Skip to main content
  • 295 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

2.9 References

  1. “The Protection of Information in Computer Systems”, Jerome Saltzer and Michael Schroeder, Proceedings of the IEEE, Vol.63,No.9 (September 1975), p.1278.

    Google Scholar 

  2. “Object-Oriented Software Construction, Second Edition”, Bertrand Meyer, Prentice Hall, 1997.

    Google Scholar 

  3. “Assertion Definition Language (ADL) 2.0”, X/Open Group, November 1998.

    Google Scholar 

  4. “Security in Computing”, Charles Pfleeger, Prentice-Hall, 1989.

    Google Scholar 

  5. “Why does Trusted Computing Cost so Much”, Susan Heath, Phillip Swanson, and Daniel Gambel, Proceedings of the 14thNational Computer Security Conference, October 1991, p.644. Republished in the Proceedings of the 4thAnnual Canadian Computer Security Symposium, May 1992, p.71.

    Google Scholar 

  6. “Protection”, Butler Lampson, Proceedings of the 5thPrinceton Symposium on Information Sciences and Systems, Princeton, 1971, p.437.

    Google Scholar 

  7. “Issues in Discretionary Access Control”, Deborah Downs, Jerzy Rub, Kenneth Kung, and Carole Joran, Proceedings of the 1985 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1985, p.208.

    Google Scholar 

  8. “A lattice model of secure information flow”, Dorothy Denning, Communications of the ACM, Vol.19.No.5 (May 1976), p.236.

    Article  MATH  MathSciNet  Google Scholar 

  9. “Improving Security and Performance for Capability Systems”, Paul Karger, PhD Thesis, University of Cambridge, October 1988.

    Google Scholar 

  10. “A Secure Identity-Based Capability System”, Li Gong, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.56.

    Google Scholar 

  11. “Mechanisms for Persistence and Security in BirliX”, W. Kühnhauser, H. Härtig, O. Kowalski, and W. Lux, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.309.

    Google Scholar 

  12. “Access Control by Boolean Expression Evaluation”, Donald Miller and Robert Baldwin, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.131.

    Google Scholar 

  13. “An Analysis of Access Control Models”, Gregory Saunders, Michael Hitchens, and Vijay Varadharajan, Proceedings of the Fourth Australasian Conference on Information Security and Privacy (ACISP’99), Springer-Verlag Lecture Notes in Computer Science, No.1587, April 1999, p.281.

    Google Scholar 

  14. “Designing the GEMSOS Security Kernel for Security and Performance”, Roger Schell, Tien Tao, and Mark Heckman, Proceedings of the 8thNational Computer Security Conference, September 1985, p.108.

    Google Scholar 

  15. “Secure Computer Systems: Mathematical Foundations and Model”, D.Elliott Bell and Leonard LaPadula, M74-244, MITRE Corporation, 1973.

    Google Scholar 

  16. “Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the US Military”, Donald MacKenzie and Garrel Pottinger, IEEE Annals of the History of Computing, Vol.19,No.3 (July–September 1997), p.41.

    Article  Google Scholar 

  17. “Secure Computing: The Secure Ada Target Approach”, W. Boebert, R. Kain, and W. Young, Scientific Honeyweller, Vol.6,No.2 (July 1985).

    Google Scholar 

  18. “A Note on the Confinement Problem”, Butler Lampson, Communications of the ACM, Vol.16,No.10 (October 1973), p.613.

    Article  Google Scholar 

  19. “Trusted Computer Systems Evaluation Criteria”, DOD 5200.28-STD, US Department of Defence, December 1985.

    Google Scholar 

  20. “Trusted Products Evaluation”, Santosh Chokhani, Communications of the ACM, Vol.35,No.7 (July 1992), p.64.

    Article  Google Scholar 

  21. “NOT the Orange Book: A Guide to the Definition, Specification, and Documentation of Secure Computer Systems”, Paul Merrill, Merlyn Press, Wright-Patterson Air Force Base, 1992.

    Google Scholar 

  22. “Evaluation Criteria for Trusted Systems”, Roger Schell and Donald Brinkles, “Information Security: An Integrated Collection of Essays”, IEEE Computer Society Press, 1995, p.137.

    Google Scholar 

  23. “Integrity Considerations for Secure Computer Systems”, Kenneth Biba, ESD-TR-76-372, USAF Electronic Systems Division, April 1977.

    Google Scholar 

  24. “Fundamentals of Computer Security Technology”, Edward Amoroso, Prentice-Hall, 1994.

    Google Scholar 

  25. “Operating System Integrity”, Greg O’Shea, Computers and Security, Vol.10,No.5 (August 1991), p.443.

    Google Scholar 

  26. “Risk Analysis of ‘Trusted Computer Systems’”, Klaus Brunnstein and Simone Fischer-Hübner, Computer Security and Information Integrity, Elsevier Science Publishers, 1991, p.71.

    Google Scholar 

  27. “A Comparison of Commercial and Military Computer Security Policies”, David Clark and David Wilson, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, p.184.

    Google Scholar 

  28. “Transaction Processing: Concepts and Techniques” Jim Gray and Andreas Reuter, Morgan Kaufmann, 1993.

    Google Scholar 

  29. “Atomic Transactions”, Nancy Lynch, Michael Merritt, William Weihl, and Alan Fekete, Morgan Kaufmann, 1994.

    Google Scholar 

  30. “Principles of Transaction Processing”, Philip Bernstein and Eric Newcomer, Morgan Kaufman Series in Data Management Systems, January 1997.

    Google Scholar 

  31. “Non-discretionary controls for commercial applications”, Steven Lipner, Proceedings of the 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, p.2.

    Google Scholar 

  32. “Putting Policy Commonalities to Work”, D.Elliott Bell, Proceedings of the 14thNational Computer Security Conference, October 1991, p.456.

    Google Scholar 

  33. “Modeling Mandatory Access Control in Role-based Security Systems”, Matunda Nyanchama and Sylvia Osborn, Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security (Database Security IX), Chapman & Hall, August 1995, p.129.

    Google Scholar 

  34. “Role Activation Hierarchies”, Ravi Sandhu, Proceedings of the 3rdACM Workshop on Role-Based Access Control (RBAC’98), October 1998, p.33.

    Google Scholar 

  35. “The Chinese Wall Security Policy”, David Brewer and Michael Nash, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.206.

    Google Scholar 

  36. “Chinese Wall Security Policy — An Aggressive Model”, T. Lin, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.282.

    Google Scholar 

  37. “A lattice interpretation of the Chinese Wall policy”, Ravi Sandhu, Proceedings of the 15thNational Computer Security Conference, October 1992, p.329.

    Google Scholar 

  38. “Lattice-Based Enforcement of Chinese Walls”, Ravi Sandhu, Computers and Security, Vol.11,No.8 (December 1992), p.753.

    Article  Google Scholar 

  39. “On the Chinese Wall Model”, Volker Kessler, Proceedings of the European Symposium on Resarch in Computer Security (ESORICS’92), Springer-Verlag Lecture Notes in Computer Science, No.648, November 1992, p.41.

    Google Scholar 

  40. “A Retrospective on the Criteria Movement”, Willis Ware, Proceedings of the 18thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1995, p.582.

    Google Scholar 

  41. “Certification of programs for secure information flow”, Dorothy Denning, Communications of the ACM, Vol.20,No.6 (June 1977), p.504.

    MATH  Google Scholar 

  42. “Computer Security: A User’s Perspective”, Lenora Haldenby, Proceedings of the 2ndAnnual Canadian Computer Security Conference, March 1990, p.63.

    Google Scholar 

  43. “Some Extensions to the Lattice Model for Computer Security”, Jie Wu, Eduardo Fernandez, and Ruigang Zhang, Computers and Security, Vol.11,No.4 (July 1992), p.357.

    Article  Google Scholar 

  44. “Exploiting the Dual Nature of Sensitivity Labels”, John Woodward, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, p.23.

    Google Scholar 

  45. “A Multilevel Security Model for Distributed Object Systems”, Vincent Nicomette and Yves Deswarte, Proceedings of the 4thEuropean Symposium on Research in Computer Security (ESORICS’96), Springer-Verlag Lecture Notes in Computer Science, No.1146, September 1996, p.80.

    Google Scholar 

  46. “Security Kernels: A Solution or a Problem”, Stanley Ames Jr., Proceedings of the 1981 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1981, p.141.

    Google Scholar 

  47. “A Security Model for Military Message Systems”, Carl Landwehr, Constance Heitmeyer, and John McLean, ACM Transactions on Computer Systems, Vol.2,No.3 (August 1984), p.198.

    Article  Google Scholar 

  48. “A Security Model for Military Message Systems: Restrospective”, Carl Landwehr, Constance Heitmeyer, and John McLean, Proceedings of the 17thAnnual Computer Security Applications Conference (ACSAC’01), December 2001, p.174.

    Google Scholar 

  49. “Development of a Multi Level Data Generation Application for GEMSOS”, E. Schallenmuller, R. Cramer, and B. Aldridge, Proceedings of the 5thAnnual Computer Security Applications Conference, December 1989, p.86.

    Google Scholar 

  50. “A Security Model for Military Message Systems”, Carl Landwehr, Constance Heitmeyer, and John McLean, ACM Transactions on Computer Systems, Vol.2,No.3 (August 1984), p.198.

    Article  Google Scholar 

  51. “Formal Models for Computer Security”, Carl Landwehr, ACM Computing Surveys, Vol. 13,No. 3 (September 1981), p.247

    Article  Google Scholar 

  52. “A Taxonomy of Integrity Models, Implementations, and Mechanisms”, J.Eric Roskos, Stephen Welke, John Boone, and Terry Mayfield, Proceedings of the 13thNational Computer Security Conference, October 1990, p.541.

    Google Scholar 

  53. “An Analysis of Application Specific Security Policies” Daniel Sterne, Martha Branstad, Brian Hubbard, Barbara Mayer, and Dawn Wolcott, Proceedings of the 14thNational Computer Security Conference, October 1991, p.25.

    Google Scholar 

  54. “Is there a need for new information security models?”, S.A. Kokolakis, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security (Communications and Security II), Chapman & Hall, 1996, p.256.

    Google Scholar 

  55. “The Multipolicy Paradigm for Trusted Systems”, Hilary Hosmer, Proceedings of the 1992 New Security Paradigms Workshop, ACM, 1992, p.19.

    Google Scholar 

  56. “Metapolicies II”, Hilary Hosmer, Proceedings of the 15thNational Computer Security Conference, October 1992, p.369.

    Google Scholar 

  57. “Security Kernel Design and Implementation: An Introduction”, Stanley Ames Jr, Morrie Gasser, and Roger Schell, IEEE Computer, Vol.16,No.7 (July 1983), p.14.

    Google Scholar 

  58. “Kernels for Safety?”, John Rushby, Safe and Secure Computing Systems, Blackwell Scientific Publications, 1989, p.210.

    Google Scholar 

  59. “Security policies and security models”, Joseph Goguen and José Meseguer, Proceedings of the 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, p.11.

    Google Scholar 

  60. “The Architecture of Complexity”, Herbert Simon, Proceedings of the American Philosophical Society, Vol.106,No.6 (December 1962), p.467.

    Google Scholar 

  61. “Design and Verification of Secure Systems”, John Rushby, ACM Operating Systems Review, Vol.15,No.5 (December 1981), p.12.

    Google Scholar 

  62. “Developing Secure Systems in a Modular Way”, Qi Shi, J. McDermid, and J. Moffett, Proceedings of the 8thAnnual Conference on Computer Assurance (COMPASS’93), IEEE Computer Society Press, 1993, p.111.

    Google Scholar 

  63. “A Separation Model for Virtual Machine Monitors”, Nancy Kelem and Richard Feiertag, Proceedings of the 1991 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1991, p.78.

    Google Scholar 

  64. “A Retrospective on the VAX VMM Security Kernel”, Paul Karger, Mary Ellen Zurko, Douglas Bonin, Andrew Mason, and Clifford Kahn, IEEE Transactions on Software Engineering, Vol.17,No.11 (November 1991), p1147.

    Article  Google Scholar 

  65. “Separation Machines”, Jon Graff, Proceedings of the 15thNational Computer Security Conference, October 1992, p.631.

    Google Scholar 

  66. “Proof of Separability: A Verification Technique for a Class of Security Kernels”, John Rushby, Proceedings of the 5thSymposium on Programming, Springer-Verlag Lecture Notes in Computer Science, No.137, August 1982.

    Google Scholar 

  67. “A Comment on the ‘Basic Security Theorem’ of Bell and LaPadula”, John McLean, Information Processing Letters, Vol.20,No.2 (15 February 1985), p.67.

    Article  MathSciNet  Google Scholar 

  68. “On the validity of the Bell-LaPadula model”, E.Roos Lindgren and I. Herschberg, Computers and Security, Vol.13,No.4 (1994), p.317.

    Google Scholar 

  69. “New Thinking About Information Technology Security”, Marshall Abrams and Michael Joyce, Computers and Security, Vol.14,No.1 (January 1995), p.57.

    Google Scholar 

  70. “A Provably Secure Operating System: The System, Its Applications, and Proofs”, Peter Neumann, Robert Boyer, Richard Feiertag, Karl Levitt, and Lawrence Robinson, SRI Computer Science Laboratory report CSL 116, SRI International, May 1980.

    Google Scholar 

  71. “Locking Computers Securely”, O.Sami Saydari, Joseph Beckman, and Jeffrey Leaman, Proceedings of the 10thAnnual Computer Security Conference, 1987, p.129.

    Google Scholar 

  72. “Constructing an Infosec System Using the LOCK Technology”, W.Earl Boebert, Proceedings of the 8thNational Computer Security Conference, October 1988, p.89.

    Google Scholar 

  73. “M2S: A Machine for Multilevel Security”, Bruno d’Ausbourg and Jean-Henri Llareus, Proceedings of the European Symposium on Research in Computer Security (ESORICS’92), Springer-Verlag Lecture Notes in Computer Science, No.648, November 1992, p.373.

    Google Scholar 

  74. “MUTABOR, A Coprocessor Supporting Memory Management in an Object-Oriented Architecture”, Jörg Kaiser, IEEE Micro, Vol.8,No.5 (September/October 1988), p.30.

    Article  Google Scholar 

  75. “An Object-Oriented Approach to Support System Reliability and Security”, Jörg Kaiser, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.173.

    Google Scholar 

  76. “Active Memory for Managing Persistent Objects”, S. Lavington and R. Davies, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, Springer-Verlag, May 1990, p.137.

    Google Scholar 

  77. “Programming a VIPER”, T. Buckley, P. Jesty, Proceedings of the 4thAnnual Conference on Computer Assurance (COMPASS’89), IEEE Computer Society Press, 1989, p.84.

    Google Scholar 

  78. “Report on the Formal Specification and Partial Verification of the VIPER Microprocessor”, Bishop Brock and Warren Hunt Jr., Proceedings of the 6thAnnual Conference on Computer Assurance (COMPASS’91), IEEE Computer Society Press, 1991, p.91.

    Google Scholar 

  79. “User Threatens Court Action over MoD Chip”, Simon Hill, Computer Weekly, 5 July 1990, p.3.

    Google Scholar 

  80. “MoD in Row with Firm over Chip Development”, The Independent, 28 May 1991.

    Google Scholar 

  81. “The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems”, Olin Sibert, Phillip Porras, and Robert Lindell, Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1995, p.211.

    Google Scholar 

  82. “The Segment Descriptor Cache”, Robert Collins, Dr.Dobbs Journal, August 1998.

    Google Scholar 

  83. “The Caveats of Pentium System Management Mode”, Robert Collins, Dr.Dobbs Journal, May 1997.

    Google Scholar 

  84. “QNX crypt() broken”, Peter Gutmann, posting to the cryptography@c2.net mailing list, message-ID 95583323401676@kahu.cs.auckland.ac.nz, 16 April 2000.

    Google Scholar 

  85. “qnx crypt comprimised” [sic],’ sean’, posting to the bugtraq@securityfocus.com mailing list, message-ID 20000415030309.6007.qmail@securityfocus.-com, 15 April 2000.

    Google Scholar 

  86. “Adam’s Guide to the Iopener”, http://www.adamlotz.com/iopener.html.

  87. “Hacking The iOpener”, http://iopener.how.to/.

  88. “Iopener as a Thin Client!”, http://www.ltsp.org/documentation/-iopener.php.

  89. “I-Opener FAQ”, http://fastolfe.net/misc/i-opener-faq.html.

  90. “I-Opener Running Linux”, http://www.linux-hacker.net/imod/-imod.html.

  91. “Security Requirements for Cryptographic Modules”, FIPS PUB 140-2, National Institute of Standards and Technology, June 2001.

    Google Scholar 

  92. “Cryptographic Application Programming Interfaces (APIs)”, Bill Caelli, Ian Graham, and Luke O’Connor, Computers and Security, Vol.12,No.7 (November 1993), p.640.

    Article  Google Scholar 

  93. “The Best Available Technologies for Computer Security”, Carl Landwehr, IEEE Computer, Vol.16,No 7 (July 1983), p.86.

    Google Scholar 

  94. “A GYPSY-Based Kernel”, Bret Hartman, Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, p.219.

    Google Scholar 

  95. “KSOS — Development Methodology for a Secure Operating System”, T. Berson and G. Barksdale, National Computer Conference Proceedings, Vol.48 (1979), p.365.

    Google Scholar 

  96. “A Network Pump”, Myong Kang, Ira Moskowitz, and Daniel Lee, IEEE Transactions on Software Engineering, Vol.22,No.5 (May 1996), p.329.

    Article  Google Scholar 

  97. “Design and Assurance Strategy for the NRL Pump”, Myong Kang, Andrew Moore, and Ira Moskowitz, IEEE Computer, Vol.31,No.4 (April 1998), p.56.

    Google Scholar 

  98. “Blacker: Security for the DDN: Examples of A1 Security Engineering Trades”, Clark Weissman, Proceedings of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1992, p.286.

    Google Scholar 

  99. “Panel Session: Kernel Performance Issues”, Marvin Shaefer (chairman), Proceedings of the 1981 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1981, p.162.

    Google Scholar 

  100. “AIM — Advanced Infosec Machine”, Motorola Inc, 1999.

    Google Scholar 

  101. “AIM — Advanced Infosec Machine — Multi-Level Security”, Motorola Inc, 1998.

    Google Scholar 

  102. “Formal Construction of the Mathematically Analyzed Separation Kernel”, W. Martin, P. White, F.S. Taylor, and A. Goldberg, Proceedings of the 15thInternational Conference on Automated Software Engineering (ASE’00), IEEE Computer Society Press, September 2000, p.133.

    Google Scholar 

  103. “An Avenue for High Confidence Applications in the 21st Century”, Timothy Kremann, William Martin, and Frank Taylor, Proceedings of the 22ndNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1999, CDROM distribution.

    Google Scholar 

  104. “Integrating an Object-Oriented Data Model with Multilevel Security”, Sushil Jajodia and Boris Kogan, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.76.

    Google Scholar 

  105. “Security Issues of the Trusted Mach System”, Martha Branstad, Homayoon Tajalli, and Frank Meyer, Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, p.362.

    Google Scholar 

  106. “Access Mediation in a Message Passing Kernel”, Martha Branstad, Homayoon Tajalli, Frank Meyer, and David Dalva, Proceedings of the 1989 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1989, p.66.

    Google Scholar 

  107. “Transaction Control Expressions for Separation of Duties”, Ravi Sandhu, Proceedings of the 4th Aerospace Computer Security Applications Conference, December 1988, p.282.

    Google Scholar 

  108. “Separation of Duties in Computerised Information Systems”, Ravi Sandhu, Database Security IV: Status and Prospects, Elsevier Science Publishers, 1991, p.179.

    Google Scholar 

  109. “Implementing Transaction Control Experssions by Checking for Absence of Access Rights”, Paul Ammann and Ravi Sandhu, Proceedings of the 8thAnnual Computer Security Applications Conference, December 1992, p.131.

    Google Scholar 

  110. “Enforcing Complex Security Policies for Commercial Applications”, I-Lung Kao and Randy Chow, Proceedings of the 19thAnnual International Computer Software and Applications Conference (COMPSAC’95), IEEE Computer Society Press, 1995, p.402.

    Google Scholar 

  111. “Enforcement of Complex Security Policies with BEAC”, I-Lung Kao and Randy Chow, Proceedings of the 18thNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1995, p.1.

    Google Scholar 

  112. “A TCB Subset for Integrity and Role-based Access Control”, Daniel Sterne, Proceedings of the 15thNational Computer Security Conference, October 1992, p.680.

    Google Scholar 

  113. “Regulating Processing Sequences via Object State”, David Sherman and Daniel Sterne, Proceedings of the 16thNational Computer Security Conference, October 1993, p.75.

    Google Scholar 

  114. “A Relational Database Security Policy”, Rae Burns, Computer Security and Information Integrity, Elsevier Science Publishers, 1991, p.89.

    Google Scholar 

  115. “Extended Discretionary Access Controls”, Stephen Vinter, Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, p.39.

    Google Scholar 

  116. “Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control Systems”, Adrian Spalka, Armin Cremers, and Hurtmut Lehmler, Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP’00), Springer-Verlag Lecture Notes in Computer Science No.1841, July 200, p.1.

    Google Scholar 

  117. “On the Need for a Third Form of Access Control”, Richard Graubart, Proceedings of the 12thNational Computer Security Conference, October 1989, p.296.

    Google Scholar 

  118. “Beyond the Pale of MAC and DAC — Defining New Forms of Access Control”, Catherine McCollum, Judith Messing, and LouAnna Notargiacomo, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.190.

    Google Scholar 

  119. “Testing Object-Oriented Systems”, Robert Binder, Addison-Wesley, 1999.

    Google Scholar 

  120. “Operating Systems: Design and Implementation (2nd ed)”, Andrew Tanenbaum and Albert Woodhull, Prentice-Hall, 1997.

    Google Scholar 

  121. “Attacks on Cryptoprocessor Transaction Sets”, Mike Bond, Proceedings of the 3rdInternational Workshop on Cryptographic Hardware and Embedded Systems (CHES’01), Springer-Verlag Lecture Notes in Computer Science No.2162, 2001, p.220.

    Google Scholar 

  122. “API-Level Attacks on Embedded Systems”, Mike Bond and Ross Anderson, IEEE Computer, Vol.34,No.10 (October 2001), p.67.

    Google Scholar 

  123. “Knowledge-Based Computer Security Advisor”, W. Hunteman and M. Squire, Proceedings of the 14thNational Computer Security Conference, October 1991, p.347.

    Google Scholar 

  124. “Integrating Cryptography in the Trusted Computing Base”, Michael Roe and Tom Casey, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.50.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

(2004). The Security Architecture. In: Cryptographic Security Architecture. Springer, New York, NY. https://doi.org/10.1007/0-387-21551-4_2

Download citation

  • DOI: https://doi.org/10.1007/0-387-21551-4_2

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-95387-8

  • Online ISBN: 978-0-387-21551-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics