13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the follow<strong>in</strong>g is a po<strong>in</strong>ter to a related article that Bell and LaPadula wrote <strong>in</strong> 1976 where<br />

they cite this reference for their work, as opposed to the more prevalent 1973 reference:<br />

http://csrc.nist.gov/publications/history/bell76.pdf)<br />

85. Krutz, R. and V<strong>in</strong>es, R., The CISSP Prep Guide, Wiley Computer Publish<strong>in</strong>g, 2001.<br />

86. Executive Order 12958, “Classified Nation Security Information,” April 17, 1995.<br />

http://www.fas.org/sgp/cl<strong>in</strong>ton/eo12958.html<br />

87. Executive Order 13292, “Further Amendment to Executive Order 12958, As amended,<br />

Classified National Security Information,” March 25, 2003.<br />

http://www.fas.org/sgp/bush/eoamend.html<br />

88. Public Law 100-235 (H.R. 145), “Computer Security Act of 1987,” January 8, 1988.<br />

http://www.epic.org/crypto/csa/csa.html<br />

89. Title 22, Chapter 1, Subchapter M, “International Traffic <strong>in</strong> Arms Regulations,”<br />

Department of State, Revised April 1, 1992.<br />

http://www.epic.org/crypto/export_controls/itar.html<br />

90. MIL-STD 882D, “Department of Defense Standard Practice for System Safety,” 10<br />

February 2000.<br />

91. Department of Defense Instruction (DoDI) 8500.2, “Information Assurance (IA)<br />

Implementation,” ASD(C3I), 102 Pages<br />

92. OMB Circular A-130, “Management of Federal Information Resources, Transmittal 4,”<br />

November 30, 2000.<br />

93. Alves-Foss, J., R<strong>in</strong>ker, B., and Taylor, C., “Towards Common Criteria Certification for<br />

DO-178B Compliant Airborne Software Systems,” Center for Secure and Dependable<br />

Systems, University of Idaho, January 2002.<br />

http://www.esds.uidaho.edu/papers/Taylor02d.pdf<br />

94. http://sourceforge.net/projects/tripwire/<br />

95. Ghosh, A., O’Connor, T., and McGraw, G., “An Automated Approach for Identify<strong>in</strong>g<br />

Potential Vulnerabilities <strong>in</strong> Software,” DARPA contract F30602-95-C-0282, Proceed<strong>in</strong>gs<br />

of the 1998 IEEE Symposium on Security and Privacy, IEEE Computer Society, May<br />

1998, pp. 104-114.<br />

http://www.cigital.com/papers/download/ieees_p98_2col.pdf<br />

96. Cowan, C., Pu, C., Maier, D., H<strong>in</strong>ton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A.,<br />

Wagle, P., and Zhang, Q., “StackGuard: Automatic Adaptive Detection and Prevention<br />

of Buffer-Overflow Attacks,” DARPA Contract F30602-96-1-0331 and F30602-96-1-<br />

155

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!