| IEEE Proceedings of the Symposium on Security and Privacy, Apr. 22-24, 1985 Oakland, CA., Boebert et al. "Secure ADA Target: Issues, System Design, an Verification". |
| AFIPS Conference Proceedings, vol. 35, Nov. 18-20, 1969, Las Vegas, Nevada, Lampson, "Dynamic Protection Structures". |
| "A Hardware Architecture for Implementing Protection Rings", 1972. |
| IEEE Symposium on Research in Security and Privacy, May 4, 1992, Oakland, U.S. J. Epstein et al. "Evolution of a Trusted B3 Window System Prototype". |
| Proceedings, 1987 Fall Joint Computer Conference, Oct. 25, 1987, Dallas, U.S. J. Picciotto et al., "Privileges and Their Use by Trusted Applications". |
| "Secure Computing: The Secure Ada Target Approach," W. E. Boebert et al., Lock Selected Papers, 1985-1988, Secure Computing Technology Corp., Arden Hills, MN. |
| "Using Embedded COMSEC: An Integrator's Viewpoint," by Thomas Kibalo and W. E. Boebert, Proceedings of the 1st AFCEA Mid-Atlantic Intelligence Symposium (1986). |