Lisex  
 
 

 

Links to sites of interest
Multi-level security
Software technology review: Trusted operating systems
Computer Security History Project
Trusted Solaris[tm]
Re-Floating the Titanic: Multi Level Security in contemporary environments
Trusted BSD
Security-Enhanced Linux (SELinux)
ViewWise
Gemini Computers, particularly Gemini Trusted Network Processor
Multics
Trusted IRIX
Secure Computing
An example of the application of Compartmented Mode Workstations (CMW) in non-military environments (PDF of a conference)
Standards and evaluation criteria
TCSEC - Trusted Computer Security Evaluation Criteria
ITSEC - Information Technology Security Evaluation Criteria
UK ITSEC scheme
Common Criteria

 

Laboratories and institutes
Center for High Assurance Computer Systems, Naval Research Laboratory
Rome Laboratory, particularly the formal method and information security programmes
Nai Labs - Secure Execution Environments
Computer Science Laboratory of SRI, specially the secure systems program and past projects
Center for Secure Information Systems, GMU
Formal methods in Computer Security
Formal methods group at SRI
Information security group of Cambridge University
DTOS
Composability for Secure Systems
Information Assurance Institute, Cornell University
The Theory area at HP SRC Classic
Researchers
John McLean, CHACS
Ross Anderson, University of Cambridge
Martín Abadi, UCSC
Ravi Sandhu, GMU
Dorothy Denning, Georgetown University
Virgil Gligor, University of Marylan
Joseph Goguen, UCSD
Sushil Jajodia, GMU
Gene Spafford, Purdue University
Elisa Bertino, Università degli Studi di Milano
John Rushby, SRI
Fred B. Schneider, Cornell University
James A. Rome, Oak Ridge National Laboratory
Confidentiality
Council of Europe. Committee of Ministers. RECOMMENDATION NO. R (97) 5 ON THE PROTECTION OF MEDICAL DATA
Miscelanea
IEEE Technical Committee on Security and Privacy
Orange Book Links
 
   
© 2003 por Grupo Gidis. Todos los derechos reservados.
Sitio diseñado por: Lorena Cantarini