Ware report (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Ware report" in English language version.

refsWebsite
Global rank English rank
11th place
8th place
2nd place
2nd place
5,196th place
3,635th place
670th place
480th place
1,185th place
840th place
5th place
5th place
2,921st place
2,118th place
355th place
454th place
1st place
1st place

acm.org

dl.acm.org

cam.ac.uk

cl.cam.ac.uk

  • Murdoch, Steven; Bond, Mike; Anderson, Ross J. (Nov–Dec 2012). "How Certification Systems Fail: Lessons from the Ware Report" (PDF). IEEE Security & Privacy. 10 (6): 40–44. doi:10.1109/MSP.2012.89. S2CID 20231. The heritage of most security certification standards in the banking industry can be traced back to ... 'Security Controls for Computer Systems' (commonly known as the Ware Report...), focussed on the problem of protecting classified information in multi-access, resource-sharing, computer systems which were at the time being increasingly used by both the government and defense contractors. The report included not only recommendations for what security functionality such systems should have in order to safely process classified information, but also proposed certification procedures for verifying whether a system meets these criteria. These certification procedures formed the basis for the Trusted Computer System Evaluation Criteria (TCSEC). The requirements and assessment criteria for TCSEC are given in 5200.28-STD, colloquially known as the 'Orange Book', but that publication is augmented by others in the 'Rainbow Series', expanding and clarifying various aspects.

computer.org

history.computer.org

  • "Willis Howard Ware". IEEE Computer Society. Retrieved 2020-12-20. Security Controls for Computer Systems, tech. report R-609-PR, RAND, Defense Science Board Task Force on Computer Security, 1972. R-609- 1-PR was reissued Oct. 1979. This widely circulated report was informally known as 'the Ware report.'

doi.org

  • Murdoch, Steven; Bond, Mike; Anderson, Ross J. (Nov–Dec 2012). "How Certification Systems Fail: Lessons from the Ware Report" (PDF). IEEE Security & Privacy. 10 (6): 40–44. doi:10.1109/MSP.2012.89. S2CID 20231. The heritage of most security certification standards in the banking industry can be traced back to ... 'Security Controls for Computer Systems' (commonly known as the Ware Report...), focussed on the problem of protecting classified information in multi-access, resource-sharing, computer systems which were at the time being increasingly used by both the government and defense contractors. The report included not only recommendations for what security functionality such systems should have in order to safely process classified information, but also proposed certification procedures for verifying whether a system meets these criteria. These certification procedures formed the basis for the Trusted Computer System Evaluation Criteria (TCSEC). The requirements and assessment criteria for TCSEC are given in 5200.28-STD, colloquially known as the 'Orange Book', but that publication is augmented by others in the 'Rainbow Series', expanding and clarifying various aspects.
  • Misa, Thomas J. (October–December 2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 12–25. doi:10.1109/MAHC.2016.48. ISSN 1058-6180. S2CID 17609542. The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin.
  • Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. Archived from the original (PDF) on 2019-02-20. The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.

nist.gov

csrc.nist.gov

rand.org

semanticscholar.org

api.semanticscholar.org

  • Murdoch, Steven; Bond, Mike; Anderson, Ross J. (Nov–Dec 2012). "How Certification Systems Fail: Lessons from the Ware Report" (PDF). IEEE Security & Privacy. 10 (6): 40–44. doi:10.1109/MSP.2012.89. S2CID 20231. The heritage of most security certification standards in the banking industry can be traced back to ... 'Security Controls for Computer Systems' (commonly known as the Ware Report...), focussed on the problem of protecting classified information in multi-access, resource-sharing, computer systems which were at the time being increasingly used by both the government and defense contractors. The report included not only recommendations for what security functionality such systems should have in order to safely process classified information, but also proposed certification procedures for verifying whether a system meets these criteria. These certification procedures formed the basis for the Trusted Computer System Evaluation Criteria (TCSEC). The requirements and assessment criteria for TCSEC are given in 5200.28-STD, colloquially known as the 'Orange Book', but that publication is augmented by others in the 'Rainbow Series', expanding and clarifying various aspects.
  • Misa, Thomas J. (October–December 2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 12–25. doi:10.1109/MAHC.2016.48. ISSN 1058-6180. S2CID 17609542. The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin.
  • Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. Archived from the original (PDF) on 2019-02-20. The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.

pdfs.semanticscholar.org

  • Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. Archived from the original (PDF) on 2019-02-20. The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.

web.archive.org

  • Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. Archived from the original (PDF) on 2019-02-20. The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.

worldcat.org

search.worldcat.org