Number | Name | Date | Kind |
---|---|---|---|
4227253 | Ehrsam et al. | Oct 1980 | |
4238854 | Ehrsam et al. | Dec 1990 | |
4264782 | Konheim | Apr 1981 | |
4578530 | Zeidler | Mar 1986 | |
4629872 | Hollberg | Dec 1986 | |
4652698 | Hale et al. | Mar 1987 | |
4713753 | Boebert et al. | Dec 1987 | |
4825050 | Griffith et al. | Apr 1989 | |
4888801 | Foster et al. | Dec 1989 | |
4980913 | Skret | Dec 1990 | |
5018096 | Aoyama | May 1991 | |
5065429 | Lang | Nov 1991 | |
5148479 | Bird et al. | Sep 1992 |
Entry |
---|
"Secure Computing: The Secure Ada Target Approach," W. E. Boebert et al., Lock Selected Papers, 1985-1988, Secure Computing Technology Corp., Arden Hills, Minn. |
"Secure Ada Target: Issues, System Design, and Verification," W. E. Boebert et al., Proceedings of the Symposium on Security and Privacy, Oakland, Calif., Apr. 22-24, 1985. |
"Using Embedded COMSEC: An Integrator's Viewpoint," by Thomas Kibalo and W. E. Boebert, Proceedings of the 1st AFCEA Mid-Atlantic Intelligence Symposium (1986). |