%type pamphlet %title Department of Defense Trusted Computer System Evaluation Criteria %date 15 August, 1983 %publisher Department of Defense Computer Security Center %address Fort George G. Meade, MD 20755 %keywords orange book %type book %author D. E. R. Denning %title Cryptography and Data Security %publisher Addison-Wesley %address Reading, MA %date 1982 %type book %author AT&T~Bell~Laboratories~Computing~Science~Research~Center %title UNIX Research System Programmer's Manual %publisher Saunders %address Philadelphia %date 1990 %volume 1 %keywords v10 %type techreport %author D. E. Bell %author L. J. LaPadula %title Secure computer systems: mathematical foundations and model %report M74-244 %publisher MITRE Corp. %date May, 1973 %type incollection %author Mark A. Schaffer %author Geoff Walsh %booktitle Lock: Selected Papers, 1985-1988 %title LOCK/ix: on implementing \s-2UNIX\s0 on the Lock TCB %publisher Secure Computing Technology Center 2855 Anthony Lane South, Suite 130, St. Anthony MN %page 194-204 %date 1988 %type incollection %author W. E. Boebert %author R. Y. Kain %booktitle Lock: Selected Papers, 1985-1988 %title A practical alternative to hierarchical integrity policies %publisher Secure Computing Technology Center 2855 Anthony Lane South, Suite 130, St. Anthony MN %page 79-96 %date 1988 %type article %author Tom Duff %title Experience with viruses on \s-2UNIX\s0 systems %journal Computing Systems %volume 2 %date 1989 %page 155-171 %type article %author D. L. Presotto %author D. M. Ritchie %title Interprocess communication in the ninth edition \s-2UNIX\s0 system %journal Software\(emPractice and Experience %number S1 %volume 20 %pages S1/3-S1/17 %date June, 1990 %type techreport %author K. J. Biba %title Integrity considerations for secure computer systems %report ESD-TR-76-372 %publisher USAF Electronic Systems Division %address Bedford MA %date April, 1977 %type techreport %author M. D. McIlroy %author J. A. Reeds %title Design of IX, a multilevel secure \s-2UNIX\s0 system %publisher AT&T Bell Laboratories %report CSTR #163 %date December 1991 %type article %author J. C. Harris %title Brer Rabbit, Brer Fox, and the Tar-baby %journal Atlanta Constitution %date November 15, 1879 %other Republished in many collections of Harris stories as ``The wonderful Tar-Baby story'' %type inproceedings %author D. D. Clark %author D. R. Wilson %title A comparison of commercial and military computer security policies %journal Proceedings, Symposium on Security and Privacy %publisher IEEE Computer Society %date April, 1987 %address Oakland %page 184-194 %type inproceedings %author R. Pike %author D. Presotto %author K. Thompson %author H. Trickey %title Plan 9 from Bell Labs %journal Proceedings, Summer 1990 UKUUG Conference %publisher United Kingdom \s-2UNIX\s0 System Users Group %address London %date July, 1990 %page 1-9 %type incollection %editor J. Feigenbaum %editor M. Merritt %author J. Reeds %booktitle Cryptography and Distributed Computing %title Secure IX network %publisher AMS/ACM Series in Discrete Mathematics and Theoretical Computer Science %date 1991 %type inproceedings %author J. Steiner %author C. Neuman %author J. I. Schiller %title Kerberos: an authentication service for open network systems %journal Winter Conference Proceedings %address Dallas %date February, 1988 %publisher Usenix Association %type inproceedings %author D. Bendet %author J. Ferrigno %author G. B. Green %author M. Hondo %author E. Lund %author C. A. Salemi %title Challenges of trust: enhanced security for \s-2UNIX\s0 System V %journal Proceedings, Winter Uniforum Conference %date 1989 %type article %author R. Pike %title The Blit: a multiplexed graphics terminal %journal Bell Laboratories Tech. J. %volume 63 %pages 1607-1631 %date 1984 %keywords mux %type article %author C. W. Flink %author J. D. Weiss %title System V/MLS labeling and mandatory policy alternatives %journal AT&T Tech. J. %volume 67 %date 1988 %pages 53-64 %keywords SVMLS %also SVMLS usenix %type techreport %author W. J. Leighton %title Final evaluation report of AT&T System V/MLS Release 1.1.2 %publisher National Computer Security Center %date 1989 %type inproceedings %author M. D. McIlroy %author J. A. Reeds %title Multilevel security with fewer fetters %journal Proc. Spring 1988 EUUG Conf. %address London %date April 1988 %publisher European \s-2UNIX\s0 Users Group %pages 117-122 %also unix security workshop %type inproceedings %author M. D. McIlroy %author J. A. Reeds %title Multilevel security with fewer fetters %journal Proc. UNIX Security Workshop %address Portland %date August 1988 %publisher Usenix Association %pages 24-31 %type article %author M. D. McIlroy %author J. A. Reeds %title Multilevel security in the \s-2UNIX\s0 tradition %other submitted for publication %type inproceedings %author B. Smith-Thomas %title Secure multi-level windowing in a B1 certifiable secure UNIX operating system %journal Winter 1989 Usenix Technical Conference %date 1989 %address San Diego %publisher Usenix Association %pages 429-439 %type inproceedings %author M. E. Carson %auther Wen-Der Jiang %author J. Liang %author G. L. Luckenbaugh %author D. H. Yakov %title Secure windows for UNIX %journal Winter 1989 Usenix Technical Conference %date 1989 %address San Diego %publisher Usenix Association %pages 441-455 %keywords CMW %type inproceedings %author C. W. Flink %author J. D. Weiss %title System V/MLS labeling and mandatory policy alternatives %journal Winter 1989 Usenix Technical Conference %date 1989 %address San Diego %publisher Usenix Association %pages 53-64 %keywords SVMLS %type inproceedings %author J. P. L. Woodward %title Exploiting the dual nature of sensitivity labels %journal Proceedings, Symposium on Security and Privacy %publisher IEEE %address Oakland %date 1987 %pages 23-30 %type book %author UNIX~System~Laboratories %title UNIX System V Release 4.1 B2 Enhanced Security User's Guide %date 1991 %keywords 4ES