Greg King - Academia.edu (original) (raw)
Address: Washington, District of Columbia, United States
less
Related Authors
Graduate Center of the City University of New York
Uploads
Papers by Greg King
Tenth Annual Computer Security Applications Conference
Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems S... more Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems Security Initiative (MISSI), and security profila are important ongoing INFOSEC initiatives. This paper considers them as varying practical attempts to solve the problem of secwe system composition (i.e., of how to produce a secure system @om secure components). The strategy used by each to solve this problem is first characterized. The ability of each to solve the problem is then assessed The paper concludes that, by virtue of their focus on component interfaces, all five contribute to the solution of the composition problem (to a limited degree now, to a greater degree in the future).
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerfu... more The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerful microcomputers has resulted in the development of secure local area networking (LAN) products. Potentially, these products provide tremendous economic benefit by allowing multi-level secure operation of local area networks. The author examines eight of the most popular secure LAN products from a technical perspective. The surveyed
Tenth Annual Computer Security Applications Conference
Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems S... more Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems Security Initiative (MISSI), and security profila are important ongoing INFOSEC initiatives. This paper considers them as varying practical attempts to solve the problem of secwe system composition (i.e., of how to produce a secure system @om secure components). The strategy used by each to solve this problem is first characterized. The ability of each to solve the problem is then assessed The paper concludes that, by virtue of their focus on component interfaces, all five contribute to the solution of the composition problem (to a limited degree now, to a greater degree in the future).
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerfu... more The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerful microcomputers has resulted in the development of secure local area networking (LAN) products. Potentially, these products provide tremendous economic benefit by allowing multi-level secure operation of local area networks. The author examines eight of the most popular secure LAN products from a technical perspective. The surveyed