Center for High Assurance Computing Systems (CHACS) Publications

1989

McLean, John and C. Meadows, ``Composable Security Properties'' Proc. Computer Security Foundations Workshop II, in Cipher, Fall, 1989.

1988

McLean, John and C. Meadows, ``The Reliable Specification of Software,'' Proc. COMPASS '88, IEEE Press, 1988.

McLean, John ``The Algebra of Security,'' Proc. 1988 IEEE Symposium on Research in Security and Privacy, IEEE Press, 1988.

1987

McLean, John ``The Computer Security Foundations Workshop,'' Cipher, 1987.

McLean, John ``Reasoning about Security Models,'' Proc. 1987 IEEE Symposium on Research in Security and Privacy, IEEE Press, 1987.

1985

McLean, J. ``A Comment on the `Basic Security Theorem' of Bell and LaPadula,'' Information Processing Letters, vol. 20, no. 2, Feb. 1985. PostScript

1984

Landwehr, C., Heitmeyer, C., and McLean, J. ``A Security Model for Military Message Systems,'' ACM Transactions on Computer Systems, vol. 2, no. 3, Aug. 1984.

McLean, J. ``A Formal Method for the Abstract Specification of Software,'' Journal of the ACM, vol. 31, no. 3, July 1984. PostScript

McLean, J., C. Landwehr and C. Heitmeyer, ``A Formal Statement of the MMS Security Model'', Proc. 1984 IEEE Symposium on Research in Security and Privacy, IEEE Press, 1984.

1983

Heitmeyer, C. and McLean, J. ``Abstract Requirements Specification: A New Approach and Its Application,'' IEEE Transactions on Software Engineering, vol. 9, no. 5, Sept. 1983.

Landwehr, C. E., "Best Available Technologies for Computer Security," IEEE COMPUTER, Vol. 16, No. 7 (July 1983), pp.86-100. [Reprinted in Advances in Computer System Security, Volume II, Rein Turn, Ed., Artech House, Dedham, MA, 1984, pp. 76-107.]

1981

Landwehr, C.E., "Formal Models for Computer Security," ACM Computing Surveys, Vol. 13, Number 3 (September, 1981). Also published as NRL Report 8494, September, 1981. Translated and reprinted in Japanese computer journal ``bit,'' Shuppan Kyoritsu, Tokyo, 1983, No. 1 (January), pp. 95-124. [Reprinted in Advances in Computer System Security, Volume II, Rein Turn, Ed., Artech House, Dedham, MA, 1984, pp. 108-122.]