Seminal Papers in Cybersecurity: A Review (Part 2 of 2)
[1] Willis H. Ware, "Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security," Rand Corporation, Santa Monica, 1969.
[2] J. P. Anderson, "Computer Security Technology Planning Study," USAF, Bedford, 1973.
[3] Bell, David E; LaPadula, Len;, "SECURE COMPUTER SYSTEMS: MATHEMATICAL FOUNDATIONS," MITRE, Bedford, 1973.
[4] D. E. Bell, Interviewee, An Interview with David Elliott Bell. [Interview]. 12 September 2012.
[5] J. Saltzer and M. D. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE, vol. 63, no. 9, pp. 1278-1308, 1975.
[6] J. R. Yost, "The Origin and Early History of the Computer Security Software Products Industry," IEEE Annals of the History of Computing, pp. 46-58, 2015.
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.