| Number | Name | Date | Kind |
|---|---|---|---|
| 4227253 | Ehrsam et al. | Oct 1980 | |
| 4238854 | Ehrsam et al. | Dec 1990 | |
| 4264782 | Konheim | Apr 1981 | |
| 4578530 | Zeidler | Mar 1986 | |
| 4629872 | Hollberg | Dec 1986 | |
| 4652698 | Hale et al. | Mar 1987 | |
| 4713753 | Boebert et al. | Dec 1987 | |
| 4825050 | Griffith et al. | Apr 1989 | |
| 4888801 | Foster et al. | Dec 1989 | |
| 4980913 | Skret | Dec 1990 | |
| 5018096 | Aoyama | May 1991 | |
| 5065429 | Lang | Nov 1991 | |
| 5148479 | Bird et al. | Sep 1992 |
| Entry |
|---|
| "Secure Computing: The Secure Ada Target Approach," W. E. Boebert et al., Lock Selected Papers, 1985-1988, Secure Computing Technology Corp., Arden Hills, Minn. |
| "Secure Ada Target: Issues, System Design, and Verification," W. E. Boebert et al., Proceedings of the Symposium on Security and Privacy, Oakland, Calif., Apr. 22-24, 1985. |
| "Using Embedded COMSEC: An Integrator's Viewpoint," by Thomas Kibalo and W. E. Boebert, Proceedings of the 1st AFCEA Mid-Atlantic Intelligence Symposium (1986). |