{N} Notices },
	YEAR = {1985},
	PAGES = {131--139},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {6-Apr-89, 11:59am}
	}

@INPROCEEDINGS{Lev:Proof,
	AUTHOR = {G. Levin and D. Gries},
	TITLE = {A Proof Technique for Communicating Sequential Processes},
	BOOKTITLE = {Acta Informatica 15},
	YEAR = {1981},
	PAGES = {281--302},
	PUBLISHER = {Springer-Verlag},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {6-Apr-89, 3:20pm}
	}

@INPROCEEDINGS{Owi:ax,
	AUTHOR = {S. Owicki and D. Gries},
	TITLE = {An axiomatic proof technique for parallel programs},
	BOOKTITLE = {Acta Informatica 6},
	YEAR = {1976},
	EDITOR = {Springer-Verlag},
	PAGES = {319--340},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {6-Apr-89, 3:22pm}
	}

@INPROCEEDINGS{Lamp:hoa,
	AUTHOR = {L. Lamport},
	TITLE = {The `Hoare Logic' of Concurrent Programs},
	BOOKTITLE = {Acta Informatica 14},
	YEAR = {1980},
	EDITOR = {Springer-Verlag},
	PAGES = {21--37},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {6-Apr-89, 3:22pm}
	}

@INPROCEEDINGS{Wil:file,
	AUTHOR = {J. Williams and G. Dinolt},
	TITLE = {Formal Model of a Trusted File Server},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {157--166},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:13pm}
	}

@INPROCEEDINGS{Wal:Net,
	AUTHOR = {S. Walker},
	TITLE = {Network Security: The Parts of the Sum},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {2--9},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:15pm}
	}

@INPROCEEDINGS{Lee:stat,
	AUTHOR = {T. Lee},
	TITLE = {Statistical Models of Trust: {T}{C}{B}s vs. People},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {10--19},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:17pm}
	}

@INPROCEEDINGS{Scha:Symb,
	AUTHOR = {M. Schaefer},
	TITLE = {Symbol Security Condition Considered Harmful},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {20--46},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:18pm}
	}

@INPROCEEDINGS{Bran:Mach,
	AUTHOR = {M. Branstad and H. Tajalli and F. Mayer and D. Dalva},
	TITLE = {Access Mediation in a Message Passing Kernel},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {66-72},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:20pm}
	}

@INPROCEEDINGS{Lev:setuid,
	AUTHOR = {T. Levin and S. Padilla and C. Irvine},
	TITLE = {A Formal Model for {U}{N}{I}{X} Setuid},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {73-83},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:21pm}
	}

@INPROCEEDINGS{Gren:TUNIS,
	AUTHOR = {G. Grenier and R. Holt and M. Funkenhauser},
	TITLE = {Policy vs. Mechanism in the Secure {T}{U}{N}{I}{S} Operating System},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {84--93},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Par:IPC,
	AUTHOR = {T. Parenty},
	TITLE = {The Incorporation of Multi-Level {I}{P}{C} into {U}{N}{I}{X}},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {94--99},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:25pm}
	}

@INPROCEEDINGS{Lunt:Agg,
	AUTHOR = {T. Lunt},
	TITLE = {Aggregation and Inference: Facts and Fallacies},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {102--109},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Fer:Obj,
	AUTHOR = {E. Fernandez and E. Gudes and H. Song},
	TITLE = {A Security Model for Object-Oriented Databases},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {110--115},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Wil:DBMS,
	AUTHOR = {J. Wilson},
	TITLE = {A Security Policy for an {A}1{D}{B}{M}{S} (a Trusted Subject)},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {116--125},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Su:Cell,
	AUTHOR = {T. Su and J. Chung and G. Ozsoyoglu},
	TITLE = {On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {126--135},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Mea:prot,
	AUTHOR = {C. Meadows},
	TITLE = {Using Narrowing in the Analysis of Key Management Protocols},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {138--147},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Cor:softeng,
	AUTHOR = {M. Cornwell},
	TITLE = {A Software Engineering Approach to Designing Trustworthy Software},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {148--156},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}

@INPROCEEDINGS{Say:lock89,
	AUTHOR = {O. Saydjari and J. Beckman and J. Leaman},
	TITLE = {{L}{O}{C}{K} Trak: Navigating Uncharted Space},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1989},
	PAGES = {167--175},
	ADDRESS = {Oakland, CA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 2:23pm}
	}



@INPROCEEDINGS{Rif:RFS,
	AUTHOR = {A. Rifkin et. al.},
	TITLE = {{R}{F}{S} Architectural Overview},
	BOOKTITLE = {Usenix Conference and Exhibition},
	YEAR = {1986},
	ADDRESS = {Atlanta, GA},
	MONTH = {Summer},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:00pm}
	}

@INPROCEEDINGS{Sand:NFS,
	AUTHOR = {R. Sandberg et. al.},
	TITLE = {Design and Implementation of the Sun Network File System},
	BOOKTITLE = {Usenix Conference and Exhibition},
	YEAR = {1985},
	ADDRESS = {Portland, OR},
	MONTH = {Summer},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:01pm}
	}

@TECHREPORT{Loc:InaJo,
	AUTHOR = {R. Locasso and J. Scheid and V. Schorre and P. Effert},
	TITLE = {The Ina Jo specification language reference manual},
	INSTITUTION = {System Development Corporation},
	YEAR = {1980},
	NUMBER = {TM-(L)-6021-001-00},
	ADDRESS = {Santa Monica, CA},
	MONTH = {June},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:09pm}
	}

@INPROCEEDINGS{Mac:phys,
	AUTHOR = {G. MacEwen and Z. Lu and B. Burwell},
	TITLE = {Multi-level security based on physical distribution},
	BOOKTITLE = {IEEE Symposium on Security and Privacy},
	YEAR = {1984},
	PAGES = {167--177},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:11pm}
	}

@INPROCEEDINGS{McH:net,
	AUTHOR = {J. McHugh and A. Moore},
	TITLE = {A Security Policy and Formal Top Level Specification},
	BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
	YEAR = {1986},
	PAGES = {34--39},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:13pm}
	}

@BOOK{Myers:arch,
	AUTHOR = {G. Myers},
	TITLE = {Advances in Computer Architecture},
	PUBLISHER = {Wiley and Sons},
	YEAR = {1978},
	ADDRESS = {New York},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:14pm}
	}

@TECHREPORT{Neu:PSOS,
	AUTHOR = {P. Neumann and R. Boyer and R. Feiertag and K. Levitt and L. Robinson},
	TITLE = {A Provably Secure Operating System: The System, its Applications, and Proofs},
	INSTITUTION = {{S}{R}{I} International},
	YEAR = {1980},
	NUMBER = {CSL-116},
	ADDRESS = {Menlo Park, CA},
	MONTH = {May},
	NOTE = {$2^{nd}$ ed.},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:16pm}
	}

@INPROCEEDINGS{Mye:hardcap,
	AUTHOR = {G. Myers and B. Buckingham},
	TITLE = {A Hardware Implementation of Capability-Based Addressing},
	BOOKTITLE = {{A}{C}{M} Operating Systems Review},
	YEAR = {1980},
	PAGES = {13--25},
	MONTH = {October},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:18pm}
	}

@INPROCEEDINGS{Pop:UCLAunix,
	AUTHOR = {G. Popek and M. Kampe and C. Kline and A. Stoughton and M. Urban and E. Walton},
	TITLE = {{U}{C}{L}{A} Secure {U}{N}{I}{X}},
	BOOKTITLE = {Proc. NCC},
	YEAR = {1979},
	PAGES = {355--364},
	PUBLISHER = {{A}{F}{I}{P}{S} Press},
	ADDRESS = {Montvale, NJ},
	MONTH = {June},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:21pm}
	}

@INPROCEEDINGS{Rus:desver,
	AUTHOR = {J. Rushby},
	TITLE = {Design and Verification of Secure Systems},
	BOOKTITLE = {Proceedings $8^{th}$ Symposium on Operating System Principles},
	YEAR = {1981},
	PAGES = {12--21},
	ADDRESS = {Pacific Grove, CA},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:23pm}
	}

@INPROCEEDINGS{Rus:DSS,
	AUTHOR = {J. Rushby and B. Randell},
	TITLE = {A Distributed Secure System},
	BOOKTITLE = {IEEE Computer},
	YEAR = {1983},
	PAGES = {55--67},
	PUBLISHER = {IEEE},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:24pm}
	}

@INPROCEEDINGS{Tan:Sparse,
	AUTHOR = {A. Tanenbaum},
	TITLE = {Using Sparse Capabilities in a Distributed Operating System},
	BOOKTITLE = {Proceedings of the $6^{th}$ International Conference on Distributed Computing Systems},
	YEAR = {1986},
	PAGES = {558--563},
	ADDRESS = {Cambridge, MA},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:26pm}
	}

@TECHREPORT{Rou:Special,
	AUTHOR = {O. Roubine and L. Robinson},
	TITLE = {{S}{P}{E}{C}{I}{A}{L} Reference Manual},
	INSTITUTION = {SRI International},
	YEAR = {1977},
	ADDRESS = {Menlo Park, CA},
	MONTH = {January},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:28pm}
	}

@INPROCEEDINGS{Sid:lan,
	AUTHOR = {D. Sidhu and M. Gasser},
	TITLE = {A Multilevel Secure Local Area Network},
	BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
	YEAR = {1982},
	PAGES = {137--143},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:29pm}
	}

@BOOK{Stal:comm,
	AUTHOR = {W. Stallings},
	TITLE = {Data and Computer Communications},
	PUBLISHER = {Macmillan Pub. Co.},
	YEAR = {1985},
	ADDRESS = {NY, NY},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:31pm}
	}

@INPROCEEDINGS{Wood:App,
	AUTHOR = {J. Woodward},
	TITLE = {Applications for Multilevel Secure Operating Systems},
	BOOKTITLE = {Proceedings NCC},
	YEAR = {1979},
	PAGES = {319--328},
	PUBLISHER = {{A}{F}{I}{P}{S} Press},
	ADDRESS = {Montvale, NJ},
	MONTH = {June},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:33pm}
	}

@INPROCEEDINGS{Zim:ISO,
	AUTHOR = {A. Zimmermann},
	TITLE = {The {I}{S}{O} Model of Architecture for Open Systems Interconnection},
	BOOKTITLE = {IEEE Transactions on Communications},
	YEAR = {1980},
	PAGES = {425--432},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:35pm}
	}

@INPROCEEDINGS{Gold:VM370,
	AUTHOR = {B. Gold and R. Linde and R. Peeler and M. Schaefer and J. Scheid and P. Ward},
	TITLE = {A Security Retrofit of {V}{M}/370},
	BOOKTITLE = {Proceedings {N}{C}{C}},
	YEAR = {1979},
	PAGES = {335--344},
	PUBLISHER = {{A}{F}{I}{P}{S} Press},
	ADDRESS = {Montvale, NJ},
	MONTH = {June},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:40pm}
	}

@INPROCEEDINGS{Gli:xenix,
	AUTHOR = {V. Gligor and C. Burch and R. Chandersekaran and L. Chanpman and M. Hecht and W. Jiang and G. Luckenbaugh and N. Vasudevan},
	TITLE = {On the Design and the Implementation of Secure Xenix Workstations},
	BOOKTITLE = {Proceedings IEEE Symposium on Security and Privacy},
	YEAR = {1986},
	PAGES = {102--117},
	ADDRESS = {Oakland, CA},
	MONTH = {April},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:43pm}
	}

@INPROCEEDINGS{Gla:spec,
	AUTHOR = {J. Glasgow and G. MacEwen},
	TITLE = {The Development and Proof of a Formal Specification for a Multilevel Secure System},
	BOOKTITLE = {{A}{C}{M} Transactions on Computer Systems},
	YEAR = {1987},
	PAGES = {151--184},
	MONTH = {May},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:46pm}
	}

@MANUAL{Gould:Ov,
	TITLE = {Gould Users's Guide and User's Reference Manual of the Gould {U}{T}{X}-325},
	EDITION = {1},
	MONTH = {April},
	YEAR = {1987},
	ENTEREDBY = {Glenn S Benson (benson@python)},
	TIMESTAMP = {1-Dec-88, 5:23pm}
	}
@INPROCEEDINGS{Kain:cap,
	AUTHOR = {R. Kain and L. Landwehr},
	TITLE = {On Access Checking in Capability-Based Systems},
	BOOKTITLE = {IEEE Transactions on Software Engineering},
	YEAR = {1987},
	PAGES = {202--207},
	MONTH = {February},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:50pm}
	}

@INPROCEEDINGS{Lamp:time,
	AUTHOR = {L. Lamport},
	TITLE = {Time, Clocks, and the Ordering of Events in a Distributed System},
	BOOKTITLE = {Communications of the {A}{C}{M}},
	YEAR = {1978},
	PAGES = {558--565},
	MONTH = {July},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:52pm}
	}

@TECHREPORT{Land:BAT,
	AUTHOR = {C. Landwehr},
	TITLE = {Best Available Technologies ({B}{A}{T}s) for Computer Security},
	INSTITUTION = {Office of Naval Research},
	YEAR = {1981},
	NUMBER = {8554},
	ADDRESS = {Washington D.C.},
	MONTH = {December},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 5:57pm}
	}

@INPROCEEDINGS{Reed:evcount,
	AUTHOR = {D. Reed and R. Kanodia},
	TITLE = {Synchronization with Eventcounts and Sequencers},
	BOOKTITLE = {Proceedings $6^{th}$ {A}{C}{M} Symposium on Operating Systems Principles},
	YEAR = {1977},
	PAGES = {91},
	MONTH = {November},
	ENTEREDBY = {Glenn S Benson (benson@dove)},
	TIMESTAMP = {14-May-89, 6:03pm}
	}