Artifact Details

Title

Robert H. Anderson Collection of Artifical Intelligence and Computer Security Conference Proceedings

Catalog Number

102658643

Type

Text

Date

1955; 1971-2000

Extent

3

Description

Collection consists of conference proceedings, National Computer Security Center manuals, and Department of Defense computer security manuals.
Titles:
Second International Joint Conference on Artificial Intelligence (IJCAI) Advance Papers (1971)
Third IJCAI Advance Papers (1973)
Fourth IJCAI Advance Papers, Volumes One and Two (1975)
Proceedings of the Fifth IJCAI, Volumes One and Two (1977)
Proceedings of the Sixth IJCAI, Volumes One and Two (1979)
Proceedings of the Seventh IJCAI, Volumes I and II (1981)
Proceedings of the Ninth IJCAI, Volume 1 and 2 (1985)
Proceedings of the Second Symposium on Symbolic and Algebraic Manipulation (1971)
Proceedings of the Fourth International Joint Conference on Pattern Recognition (1978)
Proceedings of the National Conference on Artificial Intelligence (1982)
Second Annual Aerospace Applications of Aritificial Intelligence Proceedings (1986)
Proceedings of the Seventh Innovating Applications of Artifical Intelligence Conference (1995)
A Guide to Understanding Audit in Trusted Systems (1987)
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (1988)
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (1987)
A Guide to Understanding Discretionary Access Control in Trusted Systems (1987)
A Guide to Understanding Configuration Management in Trusted Systems (1988)
Glossary of Computer Security Terms (1988)
A Guide to Understanding Design Documentation in Trusted Systems (1988)
Department of Defense Trusted Computer System Evaluation Criteria (1983)
Department of Defense Password Managment Guide (1985)
Computer Security Requirements (1985)
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements (1985)
Proceedings of the Department of Defense Computer Security Center Invitational Workshop on Network Security (1985)
50 Years of Army Computing: From ENIAC to MSRC (1996)
Proceedings of the 2003 Users Group Conference (Department of Defense High Performance Computing Modernization Program)
Proceedings Symposium on Network and Distributed System Security (1997)
[Proceedings] Third Information Survivability Workshop (2000)
[Proceedings] Twelfth Annual Computer Security Applications Conference (1996)
Proceedings New Security Paradigms Workshop, 1994
Proceedings New Secuirty Paradigms Workshop, 1995
Proceedings 1983 ACM Conference on Personal and Small Computers
A Characterization of Ten Hidden-Surface Algorithms (1973)
[Proceedings] 19th National Information Systems Security Conference, Volumes 1 and 2 (1996)
[Proceedings] 20th National Information Systems Security Conference, Volumes 1 and 2 (1997)
[Proceedings] 21st National Information Systems Security Conference, Volumes 1 and 2 (1998)
Arpanet Resource Handbook (NIC 45601) (1978)
A Palimpsest on the Electronic Analog Art (1955)
VAX Systems and Options Catalog (1987 April-June)

Category

Collection record

Credit

Gift of Robert H. Anderson

Lot Number

X3931.2007