-
DoD Trusted Computer System Evaluation
Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)

-
-
DoD Password Management Guideline, 12
April 1985. (Green Book)

-
-
Computer Security Requirements -- Guidance
for Applying the DoD TCSEC in Specific Environments, 25 June 1985 (Light Yellow Book)

-
-
Technical Rational Behind CSC-STD-003-85:
Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific
Environments, 25 June 1985. (Yellow Book)

-
-
Advisory Memorandum on Office Automation
Security Guidelines

-
-
A Guide to Understanding Audit in Trusted
Systems 1 June 1988, Version 2. (Tan Book)

-
-
Trusted Product Evaluations - A Guide for
Vendors, 22 June 1990. (Bright Blue Book)
-
-
A Guide to Understanding Discretionary
Access Control in Trusted Systems, 30 September 1987. (Neon Orange Book)

-
-
Glossary of Computer Security Terms, 21
October 1988. (Teal Green Book) (NCSC-WA-001-85 is obsolete)

-
-
Trusted Network Interpretation of the
TCSEC (TNI), 31 July 1987. (Red Book)

-
-
A Guide to Understanding Configuration
Management in Trusted Systems, 28 March 1988. (Amber Book)

-
-
A Guide to Understanding Design
Documentation in Trusted Systems, 6 October 1988. (Burgundy Book)
-
-
A Guide to Understanding Trusted
Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book)

-
-
Computer Security Subsystem Interpretation
of the TCSEC 16 September 1988. (Venice Blue Book)

-
-
A Guide to Understanding Security Modeling
in Trusted Systems, October 1992. (Aqua Book)

-
-
Trusted Network Interpretation
Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book)

-
-
RAMP Program Document, 1 March 1995,
Version 2 (Pink Book)

-
-
Guidelines for Formal Verification
Systems, 1 April 1989. (Purple Book)

-
-
A Guide to Understanding Trusted Facility
Management, 18 October 1989 (Brown Book)

-
-
Guidelines for Writing Trusted Facility
Manuals, October 1992. (Yellow-Green Book)

-
-
A Guide to Understanding Identification
and Authentication in Trusted Systems, September 1991. (Light Blue Book)

-
-
A Guide to Understanding Object Reuse in
Trusted Systems, July 1992. (Light Blue Book)

-
-
Trusted Product Evaluation
Questionaire, 2
May 1992, Version 2. (Blue Book)
-
-
INFORMATION SECURITY "ILOVEYOU"
Computer Virus Emphasizes Critical

-
-
Technical Report, Computer Viruses:
Prevention, Detection, and Treatment, 12 March 1990

|
-
Trusted UNIX Working Group
(TRUSIX)
Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989.
(Silver Book)

-
-
Trusted Database Management System
Interpretation of the TCSEC (TDI), April 1991.
(Purple Book)
-
-
A Guide to Understanding Trusted Recovery
in Trusted Systems, 30 December 1991. (Yellow Book)

-
-
A Guide to Understanding Security Testing
and Test Documentation in Trusted Systems (Bright Orange Book)
-
-
A Guide to Procurement of Trusted Systems:
An Introduction to Procurement Initiators on Computer Security Requirements, December
1992. (Purple Book)

-
-
A Guide to Procurement of Trusted Systems:
Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators,
30 June 1993. (Purple Book)

-
-
A Guide to Procurement of Trusted Systems:
Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28
February 1994. (Purple Book)

-
-
A Guide to Understanding Data Remanence in
Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85).
(Forest Green Book)

-
-
A Guide to Writing the Security Features
User's Guide for Trusted Systems, September 1991. (Hot Peach Book)

-
-
A Guide to Understanding Information
System Security Officer Responsibilities for Automated Information Systems, May 1992.
(Turquoise Book)

-
-
Assessing Controlled Access Protection, 25
May 1992. (Violet Book)

-
-
Introduction to Certification and
Accreditation Concepts, January 1994.
(Blue Book)
-
Technical Report, Integrity in Automated
Information Systems, September 1991.

-
-
The Design and Evaluation of INFOSEC
systems: The Computer Security Contribution to the Composition Discussion, June 1992.

-
-
Integrity-Oriented Control Objectives:
Proposed Revisions to the TCSEC, October 1991.

-
-
Use of the TCSEC for Complex, Evolving,
Mulitpolicy Systems

-
-
Turning Multiple Evaluated Products Into
Trusted Systems

-
-
A Guide to Procurement of Single Connected
Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement
Initiators - Includes Complex, Evolving, and Multipolicy Systems

-
-
Inference and Aggregation Issues In Secure
Database Management Systems

-
-
Entity and Referential Integrity Issues In
Multilevel Secure
Database Management

-
-
Polyinstantiation Issues In Multilevel
Secure Database Management Systems

-
-
Auditing Issues In Secure Database
Management Systems

-
-
Discretionary Access Control Issues In
High Assurance Secure Database Management Systems

|