throbber
DARDSand TECHNOLOGY/
`SECURITY CENTER
`
`20090327405
`
`
`
`CS-1030
`
`Cisco Systems, Inc. v. Finjan, Inc.
`
`CS-1030
`Cisco Systems, Inc. v. Finjan, Inc.
`
`

`

`(p L ~ DEFENSE TECHNICAL INFORMATION CENTERee
`
`Informationforthe Defense Community
`
`DTIC® has determined on Ny /\ O [R00 that this Technical Document has the
`Distribution Statement checked below. The current distribution for this document can
`be found in the DTIC® Technical Report Database.
`
`& DISTRIBUTION STATEMENTA. Approvedfor public release;distribution is
`unlimited.
`
`L] © COPYRIGHTED; U.S. Government or Federal Rights License.All other rights
`and uses except those permitted by copyright law are reserved by the copyright owner.
`
`[] DISTRIBUTION STATEMENTB. Distribution authorized to U.S. Government
`agenciesonly(fill in reason) (date of determination). Other requests for this document
`shall be referred to (insert controlling DoD office)
`
`L} DISTRIBUTION STATEMENTC. Distribution authorized to U.S. Government
`Agencies and their contractors(fill in reason) (date of determination). Other requests for
`this documentshall be referred to (insert controlling DoD office)
`
`L] DISTRIBUTION STATEMENTD.Distribution authorized to the Departmentof
`Defense and U.S. DoD contractors only(fill in reason) (date of determination). Other
`requests shall be referred to (insert controlling DoD office).
`
`L] DISTRIBUTION STATEMENTE.Distribution authorized to DoD Componentsonly
`(fill in reason) (date of determination). Other requests shall be referred to (insert
`controlling DoD office).
`
`C] DISTRIBUTION STATEMENTF. Further dissemination only as directed by
`(inserting controlling DoD office) (date of determination) or higher DoD authority.
`
`Distribution StatementF is also used when a document does not contain a distribution
`statement and no distribution statement can be determined.
`
`L] DISTRIBUTION STATEMENTX. Distribution authorized to U.S. Government
`Agencies andprivate individuals or enterprises eligible to obtain export-controlled
`technical data in accordance with DoDD 5230.25; (date of determination). DoD
`Controlling Office is (insert controlling DoD office).
`
`
`
`

`

`
`
`Welcome!
`
`The National Computer Security Center (NCSC) and the National Computer
`Systems Laboratory (NCSL) are pleased to welcome you to the Thirteenth Annual
`National ComputerSecurity Conference. We believe that the Conferencewill
`stimulate a vital and dynamic exchange ofinformation and foster an understanding
`of emerging technologies.
`
`The theme for this year’s conference, “Information Systems Security: Standards--
`The Key to the Future,”reflects the continuing importance of the broader
`information systemssecurity issues facing us. At the heart of these issues are two
`items which will receive special emphasis this week -- Information Systems Security
`Criteria (and how it affects us) and Education, Training, and Awareness. We are
`working together, in the Government, Industry, and Academe, in cooperative efforts
`to improve and expand the state-of-the-art technology to information systems
`security. This year we are pleased to present a new track by the information security
`educators. These presentations will provide you with some cost-effective as well as
`innovative ideas in developing your own on-site information-systems-security
`education programs. Additionally, we will be presenting an educational program
`which addresses the automated information security responsibilities. This
`educational program will refresh us with the perspectives of the past, and will
`project directions of the future.
`
`Wefirmly believe that security awareness and responsibility are the cornerstone
`of any information security program. For our collective success, we ask that you
`reflect on the ideas and information presented this week; then share this
`information with your peers, your management, your administration, and your
`customers. By sharing this information, we will develop a stronger knowledge base
`for tomorrow’s foundations.
`
`hyDu
`
`Falk.
`
`JAMES H. BURROWS
`Director
`National Computer Systems Laboratory
`
`AGH
`PATRICK R.
`Director
`National Computer Security Center
`
`
`
`
`
`
`

`

`Conference Referees
`
`Dr. Marshall Abrams
`James P. Anderson
`Jon Arneson
`Devolyn Arnold
`James Arnold
`Al Arsenault
`Victoria Ashby
`Elaine Barker
`Dr. D. Elliott Bell
`Greg Bergren
`James Birch
`Earl Boebert
`Dr. Dennis Branstad
`Dr. John Campbell
`Dr. Steve Crocker
`Dr. Dorothy Denning
`Donna Dodson
`Greg Elkmann
`Ellen Flahaven
`Dan Gambel
`Dain Gary
`Bill Geer
`Virgil Gibson
`Dennis Gilbert
`lrene Gilbert
`Dr. Virgil Gligor
`Capt James Goldston, USAF
`Dr. Joshua Guttman
`Dr. Grace Hammonds
`Douglas Hardie
`Ronda Henning
`Jack Holleran
`Jim Houser
`Russ Housley
`Dr. Dale Johnson
`Carole Jordan
`Sharon Keller
`Leslee LaFountain
`Steve LaFountain
`Paul Lambert
`Carl Landwehr
`Robert Lau
`
`The MITRE Corporation
`James P. Anderson Company
`NationalInstitute of Standards & Technology
`National Computer Security Center
`National Computer Security Center
`National Computer Security Center
`The MITRE Corporation
`National Institute of Standards & Technology
`Trusted Information Systems, Inc.
`National Computer Security Center
`Secure Systems, Incorporated
`Secure Computing Technology Corporation
`National Institute of Standards & Technology
`National Computer Security Center
`Trusted Information Systems, Inc.
`Digital Equipment Corporation
`National Institute of Standards & Technology
`National Security Agency
`National Institute of Standards & Technology
`Grumann Data Systems
`Mellon National Bank
`National ComputerSecurity Center
`Grumann Data Systems
`National Institute of Standards and Technology
`National Institute of Standards and Technology
`University of Maryland
`National Computer Security Center
`The MITRE Corporation
`AGCS,Inc.
`Unisys Corporation
`Harris Corporation
`National Computer Security Center
`National Computer Security Center
`XEROX
`The MITRE Corporation
`Defense Investigative Service
`National Institute of Standards & Technology
`National Computer Security Center
`National Computer Security Center
`Motorola GEG
`Naval Research Laboratory
`National Computer Security Center
`
`

`

`Dr. Theodore Lee
`Nina Lewis
`Steve Lipner
`Terry Losonsky
`Dr. Vic Maconachy
`Barbara Mayer
`Frank Mayer
`Vin McLellan
`Catherine A. Meadows
`Dr. Jonathan Millen
`William H Murray
`Eugene Myers
`Ruth Nelson
`Dr. Peter Neumann
`Steven Padilla
`Nick Pantiuk
`Donn Parker
`Rich Petthia
`Dr. Charles Pfleeger
`Jerrold Powell
`Maria Pozzo
`Michael Rinick
`Ken Rowe
`Prof Ravi Sandhu
`Marv Schaefer
`Dr. Roger Schell
`Dan Schnackenberg
`Miles Smid
`Suzanne Smith
`Brian Snow
`Prof. Gene Spafford
`Dr. Dennis Steinauer
`Freddie Stewart
`Dr. Cliff Stoll
`Marianne Swanson
`Mario Tinto
`Ann Todd
`EugeneTroy
`LTC Ray Vaughn, USA
`Grant Wagner
`Jill Walsh
`Wayne Weingaertner
`Roger Westman
`Roy Wood
`
`Trusted Information Systems, Inc.
`University of California, Santa Barbara
`Digital Equipment Corporation
`National Security Agency
`National Security Agency
`Trusted Information Systems,Inc.
`Sparta
`Boston University
`Naval Research Laboratory
`The MITRE Corporation
`Independent Consultant
`National Computer Security Center
`GTE
`SRI International
`Trusted Information Systems, Inc.
`Grumann Data Systems
`SRI International
`Software Engineering Institute
`Trusted Information Systems, Inc.
`Department of the Treasury
`University of California, Los Angeles
`Central Intelligence Agency
`National Computer Security Center
`George Mason University
`Trusted Information Systems, Inc.
`GEMINI
`Boeing Aerospace
`National Institute of Standards & Technology
`Los Alamos National Laboratory
`National Security Agency
`Purdue University
`National Institute of Standards & Technology
`ANSER
`Harvard - Smithsonian Center for Astrophysics
`NationalInstitute of Standards & Technology
`National ComputerSecurity Center
`National Institute of Standards & Technology
`National Institute of Standards & Technology
`National Computer Security Center
`National Computer Security Center
`INCO,Inc.
`National Computer Security Center
`INCO,Inc.
`National Computer Security Center
`
`iid
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`Washington, DC
`
`Table of Contents
`
`VOLUME |
`ii Conference Referees
`
`TRACK A - Research & Development
`1 UNIX System V with B2 security
`Craig Rubin, AT&T Bell Laboratories
`10 CovertStorage Channel Analysis: A Worked Example
`eee Levin, Albert Tao, Gemini Computers
`Steven Padilla, Trusted Information Systems
`20 Verification of the C/30 Microcode Using the
`State Delta Verification System (SDVS)
`Jeffrey Cook, The Aerospace Corporation
`32 Data Categorization and Labeling (Executive Summary)
`Dennis Branstad, National Institute of Standards and Technology
`34 Information Categorization and Protection (Executive Summary)
`Warren Schmidt, Sears Technology Services,Inc.
`37 Security Labels in Open Systems Interconnection (Executive Summary)
`Russell Housley, XEROX Special Information Systems
`44 Security Labeling in Unclassified Networks (Executive Summary)
`Noel Nazario, National Institute of Standards and Technology
`
`49 Key Management Systems Combining X9.17 and Public Key Techniques
`Jon
`Graff, Cylink
`62 Electronic Document Authorization _
`Addison Fischer, Fischer International Systems Corporation
`
`72 The Place of Biometrics in a User Authentication Taxonomy
`Alex Conn, John Parodi, Michael Taylor, Digital Equipment Corporation
`
`80 Non-Forgeable Personal Identification System Using Cryptography
`and Biometrics
`Glenn Rinkenberger, Ron Chandos,
`Motorola Government Electronics Group
`
`90 An Audit Trail Reduction Paradigm Based on Trusted Processes
`Zavdi Lichtman, John Kimmins, Bell Communications Research
`
`99 The Computerwatch Data Reduction Tool
`Cheri Dowell, Paul Ramstedt, AT&T Bell Laboratories
`
`iv
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`109
`
`175
`
`125
`
`135
`
`144
`
`Analysis of Audit and Protocol Data Using Methods from Artificial Intelligence
`Winfried R. E. Weiss, Adalbert Baur, Siemens AG
`A UNIX prototype for Intrusion and Anomaly Detection in Secure Networks
`J.R. Winkler, Planning Research Corporation
`A Neural Network Approach Towards Intrusion Detection
`Richard Simonian, Ronda Henning, Jonathan Reed, Kevin Fox,
`Harris Corporation
`
`A Generalized Framework for Access Control: An Informal Description
`Marshall Abrams, Kenneth Eggers, Leonard LaPadula, Ingrid Olson,
`The MITRE Corporation
`
`Automated Extensibility in THETA
`Joseph McEnerney, Randall Brown, D. G. Weber,
`Odyssey Research Associates
`Rammohan Varadarajan, Informix Software,Inc.
`
`154
`
`165
`
`Controlling Security Overrides
`Lee Badger, Trusted Information Systems,Inc.
`Lattices, Policies, and Implementations
`D. Elliott Bell, Trusted Information Systems,Inc.
`
`172
`
`TRACKB - Systems
`The Role of “System Build” in Trusted Embedded Systems
`T. Vickers Benzel, M. M. Bernstein, R. J. Feiertag,
`Trusted Information Systems,
`J.P. Alstad, C. M. Brophy, HughesAircraft Company
`eombining Security Embedded Systems and Ada Puts the Emphasis
`on the
`F. Maymir-Ducharme, M. Armstrong, IIT Research Institute,
`D. Preston, Catholic University
`
`182
`
`189
`
`201
`
`211
`
`218
`
`228
`
`Disclosure Protection of Sensitive Information
`Gene Troy, National Institute of Standards and Technology
`erie Olson, MITRE
`Milan Kuchta, Department of National Defence System Security Centre
`Considerations for VSLAN™Integrators and DAAs
`Greg King, Verdix Corporation
`
`Introduction to the Gemini Trusted Network Processor
`Michael Thompson, Roger Schell, Albert Tao, Timothy Levin,
`Gemini Computers
`An Overview of the USAFE Guard System
`Lorraine Gagnon, Logicon Inc.
`Mutual Suspicion for NetworkSecurity
`Ruth Nelson, David Becker, Jennifer Brunell, John Heimann,
`GTE Government Systems
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`A Security Policy for Trusted Client-Server Distributed Networks
`Russell Housley, Sammy Migues, Xerox Special Information Systems
`Network Security and the Graphical Representation Model
`Jared Dreicer, Laura Stolz, W. Anthony Smith,
`Los Alamos National Laboratory
`Testing a Secure Operating aystans
`ichael Johnston, Vasiliki Sotiriou, TRW Systems Integration Group
`An Assertion-Mapping Approach to Software Test oesan
`Greg Bullough, James Loomis, Peter Weiss, Amdahl Corporation
`Security Testing: The Albatross of Secure System Integration?
`Susan Walter, Grumman Data Systems
`Low Cost Outboard Cryptographic aunet for SILS and SP4
`B. J. Herbison, Digital Equipment Corporation
`Layer 2 Security Services for Local Area Networks
`Richard Parker Il, The MITRE Corporation
`
`Trusted MINIX: A Worked Example
`Albert Donaldson, ESCOM Corporation
`.
`John Taylor Jr., General Electric M&DSO
`David Chizmadia, National Computer Security Center
`
`Security for Real-Time Systems
`Teresa Lunt, SRI International
`Franklin Reynolds, Keith Loepere, E. Douglas Jensen,
`Concurrent Computer Corporation
`
`Trusted XENIX™Interpretation: Phase |!
`D. Elliott Bell, Trusted Information System Inc.
`
`PACL's: An Access Control List Approachto Anti-Viral Security
`D. Cook, R. Olsson, J. Crossley, P. Kerchen, K. Levitt, R. Lo,
`University of California, Davis
`D. Wichers, Arca Systems,Inc.
`
`Static Analysis Virus Detection Tools for UNIX Systems
`K. Levitt, P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, R. Olsson,
`University of California, Davis
`The Virus Intervention and Control Experiment
`James Molini, Chris Ruhl, Computer Sciences Corporation
`
`Classification of Computer Anomalies
`Klaus Brunnstein, Simone Fischer-HUbner, Morton Swimmer,
`Virus Test Center (VTC), University of Hamburg
`
`237
`
`243
`
`253
`
`266
`
`aii
`
`286
`
`296
`
`307
`
`318
`
`333
`
`340
`
`350
`
`366
`
`374
`
`VOLUME 2
`
`TRACK C-!- Management & Administration
`385 Disaster Recovery / ContingencyPlanning (Executive Summary)
`Eileen S. Wesselingh, National Computer Systems Contingency Services
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`Disaster Recovery from $138 Million Fire (Executive Summary)
`Lloyd R. Smith, Jr., Information Systems Integrity
`Plans and Assistance (Executive Summary)
`Jon H. Arneson, National Institute of Standards and Technology
`
`Harmonised Criteria for the Security Evaluation of IT Systems and Products
`P. Casey, A. Brouwer, D. Herson, J. Pacault, F. Taal, U. Van Essen
`
`The VME High Security Option
`Tom Parker, ICL Defence Systems
`
`Rainbowsand Arrows: Howthe Security Criteria Address Computer Misuse
`Peter Neumann, SRI International
`
`Civil and Military Application of Trusted Systems Criteria
`William Barker, Charles Pfleeger, Trusted Information Systems, Inc.
`Implementation of the Computer Security Act of 1987 (Executive Summary)
`Dennis Gilbert, National Institute of Standards and Technology
`The CSO's Role in Computer Security
`.
`Cindy Hash, National Computer Security Center
`
`Implementation and Usage of Mandatory Access Controls
`in an Operational Environment
`Leslie Gotch, Honeywell Federal Systems,Inc.
`Shawn Rovansek, National Computer Security Center
`Building Trust into a Multilevel File System
`Cynthia E. Irvine, Todd B. Ackeson, Michael F. Thompson,
`Gemini Computers, Inc.
`LAVA/CIS Version 2.0: A Software System for Vulnerability
`and Risk Assessment
`S.T. Smith, M. L. Jalbert, Los Alamos National Laboratory
`WORKFLOW: A Methodsoay for Performing a Qualitative Risk Assessment
`Paul Garnett, SYSCON Corporation
`Critical Risk Certification Methodology
`Nander Brown, U.S. Small Business Administration
`
`Factors Effecting the Availability of Security Measures
`in Data Processing Components
`Robert H. Courtney,Jr., Robert Courtney, Incorporated
`Integrating Computer Security and Software Safety in the Life Cycle
`of Air Force Systems
`Albert C. Hoheb, The Aerospace Corporation
`IntegrityMechanisms in Database Management Systems
`Ravi Sandhu, Sushil Jajodia, George Mason University
`A Taxonomyof Integrity Models, Implementations and Mechanisms
`Stephen Welke, J.
`Eric Roskos, John Boone, Terry Mayfield,
`Institute for Defense Analyses
`
`392
`
`393
`
`394
`
`404
`
`414
`
`423
`
`433
`
`434
`
`439
`
`450
`
`460
`
`470
`
`480
`
`503
`
`515
`
`526
`
`541
`
`552
`
`National Computer Security Policy (Executive Summary)
`Lynn McNulty, National Institute of Standards and Technology
`
`vil
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`553
`
`562
`
`564
`
`TRACK C-ll - Management & Administration
`A Brief Tutorial on Trusted Database Management Systems (Executive Summary)
`John Campbell, National Computer Security Center
`1990: A Year of proaresin Trusted Database Systems(Executive Summary)
`John Campbell, National Computer Security Center
`Secure Database Products (Executive Summary)
`James Pierce, Teradata Corporation
`Trusted Database Software: Review and Future Directions (Executive Summary)
`Peter J. Sell, National Computer Security Center
`
`565
`
`567
`
`570
`
`572
`
`574
`
`577
`
`581
`
`585
`
`589
`
`594
`
`597
`
`600
`
`602
`
`605
`
`607
`
`Trusted SystemsInteroperability (Executive Summary)
`Helena Winkler-Parenty, Sybase Corporation
`
`Oracle Secure Systems: 1989-1990 A Year in Review (Executive Summary)
`Linda Vetter, Oracle Corporation
`TrustedDatabase Machine Program: An Overview (Executive Summary)
`William O. Wesley, Jr., National Computer Security Center
`Trusted Database systems: The ToughIssues(Executive Summary)
`John Campbell, National Computer Security Center
`Tough Issues: Integrity and Auditing in Multilevel Secure Databases
`(Executive Summary)
`Sushil Jajodia, George Mason University
`Issues of Concurrency Control and Labeling in Multilevel Database Systems
`(Executive Summary)
`Teresa Lunt, Stanford Research Institute
`
`Issues in Trusted Distributed Database Management Systems-
`A Position Paper(Executive Summary)
`Bhavani Thuraisingham, The MITRE Corporation
`
`SYBASE: The Trusted Subject DBMS (Executive Summary)
`Helena Winkler-Parenty, Sybase Corporation
`Constrained Trusted Computing Base Subsets(Executive Summary)
`Linda Vetter, Oracle Corporation
`Multilevel Object Oriented Database Systems(Executive Summary)
`Ravi Sandhu, George Mason University
`Multilevel Secure Object-Oriented Database Model (Executive Summary)
`Sushil Jajodia, George Mason University
`
`Object-Oriented System Security (Executive Summary)
`Teresa Lunt, Stanford Research Institute
`
`Questions in Trusted Object-Oriented Database Management Designs
`(Executive Summary)
`Catherine Meadows, Naval Research Laboratory
`Single-level Ohicets for Security Kernal Implementation (Executive Summary)
`Jonathan
`Millen, The MITRE Corporation
`
`viii
`
`

`

`|
`
`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`609
`
`613
`
`621
`
`622
`
`629
`
`630
`
`631
`
`632
`
`633
`
`634
`
`issues in Multilevel Secure Object-Oriented Database Management Systems
`(Executive Summary)
`;
`Bhavani Thuraisingham, The MITRE Corporation
`C2 Security and Microcomputers(Executive Summary)
`Angel Rivera, Sector Technology
`Electronic Certification: Has Its Time Come? (Executive Summary)
`Miles Smid, National Institute of Standards and Technology
`Functional Implementation of C2 by 92 for Microcomputers
`Second Lieutenant Alan Berry,
`USAF/ Air Force Cryptologic Support Center
`
`Limiting Access to Knowledge and Information
`Robert Melford, RJ Melford Associates
`
`Considering the Implications of Future Technologies
`Ramon Barquin, Washington Consulting Group
`Patent, Trade Secret, and Copyright Laws: One Facet of the Golden Rule
`Applied to Limits on Access to Knowledge and Information
`J. Timothy Headley, Esq., Baker & Botts
`;
`SOLE Runs on Trust
`alph J. Preiss, International Business Machines
`Open Access Systems: Risks & Responsibilities in the Academic Environment
`Jane Robinett, Polytechnic University
`
`Computer Emergency Response Team: Lessons Learned
`E Eugene Schultz, Lawrence Livermore National Laboratory
`Richard Pethia, Software Engineering Institute,
`Carnegie Mellon University
`Jerome Dalton, AT&T
`
`641
`
`647
`
`an Ethos for the INFOSEC Community: What Ought We Do?
`Discerning
`Eric Leighninger, Dynamics Research Corporation
`Virus Ethics: Concerns and Responsibilities of Individuals and Institutions
`John Cordani, Adelphi University
`Douglas Brown, OHC, Holy Cross Monastery
`
`653
`
`Concerning Hackers Who Break into Computer Systems
`Dorothy Denning, Digital Equipment Corporation
`
`ix
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`Educator Sessions
`
`665
`
`668
`
`678
`
`682
`
`A Reassessment of Computer Security Training Needs _
`Dennis Poindexter, Department of Defense Security Institute
`Information Security: The Development of Training Modules
`Corey Schou, John Kilpatrick, Idaho State University
`Determinin our Taine Needs
`.
`Adele Suchunsky, U.S. General Accounting Office
`Computer Based Training: The Right Choice?
`Althea Whieldon, Department of Defense
`
`Alternate Papers
`
`687
`
`697
`
`707
`
`717
`
`728
`
`738
`
`748
`
`758
`
`768
`
`776
`
`788
`
`ANSSR: ATool for Risk Analysis of Networked Systems
`Deborah Bodeau, Frederick Chase, Sharon Kass, The MITRE Corporation
`Approachesto Building Trusted eoplaninns
`Helena B. Winkler-Parenty, Sybase,Inc.
`Automated Risk Evaluation System (ARES)/Communications - Computer
`Systems Security Management System (CMS)
`Lt Glyn M Runnels, AFCSC/SRE
`
`A Trusted Software Development Methodology
`John Watson, GE Aerospace,
`Edward Amoroso, AT&T Bell Laboratories
`
`A Categorization of Processor Protection Mechanisms
`Eugene Myers, National Computer Security Center
`Conducting an Object Reuse Study
`David Wichers, Arca Systems,Inc.
`
`The Deterrent Value of Natural Change in a Statistical Database
`Elizabeth Unger,Sallie Keller-McNulty, Kansas State University
`
`Experiences in Acquiring and Developing Secure
`Communications-Computer Systems
`Captain Charles Pierce, Air Force Cryptologic Support Center
`Secure Systems Integrator: An Honorable Profession?
`Virgil Gibson, Grumman Data Systems
`A Taxonomyof Security-Relevant Knowledge
`Gary Smith, National Defense University
`
`Usefulness of a Network Reference Monitor
`Timothy Williams, Verdix Corporation
`
`

`

`Thirteenth National Computer Security Conference
`October 1-4, 1990
`
`Student Papers
`797 Safeguarding Personal Privacy against Computer Threats:
`A Structured Perspective
`Greg Young, University of Maryland
`807 Legal Issues in Security & Control of Information Systems
`Noah Stern, University of Maryland
`817 Applications of Knowledge-Based Systems Techniques
`to Detect Computer System Intrusions
`John McCarron, University of Maryland
`
`Special Reprint
`
`12th National ComputerSecurity Conference
`
`827 The Design of the Trusted Workstation: A True “INFOSEC Product”
`Frank L. Mayer, J. Noelle McAuliffe, Trusted Information Systems, Inc.
`
`xi
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket