McCarthy, S.P., “Hey Hackers! Secure Computing Says You Can't Break into This Telnet Site”, Computer Select, 2 p., (Dec. 1995). |
Merenbloom, P., “Network ‘Fire Walls’ Safeguard LAN Data from Outside Intrusion”, Infoworld, p. 69 & addnl page, (Jul. 25, 1994). |
Metzger, P., et al., “IP Authentication using Keyed MD5”, Network Working Group, Request for Comments No. 1828, http://ds.internic.net/rfc/rfc1828.txt, 5 p., (Aug. 1995). |
Mills, D.L., “Network Time Protocol (Version 3) Specification, Implementation and Analysis”, University of Delaware Network Working Group, 1-48, (Mar. 1992). |
Obraczka, K., et al., “Internet Resource Discovery Services”, Computer, 8-22, (Sep. 1993). |
Press, L., “The Net: Progress and Opportunity”, Communications of the ACM, 35, 21-25, (Dec. 1992). |
Schroeder, M.D., et al., “A Hardware Architecture for Implementing Protection Rings”, Communications of the ACM, 15, 157-170, (Mar. 1972). |
Schwartz, M.F., “Internet Resource Discovery at the University of Colorado”, Computer, 25-35, (Sep. 1993). |
Smith, R.E., “Constructing a High Assurance Mail Guard”, Secure Computing Corporation (Appeared in the Proceedings of the National Computer Security Conference), 7 p., (1994). |
Smith, R.E., “Sidewinder: Defense in Depth Using Type Enforcement”, International Journal of Network Management, p. 219-229, (Jul.-Aug. 1995). |
Stadnyk, I., et al., “Modeling User's Interests in Information Filters”, Communications of the ACM, 35, 49-50, (Dec. 1992). |
Stempel, S., “IpAccess—An Internet Service Access System for Firewall Installations”, IEEE, 31-41, (1995). |
Stevens, C., “Automating the Creation of Information Filters”, Communications of the ACM, 35, 48, (Dec. 1992). |
Dillaway, B.B., et al., “A Practical Design For A Multilevel Secure Database Management System”, American Institute of Aeronautics and Astronautics, Inc., p. 44-57, (Dec. 1986). |
Fine, T., et al., “Assuring Distributed Trusted Mach”, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, p. 206-218, (1993). |
Foltz, P.W., et al., “Personalized Information Delivery: An Analysis of Information Filtering Methods”, Communications of the ACM, 35, 51-60, (Dec. 1992). |
Goldberg, D., et al., “Using Collaborative Filtering to Weave an Information Tapestry”, Communications of the ACM, 35, 61-70, (Dec. 1992). |
Grampp, F.T., “UNIX Operating System Security”, AT&T Bell Laboratories Technical Journal, 63, 1649-1672, (Oct. 1984). |
Haigh, J.T., et al., “Extending the Noninterference Version of MLS for SAT”, Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, CA, p. 232-239, (Apr. 7-9, 1986). |
Kent, S.T., “Internet Privacy Enhanced Mail”, Communications of the ACM, 36, 48-60, (Aug. 1993). |
Lampson, B.W., et al., “Dynamic Protection Structure”, AFIPS Conference Proceedings, 35, 1969 Fall Joint Computer Conference, Las Vegas, NV, 27-38, (Nov. 18-20, 1969). |
Lee, K.C., et al., “A Framework for Controlling Cooperative Agents”, Computer, 8-16, (Jul. 1993). |
Lodin, S.W., et al., “Firewalls Fend Off Invasions from the Net”, IEEE Spectrum, 26-34, (Feb. 1998). |
Loeb, S., “Architecting Personalized Delivery of Multimedia Information”, Communications of the ACM, 35, 39-48, (1992). |
Loeb, S., et al., “Information Filtering”, Communications of the ACM, 35, 26-28, (Dec. 1992). |
Boebert, W.E., et al., “Secure Ada Target: Issues, System Design, and Verification”, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, p. 59-66, (Apr. 22-24, 1985). |
Boebert, W.E., et al., “Secure Computing: The Secure Ada Target Approach”, Scientific Honeyweller, 6 (2), 42-58, (Jul. 1985). |
News Release: “SATAN No Threat to Sidewinder(tm)”, Secure Computing Corporation, (Apr. 26, 1995). |
“Answers to Frequently Asked Questions About Network Security”, Secure Computing Corporation, p. 1-41 & p. 1-16, (Sep. 25, 1994). |
“Sidewinder Internals”, Product information, Secure Computing Corporation, 16 p., (Oct. 1994). |
“Special Report: Secure Computing Corporation and Network Security”, Computer Select, 13 p., (Dec. 1995). |
Adam, J.A., “Meta-Matrices”, IEEE Spectrum, p. 26-27, (Oct. 1992). |
Adam, J.A., “Playing on the Net”, IEEE Spectrum, p. 29, (Oct. 1992). |
Ancilotti, P., et al., “Language Features for Access Control”, IEEE Transactions on Software Engineering, SE-9, 16-25, (Jan. 1983). |
Badger, L., et al., “Practical Domain and Type Enforcement for UNIX”, Proceedings of the 1995 IEEE Symposium on Security and Privacy, p. 66-77, (May 1995). |
Belkin, N.J., et al., “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”, Communications of the ACM, 35, 29-38, (Dec. 1992). |
Bellovin, S.M. et al., “Network Firewalls”, IEEE Communications Magazine, 32, 50-57, (Sep. 1994). |
Bevier, W.R., et al., “Connection Policies and Controlled Interference”, Proceedings of the Eighth IEEE Computer Security Foundations Workshop, Kenmare, Ireland, p. 167-176, (Jun. 13-15, 1995). |
Bowen, T.F., et al., “The Datacycle Architecture”, Communications of the ACM, 35, 71-81, (Dec. 1992). |
Bryan, J., “Firewalls For Sale”, BYTE, 99-100, 102, 104-105, (Apr. 1995). |
Damashek, M., “Gauging Similarity with N-Grams: Language-Independent Categorization of Text”, Science, 267, 843-848, (Feb. 10, 1995). |
Thomsen, D., “Type Enforcement: The New Security Model”, SPIE, 2617, 143-150, (1995). |
Warrier, U.S., et al., “A Platform for Heterogeneous Interconnection Network Management”, IEEE Journal on Selected Areas in Communications, 8, 119-126, (Jan. 1990). |
White, L.J., et al., “A Firewall Concept for Both Control-Flow and Data-Flow in Regression Integration Testing”, IEEE, 262-271, (1992). |
Wolfe, A., “Honeywell Builds Hardware for Computer Security”, Electronics, 14-15, (Sep. 2, 1985). |
International Search Report , PCT Application No. PCT/US 95/12681, 8 p., (mailed Apr. 9, 1996). |
News Release: “100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder(tm)”, Secure Computing Corporation, (Feb. 16, 1995). |
News Release: “Internet Security System Given ‘Product of the Year’ Award”, Secure Computing Corporation, (Mar. 28, 1995). |