Greg King - Academia.edu (original) (raw)

Address: Washington, District of Columbia, United States

less

Related Authors

Anna Lipphardt

Armando Marques-Guedes

Paul Tobin

Jorge Eterovic

Roshan Chitrakar

Lev Manovich

Lev Manovich

Graduate Center of the City University of New York

Dr. Shadab Alam

Bogdan Gabrys

Eoghan  Casey

PALIMOTE JUSTICE

Uploads

Papers by Greg King

Research paper thumbnail of Secure system composition: five practical initiatives

Tenth Annual Computer Security Applications Conference

Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems S... more Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems Security Initiative (MISSI), and security profila are important ongoing INFOSEC initiatives. This paper considers them as varying practical attempts to solve the problem of secwe system composition (i.e., of how to produce a secure system @om secure components). The strategy used by each to solve this problem is first characterized. The ability of each to solve the problem is then assessed The paper concludes that, by virtue of their focus on component interfaces, all five contribute to the solution of the composition problem (to a limited degree now, to a greater degree in the future).

Research paper thumbnail of A survey of commercially available secure LAN products

[1989 Proceedings] Fifth Annual Computer Security Applications Conference

The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerfu... more The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerful microcomputers has resulted in the development of secure local area networking (LAN) products. Potentially, these products provide tremendous economic benefit by allowing multi-level secure operation of local area networks. The author examines eight of the most popular secure LAN products from a technical perspective. The surveyed

Research paper thumbnail of Secure system composition: five practical initiatives

Tenth Annual Computer Security Applications Conference

Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems S... more Sta&r& profiles, goal security architectures, core products, the Multilevel Information Systems Security Initiative (MISSI), and security profila are important ongoing INFOSEC initiatives. This paper considers them as varying practical attempts to solve the problem of secwe system composition (i.e., of how to produce a secure system @om secure components). The strategy used by each to solve this problem is first characterized. The ability of each to solve the problem is then assessed The paper concludes that, by virtue of their focus on component interfaces, all five contribute to the solution of the composition problem (to a limited degree now, to a greater degree in the future).

Research paper thumbnail of A survey of commercially available secure LAN products

[1989 Proceedings] Fifth Annual Computer Security Applications Conference

The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerfu... more The advent of the Trusted Network Interpretation (TNI) and the widespread availability of powerful microcomputers has resulted in the development of secure local area networking (LAN) products. Potentially, these products provide tremendous economic benefit by allowing multi-level secure operation of local area networks. The author examines eight of the most popular secure LAN products from a technical perspective. The surveyed

Log In