{"title":"Verification of Treaty Compliance -- Revisited","authors":"G. J. Simmons","doi":"10.1109/SP.1983.10016","DOIUrl":"https://doi.org/10.1109/SP.1983.10016","url":null,"abstract":"In a series of papers, the author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how two mutually deceitful and distrusting parties -- the host and the monitor -- can both trust a data acquisition system whose function is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually irreconcilable, however the conclusion of this paper will be that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this fourth, and hopefully final, iteration of treaty verification systems is based is the concatenation of two or more two key cryptographic systems. In the resulting system no part of the rneasage need be kept secret from any participant at anytime; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties can be logically persuaded of the authenticity of messages. Thus, finally after a decade of development a complete technical solution is in hand for the problem of the verification of treaty compliance.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Processor-per-Domain Guard Architecture","authors":"T. Berson, R. Feiertag, R. K. Bauer","doi":"10.1109/SP.1983.10006","DOIUrl":"https://doi.org/10.1109/SP.1983.10006","url":null,"abstract":"The motlvatlon, conception and design of a data filter operating In the security class.lflcatlon domain are described The filter architecture features dlstlnct dcmalns with a separate mlcrOprOcessor In each Isolatlon of the domains 1s accomplished exculslvely by hardware Sharing between the domains 1s con– trolled by trusted software This architecture facilitates verlflcatlon and prov]des flexlblllty, economy, and high throughput A prototgpe of the filter has been Implemented and applled to guarding channels connecting a multicompartmented database to lower level networks The protot~pe ’s operation is fully automatic It uses secret key dlg~tal signatures associated with each database record to authenticate classlflcatlon markings and data A filter security pollcy has been modelled and the prototype design and implementation have been shown Informally to comply. Future directions zn architecture, engineering, application and verification are discussed I20 CH1882-O/83/~/OIN$Ol.M@1983 IEEE","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Enhancement through Product Evaluation","authors":"P. Woodie","doi":"10.1109/SP.1983.10020","DOIUrl":"https://doi.org/10.1109/SP.1983.10020","url":null,"abstract":"This paper describes a major goal of the DOD Computer Security Center, which is to encouraqe the easy availability of computer products with enhanced security features. The mechanisms by which this is to be accomplished are described. There are detailed explanations of the Preliminary and Final Product Evaluation processes. The paper then takes a pragmatic view, from three perspectives, of how the process is actually working. Finally, an update is included, which describes the present status of the evaluation efforts underway.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Views in a Multilevel Secure Database Management System","authors":"Billy G. Claybrook","doi":"10.1109/SP.1983.10009","DOIUrl":"https://doi.org/10.1109/SP.1983.10009","url":null,"abstract":"The use of database views in database management systems that enforce user level discretionary and nondiscretionary access control policies is discussed. This discussion involves several issues such as how should views be classified?, what types of mechanisms should be used to define views?, etc. Mapping between views, view updating, and aggregation and inference problems are also discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Computer Systems: A Retrospective","authors":"D. E. Bell","doi":"10.1109/SP.1983.10001","DOIUrl":"https://doi.org/10.1109/SP.1983.10001","url":null,"abstract":"Eight years after the completion of the \"Secure Computer Systems\" series, basic questions about that work are being raised. Is the model useful? Is it overly restrictive? Are further modeling efforts necessary to address current problems? This paper addresses those questions in a personal view of the development and the utility of the \"Secure Computer Systems\" security model.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128409421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Packet Switched Networks","authors":"D. Barnes","doi":"10.1109/SP.1983.10022","DOIUrl":"https://doi.org/10.1109/SP.1983.10022","url":null,"abstract":"The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary perspective, where the security requirements are particularly stringent. The paper concludes with a consideration of the practical application of these security techniques in an experimental military packet switched network.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121133046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprinting","authors":"Neal R. Wagner","doi":"10.1109/SP.1983.10018","DOIUrl":"https://doi.org/10.1109/SP.1983.10018","url":null,"abstract":"This paper presents a general discussion of the use of fingerprints, especially fingerprinted data, Fingerprinting is classified in four orthogonal ways, and some illustrative examples are given. The basis for a statistical analysis of altered fingerprints is presented, along with an example simulation. The possibility of more subtle fingerprints is discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130964258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General Chairman's Message","authors":"J. Runyan","doi":"10.1109/milcom.1986.4805808","DOIUrl":"https://doi.org/10.1109/milcom.1986.4805808","url":null,"abstract":"Having been a part of all the previous symposia, I am happy to introduce this one. The Program Chairpersons Bob Blakely and Dorothy Denning have done a superb job in recruiting and cajoling the community to make possible a splendid program. Thanks to them and their program committee. Again Jim Runyan has done an outstanding job of organizing everything, and deserves our appreciation. All of these people have devoted considerable effort and time to jobs that are extremely valuable to the community at large.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Note on the Denial-of-Service Problem","authors":"V. Gligor","doi":"10.1109/SP.1983.10004","DOIUrl":"https://doi.org/10.1109/SP.1983.10004","url":null,"abstract":"A simple and general definition of denial of service in operating systems is presented herein. It is argued that no current protection mechanism nor model resolves this problem in any demonstrable way. A set of examples from known systems is presented in order to delimit the scope of the problem. The notion of interuser dependency is introduced and identified as the common cause for all problem instances. Necessary end sufficient conditions for solutions are stated and justified informally. The relative complexity of undesirable (and unspecified) interuser dependencies is also discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}