The present application is a continuation-in-part of U.S. application Ser. No. 08/688,522 to Boyle et al., entitled, USING TRUSTED ASSOCIATIONS TO ESTABLISH TRUST IN A COMPUTER NETWORK, filed Jul. 30, 1996; and related to U.S. Pat. No. 5,577,209, entitled APPARATUS AND METHOD FOR PROVIDING MULTI-LEVEL SECURITY FOR COMMUNICATION AMONG COMPUTERS AND TERMINALS ON A NETWORK, issued to Boyle et al, Nov. 19, 1996.
Number | Name | Date | Kind |
---|---|---|---|
4694492 | Wirstrom et al. | Sep 1987 | |
4799153 | Hann et al. | Jan 1989 | |
4868877 | Fischer | Sep 1989 | |
4882752 | Lindman et al. | Nov 1989 | |
4885789 | Burger et al. | Dec 1989 | |
4896319 | Lidinsky et al. | Jan 1990 | |
4962449 | Schlesinger | Oct 1990 | |
4984272 | McIlroy et al. | Jan 1991 | |
4991208 | Walker et al. | Feb 1991 | |
5032977 | Hecht et al. | Jul 1991 | |
5056140 | Kimbell | Oct 1991 | |
5075884 | Sherman et al. | Dec 1991 | |
5111390 | Ketcham | May 1992 | |
5113499 | Ankney et al. | May 1992 | |
5126728 | Hall | Jun 1992 | |
5163147 | Orita | Nov 1992 | |
5204961 | Barlow | Apr 1993 | |
5228083 | Lozowick et al. | Jul 1993 | |
5249212 | Covey et al. | Sep 1993 | |
5249231 | Covey et al. | Sep 1993 | |
5283828 | Saunders et al. | Feb 1994 | |
5287519 | Dayan et al. | Feb 1994 | |
5295266 | Hinsley et al. | Mar 1994 | |
5323146 | Glaschick | Jun 1994 | |
5355474 | Thuraisngham et al. | Oct 1994 | |
5361359 | Tajalli et al. | Nov 1994 | |
5369702 | Shanton | Nov 1994 | |
5369707 | Follendore, III | Nov 1994 | |
5375244 | McNair | Dec 1994 | |
5414833 | Hershey et al. | May 1995 | |
5414844 | Wang | May 1995 | |
5416842 | Aziz | May 1995 | |
5465299 | Matsumoto et al. | Nov 1995 | |
5469556 | Clifton | Nov 1995 | |
5469569 | Grube et al. | Nov 1995 | |
5511122 | Atkinson | Apr 1996 | |
5519704 | Farinacci et al. | May 1996 | |
5526489 | Nilakantan et al. | Jun 1996 | |
5537544 | Morisawa et al. | Jul 1996 | |
5548721 | Denslow | Aug 1996 | |
5555373 | Dayan et al. | Sep 1996 | |
5557742 | Smaha et al. | Sep 1996 | |
5574912 | Hu et al. | Nov 1996 | |
5577209 | Boyle et al. | Nov 1996 | |
5583940 | Vidrascu et al. | Dec 1996 | |
5590266 | Carson et al. | Dec 1996 | |
5596718 | Boebert et al. | Jan 1997 | |
5602920 | Bestler et al. | Feb 1997 | |
5606668 | Shwed | Feb 1997 | |
5619657 | Sudama et al. | Apr 1997 | |
5627766 | Beaven | May 1997 | |
5638446 | Rubin | Jun 1997 | |
5692124 | Holden et al. | Nov 1997 | |
5802178 | Holden et al. | Sep 1998 | |
5828832 | Holden et al. | Oct 1998 | |
5832228 | Holden et al. | Nov 1998 |
Entry |
---|
“Development of a Multilevel Secure Local Area Network”, byD.D. Schnackenberg from the proceedings of the 8th National Computer Security Conference on Sep. 30, 1985. |
“Integration of Digital, Voice and Video Data on a Multilevel Secure Fiber Optic Network”, by Junior Nagaki et al, presented atMILCOM '85 on Oct. 21, 1985. |
“Designing Multilevel Secure Networks” byPhillip C. Stover of Boeing Aerospace Company; No Date. |
“The Digital Distributed System Security Architecture” byMorrie Grasser et al. From the proceedings of the 1990 IEEE Conference on Security and Privacy. |
Security Through Software, by BobMitze, dated Nov. 1989, discussing UNIX System VMLS multi-level security operating system. |
Microsoft to conform ToPosix, C2 security level, by Scott D. Palmer, dated Apr. 10, 1989, published in the Federal Computer Week. |
Network Communications, by Jan Watts, dated Jan. 1991, published in PC Computing. |
NCR Unveils Top end . . . (Online Transaction Processing), published Jan. 28, 1991, in the Work Group Computing Report. |
A Data Sheet published by the National Computer Security Center at ForMeade, Maryland, dated Jul. 25, 1990, describing theVerdix Secure Local Area Network (VSLAN). |