V10/history/ix/src/doc/secunix/summa.ref

%type pamphlet
%title Department of Defense Trusted Computer System Evaluation Criteria
%date 15 August, 1983
%publisher Department of Defense Computer Security Center
%address Fort George G. Meade, MD 20755
%keywords orange book

%type book
%author D. E. R. Denning
%title Cryptography and Data Security
%publisher Addison-Wesley
%address Reading, MA
%date 1982

%type book
%author AT&T~Bell~Laboratories~Computing~Science~Research~Center
%title UNIX Research System Programmer's Manual
%publisher Saunders
%address Philadelphia
%date 1990
%volume 1
%keywords v10

%type techreport
%author D. E. Bell
%author L. J. LaPadula
%title Secure computer systems: mathematical foundations and model
%report M74-244
%publisher MITRE Corp.
%date May, 1973

%type incollection
%author Mark A. Schaffer
%author Geoff Walsh
%booktitle Lock: Selected Papers, 1985-1988
%title LOCK/ix: on implementing \s-2UNIX\s0 on the Lock TCB
%publisher Secure Computing Technology Center
2855 Anthony Lane South, Suite 130, St. Anthony MN
%page 194-204
%date 1988

%type incollection
%author W. E. Boebert
%author R. Y. Kain
%booktitle Lock: Selected Papers, 1985-1988
%title A practical alternative to hierarchical integrity policies
%publisher Secure Computing Technology Center
2855 Anthony Lane South, Suite 130, St. Anthony MN
%page 79-96
%date 1988

%type article
%author Tom Duff
%title Experience with viruses on \s-2UNIX\s0 systems
%journal Computing Systems
%volume 2
%date 1989
%page 155-171

%type article
%author D. L. Presotto
%author D. M. Ritchie
%title Interprocess communication in the ninth edition \s-2UNIX\s0 system
%journal Software\(emPractice and Experience
%number S1
%volume 20
%pages S1/3-S1/17
%date June, 1990

%type techreport
%author K. J. Biba
%title Integrity considerations for secure computer systems
%report ESD-TR-76-372
%publisher USAF Electronic Systems Division
%address Bedford MA
%date April, 1977

%type techreport
%author M. D. McIlroy
%author J. A. Reeds
%title Design of IX, a multilevel secure \s-2UNIX\s0 system
%publisher AT&T Bell Laboratories
%report CSTR #163
%date December 1991

%type article
%author J. C. Harris
%title Brer Rabbit, Brer Fox, and the Tar-baby
%journal Atlanta Constitution
%date November 15, 1879
%other Republished in many collections of Harris stories 
as ``The wonderful Tar-Baby story''

%type inproceedings
%author D. D. Clark
%author D. R. Wilson
%title A comparison of commercial and military
computer security policies
%journal Proceedings, Symposium on Security and Privacy
%publisher IEEE Computer Society
%date April, 1987
%address Oakland
%page 184-194

%type inproceedings
%author R. Pike
%author D. Presotto
%author K. Thompson
%author H. Trickey
%title Plan 9 from Bell Labs
%journal Proceedings, Summer 1990 UKUUG Conference
%publisher United Kingdom \s-2UNIX\s0 System Users Group
%address London
%date July, 1990
%page 1-9

%type incollection
%editor J. Feigenbaum
%editor M. Merritt
%author J. Reeds
%booktitle Cryptography and Distributed Computing
%title Secure IX network
%publisher AMS/ACM Series in Discrete Mathematics and
Theoretical Computer Science
%date 1991

%type inproceedings
%author J. Steiner
%author C. Neuman
%author J. I. Schiller
%title Kerberos: an authentication service for open network systems
%journal Winter Conference Proceedings
%address Dallas
%date February, 1988
%publisher Usenix Association

%type inproceedings
%author D. Bendet
%author J. Ferrigno
%author G. B. Green
%author M. Hondo
%author E. Lund
%author C. A. Salemi
%title Challenges of trust: enhanced security for
\s-2UNIX\s0 System V
%journal Proceedings, Winter Uniforum Conference
%date 1989

%type article
%author R. Pike
%title The Blit: a multiplexed graphics terminal
%journal Bell Laboratories Tech. J.
%volume 63
%pages 1607-1631
%date 1984
%keywords mux

%type article
%author C. W. Flink
%author J. D. Weiss
%title System V/MLS labeling and mandatory policy alternatives
%journal AT&T Tech. J.
%volume 67
%date 1988
%pages 53-64
%keywords SVMLS
%also SVMLS usenix

%type techreport
%author W. J. Leighton
%title Final evaluation report of AT&T System V/MLS Release 1.1.2
%publisher National Computer Security Center
%date 1989

%type inproceedings
%author M. D. McIlroy
%author J. A. Reeds
%title Multilevel security with fewer fetters
%journal Proc. Spring 1988 EUUG Conf.
%address London
%date April 1988
%publisher European \s-2UNIX\s0 Users Group
%pages 117-122
%also unix security workshop

%type inproceedings
%author M. D. McIlroy
%author J. A. Reeds
%title Multilevel security with fewer fetters
%journal Proc. UNIX Security Workshop
%address Portland
%date August 1988
%publisher Usenix Association
%pages 24-31

%type article
%author M. D. McIlroy
%author J. A. Reeds
%title Multilevel security in the \s-2UNIX\s0 tradition
%other submitted for publication

%type inproceedings
%author B. Smith-Thomas
%title Secure multi-level windowing in a B1 certifiable secure
UNIX operating system
%journal Winter 1989 Usenix Technical Conference
%date 1989
%address San Diego
%publisher Usenix Association
%pages 429-439

%type inproceedings
%author M. E. Carson
%auther Wen-Der Jiang
%author J. Liang
%author G. L. Luckenbaugh
%author D. H. Yakov
%title Secure windows for UNIX
%journal Winter 1989 Usenix Technical Conference
%date 1989
%address San Diego
%publisher Usenix Association
%pages 441-455
%keywords CMW

%type inproceedings
%author C. W. Flink
%author J. D. Weiss
%title System V/MLS labeling and mandatory policy alternatives
%journal Winter 1989 Usenix Technical Conference
%date 1989
%address San Diego
%publisher Usenix Association
%pages 53-64
%keywords SVMLS 

%type inproceedings
%author J. P. L. Woodward
%title Exploiting the dual nature of sensitivity labels
%journal Proceedings, Symposium on Security and Privacy
%publisher IEEE
%address Oakland
%date 1987
%pages 23-30

%type book
%author UNIX~System~Laboratories
%title UNIX System V Release 4.1 B2 Enhanced Security User's Guide
%date 1991
%keywords 4ES