x-post from http://www.garlic.com/~lynn/aadsm24.htm#45 Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
IBM Virtualization Achieves One of Industry's Highest Security Levels, Says Government Evaluator http://www.marketwire.com/mw/release_html_b1?release_id=146570 the more things change, the more things stay the same, some reference to doing this same stuff nearly 40 years ago http://www.nsa.gov/selinux/list-archive/0409/8362.cfm recent post some of the stuff going back only 20-30 years http://www.garlic.com/~lynn/2006n.html#44 Any resources on VLIW? http://www.garlic.com/~lynn/2006n.html#47 Any resources on VLIW? note that I wasn't actually aware of this stuff when i was an undergraudate. i became aware of it later on when i was asked to teach classes. it then started to dawn on me where some of the early requests for system integrity enhancements may have come from. misc. past posts mentioning system assurance http://www.garlic.com/~lynn/subpubkey.html#assurance
