1981 IEEE Symposium on Security and Privacy

27-29 April 1981

Filter Results

Displaying Results 1 - 21 of 21
  • Symposium

    Publication Year: 1981, Page(s): iii
    Request permission for reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Information Flow Analysis of Formal Specifications

    Publication Year: 1981, Page(s): 3
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (453 KB)

    A method is given to enumerate the flows between variables in systems specified in a non-procedural language. It finds all flows that would exist according to a deductive theory of information flow. It is presented in the form of an attribute grammar for the specification language. The effect of system invariants is discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Flow: A Protection Model which Integrates Access Control and Information Flow

    Publication Year: 1981, Page(s): 9
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    Past work concerning operating system protection has focused on two notions: access control and information flow. Access control or protection matrix based protection systems control the ways in which users may manipulate objects. Information flow or security class based systems control the flow of information between users. Although it has been noted that both notions are essential to real protec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security

    Publication Year: 1981, Page(s): 19
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (598 KB)

    Financial people have advocated, and even demanded an auditing process within computers so that trails could be analyzed. Both security and privacy, likewise, can make great use of the same type of logging activity. This paper considers several issues with respect to such activity; but perhaps the most fundamental idea is that a single, unified, well-designed logging process has a wide variety of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mechanism Sufficiency Validation by Assignment

    Publication Year: 1981, Page(s): 26
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    This paper introduces a mathematical framework for evaluating the relationship between policies and mechanisms. An evaluation approach called the assigmnent technique is defined. This technique consists of establishing an assignment between the security classes of information established by policy constraints, and the protection domains, established by the properties of the mechanism. The assignme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restriciting Queries that Might Lead to Compromise

    Publication Year: 1981, Page(s): 33
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (563 KB)

    The feasibility of an inference control that determines at the time of a query whether a requested statistic could lead to compromise is investigated. One candidate is the "fail-safe" control, which restricts any statistic whose implied query sets are too small (or too large). We shall show that this control is infeasible, and does not prevent many compromises. By comparison, the cell suppression ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Transport of Privileges

    Publication Year: 1981, Page(s): 41
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    In a system based on authorization, the power that a subject has to operate on the system is a function of the privileges which he possesses. In this paper we introduce a mechanism for the transport of such privileges. The control provided over the transport of privileges by this mechanism has two notable properties. The control is local, in the sense that every movement of privileges into the dom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Complete Protection Model

    Publication Year: 1981, Page(s): 49
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (501 KB)

    The Bell & LaPadula computer security model is, to date, the most successful data flow restriction security model. Specifically, it prevents unauthorized downgrading of data. K.J. Bibs strengthened the Bell & LaPadula security model by adding security's mathematical dual (integrity) to prevent unauthorized upgrading of data. The security and integrity constraints are overly restrictive in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processing Multilevel Secure Objects

    Publication Year: 1981, Page(s): 56
    Cited by:  Patents (30)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (487 KB)

    The paper describes an architecture for processing multilevel objects in a multilevel secure environment, and discusses the inherent problems involved. A multilevel intelligent terminal is proposed as a practical application for the proposed architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Half a Loaf is Better than None: Some Novel Message Integrity Problems

    Publication Year: 1981, Page(s): 65
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (582 KB)

    The familiar failing of digital signatures formed using an individual's private key in a public key cryptosystem is that the signature can be disavowed, in the sense that an impartial arbiter cannot prove otherwise, by the holder of the Private key either disclosing, or claiming, the disclosure of his key. In various guises this failure characterizes all individual identification systems which equ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Applications of Cryptography

    Publication Year: 1981, Page(s): 70
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Cryptography is no longer the province of a specialized elite of mathematicians and military operatives. Its potential cost-effective applications to modern computer/communications systems appear to be many and varied. In spite of disappointing sales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Proofs for Information Protection Systems

    Publication Year: 1981, Page(s): 75
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1019 KB)

    Recently discovered procedures use a random input, rather than a cryptographic key, to turn a piece s of information into n + 1 pieces of information in such a way that s can be recovered from any b + 1 of them but that it is hard, or perhaps impossible in a sense which must be precisely defined, to recover s from any b of them. Thus, for example, one might have 15 pieces of information such that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems

    Publication Year: 1981, Page(s): 89
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (895 KB)

    A set of required security criteria is developed which assures that the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card and information remembered by a systerm user are employed for personal verification. Under that assumption, it is shown that only through the use of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Computer Systems

    Publication Year: 1981, Page(s): 99
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (122 KB)

    The DOD Computer Security Initiative, is aimed at stimulating the widespread commercial availability of trusted computer systems. A trusted computer system is one that employs sufficient hardware and software integrity measures to allow its use in processing multiple levels of classified or sensitive information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Military Message Systems: Applying a Security Model

    Publication Year: 1981, Page(s): 101
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1062 KB)

    This paper is part of a comprehensive effort intended to apply modern software engineering and computer security concepts to the requirements specification and designof a family of Military Message Systems (MMS). Each family member is tailored to a particular application and thus may have features or restrictions not required of other family members. Several steps already taken in specifying the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Protection Systems

    Publication Year: 1981, Page(s): 113
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (783 KB)

    In this paper, the Take-Grant Model devel-oped by Jones, Lipton, and Snyder is extended in order to represent and study hierarchical protection systems. Two major classes of hierarchical systems are identified: tree systems and acyclic systems. The first class deala with an organization that places decision-making in a single authority while the second provides for decentralization of authority. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Structure of a Security Kernel for the Z8000 Multiprocessor

    Publication Year: 1981, Page(s): 124
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The security kernel technology has provided the technical foundation for highly reliable protection of computerizedinformation. However, the operating system implementations face two significant challenges: providing (1) adequate computational resources for applications tasks, and (2) a clean, straightforward structure whose correctness can be easily reviewed. This paper presents the experience of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture

    Publication Year: 1981, Page(s): 133
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (581 KB)

    Operating systems security is relatively new area. Most Operating Systems were designed without adequate attention to security since the primary concerns were economic. In this paper we present a new architecture that facilitates the design of secure time-shared Operating Systems. This approach differs from others that rely on verification to achieve security. In the proposed architecture, encrypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Kernels: A Solution or a Problem?

    Publication Year: 1981, Page(s): 141
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (927 KB)

    Security kernels are now emerging from the R&D community. Unfortunately the quality of these systems has not lived up to original expectations. While useful for allowing users of various security levels to share common hardware, the original problem that they were designed to solve, security kernels are less than ideal for solving applications that are truly multi-level, the problem that now n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Session: Cryptography

    Publication Year: 1981, Page(s): 151
    Request permission for reuse | PDF file iconPDF (1134 KB)
    Freely Available from IEEE
  • Panel Session: Kernel Performance Issues

    Publication Year: 1981, Page(s): 162
    Request permission for reuse | PDF file iconPDF (1772 KB)
    Freely Available from IEEE