Cryptography and the Intelligence Community: The Future of Encryption, Committee on the Future of Encryption (Steven B. Lipner, chair), National Academies Press, 2022
The Security Development Lifecycle, with Michael Howard, Microsoft Press, 2006
Making Attestation Work for Software Security, with Jim Dempsey and James Andrew Lewis, Lawfare, July 2024
Incentives for Improving Software Security: Product Liability and Alternatives, Lawfare, May 2024
Updates, Threats, and Risk Management, with John Pescatore, Communications of the ACM, May 2023
The Birth and Death of the Orange Book, IEEE Annals of the History of Computing, April-June 2015
Crossing the Great Divide: Transferring Security Technology from Research to the Market, with Terry V. Benzel, IEEE Security and Privacy, March-April 2013
Lessons from VAX SVS for High Assurance VM Systems, with Trent Jaeger and Mary Ellen Zurko, IEEE Security and Privacy, November-December 2012
Prescriptive versus Descriptive Security, with David C. Ladd, Datenschutz und Datensicherheit DuD, September 2012
In Memoriam: Paul Karger, with R. R. Schell, M. E. Zurko, E. R. Palmer, D. Safford, C. C. Palmer, and C. E. Landwehr, IEEE Security and Privacy, November-December 2010
Information Assurance Technology Forecast 2005, with Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, and John D. McLean, IEEE Security and Privacy, January-February 2006
Commercial Key Recovery, with Stephen T. Walker, Carl M. Ellison, and David M. Balenson, Communications of the ACM, March 1996
A Comment on the Confinement Problem, ACM SIGOPS Operating Systems Review and ACM Symposium on Operating System Principles, November 1975
Assurance and Evaluation: What Next?, Keynote, Fourteenth ACM Conference on Computer and Communications Security, 2007
The Trustworthy Computing Security Development Lifecycle, Twentieth Annual Computer Security Applications Conference, 2004
Twenty years of evaluation criteria and commercial technology, IEEE Symposium on Security and Privacy, 1999
Criteria, Evaluation, and the International Environment: Where have we been, where are we going?, Proceedings IFIP-SEC, 91; also published in RISKS-FORUM Digest 12.46, October 1991 and presented at the Symposium on Security and Privacy, Industrial Partners Program, Brown University Department of Computer Science, 1991
SE/VMS: Implementing Mandatory Security in VAX/VMS, with S. Blotcky and K. Lynch, Ninth National Computer Security Conference, 1986
Secure System Development at Digital Equipment: Targeting the Needs of a Commercial and Government Customer Base, Eighth National Computer Security Conference, 1985
Provably Secure Operating Systems, with Roger Schell, Security and Privacy, Proceedings of the Joint IBM/University of Newcastle upon Tyne Seminar held in the University Computing Laboratory, 4th - 7th September 1984, Edited by B. Randell, University of Newcastle upon Tyne Computing Laboratory, 1984
Non-Discretionary Controls for Commercial Applications, IEEE Symposium on Security and Privacy, and Fifth Seminar on the DoD Computer Security Initiative, 1982
A Minicomputer Security Control System, CompCon74, Eighth IEEE Computer Society International Conference, 1974
Computer Security Research and Development Requirements, ADP Security and Privacy: Proceedings of the Conference on Secure Data Sharing, Naval Ship Research and Development Center Report 4130, 1973 and MITRE Paper MTP-142
Is a Secure Software Supply Chain Supply Chain Even Possible, Let Alone Feasible, with Tony Sager, RSA Conference 2022
Lessons Learned: Fifty Years of Mistakes in Cybersecurity, RSA Conference 2020
Secure Software Development Framework: An Industry & Public Sector Approach, RSA Conference 2020
Getting Started with SDL, (ISC)2 Security Congress, 2019
Lessons Learned About Building Secure Software: It's About the Developers!, Usenix Security '19, 2019
SDL That Won't Break the Bank, Black Hat Conference, 2018
Panel: Cyber/Physical Security and the IoT, with Dan Caprio, Donald Davidson, Michael McGrath, and Robert Metzger, RSA Conference, 2017
Panel: Evaluating the Security of Purchased Software: Can We Find Common Ground, with Howard Schmidt, Chris Wysopal, Eric Baize and Nadya Bartol, RSA Conference, 2014
Panel: Certification of Products or Accreditation of Organizations: Which to Do?, with Daniel Reddy, David Martin, Donald Davidson, and Joshua Brickman, RSA Conference, 2013
Common Criteria and Secure Development: A New Proposal, Thirteenth International Common Criteria Conference, 2012
Panel: What Motivated My Company to Invest in a Secure Development Program?, with Brad Arkin, Gary Phillips, Gunter Bitz, and Janne Uusilehto, RSA Conference, 2012
Panel: Supply Chain Assurance, with Hans-Grad Albertson, David Grawrock, Gene Keeling, Wouter Slepers, and Andras Szakal, Twelfth International Common Criteria Conference, 2011
Common Criteria: Meeting the Needs of a Global Market?, Keynote, Eleventh International Common Criteria Conference, 2010
Common Criteria: A Community Focus on Improving Software Assurance, Keynote, Tenth International Common Criteria Conference, 2009
Protecting Critical Infrastructures: A Security Challenge for the 21st Century, Keynote, ISSE Europe, 2007
The Security Development Lifecycle, SUMIT_06 Security Symposium, University of Michigan, 2006
Lessons Learned in Market Adoption of the Common Criteria, Sixth International Common Criteria Conference, 2005
Business Value and Improving Security: the Role of Common Criteria, Keynote, Fifth Annual Common Criteria Conference and Sixth Annual Information Security Solutions Europe, 2004
The Journey Toward Secure Systems: Achieving Assurance, Eleventh IEEE Requirements Engineering Conference, 2003
Source Code and Security: Myths and Realities, RSA Conference, 2001
Panel: Collaboration: Can It Be Done Securely?, with Deborah Cooper, Bill Dawson and Jeff Ingle, Sixteenth Annual Computer Security Applications Conference, 2000
Panel: "Working on a Shoestring" - Security solutions in the shadow of limited funds, with David Jarrell, Shawn Hernan, and Kenneth Ammon, Twenty-third National Information Systems Security Conference, 2000
Panel: Security and Source Code Access: Issues and Realities, IEEE Symposium on Security and Privacy, 2000
Panel: Achieving Assurance: What will we do?, with Todd Inskeep, Peter Neumann, Roger Schell, and Clark Weissman, Twenty-second National Information Systems Security Conference, 1999
Twenty Years of Evaluation Criteria and Commercial Technology, IEEE Symposium on Security and Privacy, 1999
Security for Mission Planning Systems: Product and Technology Trends, Mission Planning Symposium - Mission Planning/Mission Success, Armed Forces Communications and Electronics Association (AFCEA), Lexington-Concord Chapter, 1991
On the Interaction of Operating System and Network Security Controls, Conference Proceedings, MILCOMP 87, Military Computers, Graphics and Software, 1987
Ethernet Security, Proceedings of the Second Annual AFCEA Intelligence Symposium, September 29-30, 1987, Johns Hopkins University Applied Physics Laboratory, 1987
Industry Perspective, Proceedings of Communications and Computer Security (COMSEC and COMPUSEC): Requirements, Opportunities, and Issues, Requirements Committee, Government Division, Electronic Industries Association, 1987
Panel: INFOSEC - A Look into the Future, with Ronald Gove, Patrick Gallagher, and Stephen Walker, Second Annual Symposium on Physical/Electronic Security, Philadelphia Chapter, Armed Forces Communications and Electronics Association, 1986
Panel: How Do You Sell Better Computer Security?, with Lester Fraim and Ted Lee, Sixth Seminar on the DoD Computer Security Initiative, 1983
Panel: Bell-LaPadula and Alternative Models, with David Bell, Carl Landwehr, Roger Schell, and Clark Weissman, IEEE Symposium on Security and Privacy, 1983
Digital's Research Activities in Computer Security, with Paul Karger, 15th Annual Electronics and Aerospace Systems Conference (EASCON 82), 1982
Panel: How Can the Government and the Computer Industry Solve the Computer Security Problem?, with Ted Lee, Jim Anderson, Marvin Schaefer and Bill Eisner, Third Seminar on the DoD Computer Security Initiative Program, 1980
Secure Computer Systems for Network Applications, Fourth Data Communications Symposium, 1975
A Panel Session - Security Kernels, with William Wulf, Roger Schell, Gerald Popek, Peter Neumann, Clark Weissman, and Theodore Linden, National Computer Conference 1974
Risk Management and the Cybersecurity of the U.S. Government, Input to the Commission on Enhancing National Cybersecurity, with Butler W. Lampson, September 2016
Improving the Acquisition of Software Systems, with W.S. Attridge and O.R. Kinney, MITRE Technical Report 8304, March 1981
Multics Security Evaluation: Results and Recommendations, MITRE Technical Report 3267, Volume 1, October 1978
ESD 1974 Computer Security Dev elopments Summary, with Richard D. Rhode, Air Force Electronic Systems Division Interim Report MCI 75-1, DTIC Report ADA542660
SATIN Computer Security, Air Force Electronic Systems Division document MCI-75-2, September 1972
MACIMS Security Configurations, MITRE Working Paper 3697, January 1971
Oral history interview by Jeffrey R. Yost, 15 August 2012, Redmond Washington, University of Minnesota, Charles Babbage Institute, Minneapolis MN
Committee on Enhancing the Assurance and Nimbleness of Large-Scale Integrated Software-Based Systems, member and co-chair, 2023 - present
Intelligence Community Studies Board, National Academies of Sciences, Engineering, and Medicine, 2022 - present
United States Information Security and Privacy Advisory Board (ISPAB, member, 2000 - 2006; member and chair, 2018 - present
Naval Studies Board, National Academies of Sciences, Engineering, and Medicine, 2020 - 2023
Committee on the Future of Encryption of the National Academies of Sciences, Engineering, and Medicine, member and chair, 2020 - 2022
Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine, 2015 - 2021
Panel on Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Tradeoffs, Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, 2016 - 2018
Panel on Assessment and Analysis of the Army Research Laboratory, National Academies of Sciences, Engineering, and Medicine, 2016, 2018
Defense Science Board Task Force on Cyber Supply Chain, 2015 - 2016
Committee of Vistors to provide the NIST Visiting Committee on Advanced Technology with technical advice on NIST cryptographic standards and guidelines development processes, 2014
Committee for a Review of U.S. Navy Cyber Defense Capabilities, Naval Studies Board, National Research Council, 2013 - 2015
Committee on Future Research Goals and Directions for Foundational Science in Cybersecurity, Computer Science and Telecommunications Board, National Research Council, 2012 - 2017
Panel on Information Technology of the Laboratory Assessment Board, National Academies of Sciences, Engineering, and Medicine, 2007 - 2011, 2018
Committee on Certifiably Dependable Software Systems, Computer Science and Telecommunications Board, National Research Council, 2003 - 2007
Committee on R&D Strategies to Improve Surface Transportation Security, National Materials Advisory Board, Computer Science and Telecommunications Board, Transportation Research Board, National Research Council, 1998 - 1989
United States Computer Systems Security and Privacy Advisory Board, 1989 - 1993
Committee on Computer Security in the Department of Energy Laboratories, Energy Engineering Board, National Research Council, 1987 - 1988
Summer Study on Multilevel Data Management Security, Air Force Studies Board, National Research Council, 1982
Computer Security Planning Study Panel (Anderson Panel), Air Force Electronic Systems Division and James P. Anderson and Company, 1972 - 1973
Member, Association for Computing Machinery
Affiliate Member, IEEE Computer Society
Life Member, Information Systems Security Association
Member, International Information Systems Security Certification Consortium (ISC2); and Member, ISC2 Americas Advisory Board, 2003 - 2006
Chair, IEEE Computer Society Technical Committee on Security and Privacy, 1984 - 1985
Program Co-chair, IEEE Symposium on Security and Privacy (Oakland Conference), 1987, 1988
Verification of trusted-path commands, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 7036022, 2006
Processing trusted commands in trusted and untrusted environments, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 6871283, 2005
Method for executing trusted-path commands, with Mary Ellen Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, and Leslie Kendall, U.S. patent 6507909, 2003
System and method for data recovery, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5991406, 1999
System and method for access field verification, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5956403, 1999
System and method for controlling access to a user secret, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5745573, 1998
System and method for access field verification, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5640454, 1997
System and method for data recovery, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5557765, 1996
System and method for key escrow encryption, with David Balenson, Carl Ellison, and Stephen Walker, U.S. patent 5557346, 1996
Secure user authentication from personal computer, with Morrie Gasser and Butler Lampson, U.S. patent 5210795, 1993
Apparatus and method for secure transmission of data over an unsecure transmission channel, with B.J. Herbison, Carter Lyman, Paul Karger, Bruce Mann, and Arnold Miller, U.S. patent 4924513, 1990
Apparatus and method for secure transmission of data over an unsecure transmission channel, with B.J. Herbison, Carter Lyman, Paul Karger, Bruce Mann, and Arnold Miller, U.S. patent 4881263, 1989