Roger R. Schell
American businessman
Why Is Roger R. Schell Influential?
(Suggest an Edit or Addition)According to Wikipedia, Roger R. Schell is president of ÆSec, a company focused on appliances built on hardened platforms for secure, reliable e-business on the Internet. For several years he managed the development and delivery of security for several Novell releases of network software products including an integral PKI, an international crypto API, and an authentication service with exposed SSL capability. Dr. Schell was co-founder and vice president for Engineering of Gemini Computers, Inc., where he directed development of Gemini's Class A1 network processor commercial product. He was also the founding deputy director of the National Computer Security Center. Previously he was an associate professor of computer science at the Naval Postgraduate School.
Roger R. Schell's Published Works
Published Works
- DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (1985) (575)
- The SeaView security model (1988) (315)
- A Multilevel Relational Data Model (1987) (202)
- Views for Multilevel Database Security (1987) (133)
- Security Kernel Design and Implementation: An Introduction (1983) (116)
- Thirty years later: lessons from the Multics security evaluation (2002) (93)
- Multics security evaluation: vulnerability analysis (2002) (90)
- A near-term design for the SeaView multilevel database system (1988) (67)
- Views for Multilevel Database Security (1986) (60)
- Designing the GEMSOS security kernel for security and performance (1985) (57)
- Subversion as a Threat in Information Warfare (2004) (39)
- Mechanism Sufficiency Validation by Assignment (1981) (34)
- Preliminary Notes on the Design of Secure Military Computer Systems. (1973) (33)
- Concepts and Terminology for Computer Security (2006) (24)
- Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products (1984) (20)
- Information security: science, pseudoscience, and flying pigs (2001) (18)
- Security — A big question for big data (2013) (18)
- Toward a multilevel relational data language (1988) (18)
- Element-level classification with A1 assurance (1988) (17)
- Platform Security: What is Lacking? (2000) (16)
- Essay 1 What Is There to Worry About ? An Introduction to the Computer Security Problem (2006) (13)
- DYNAMIC RECONFIGURATION IN A MODULAR COMPUTER SYSTEM (1971) (12)
- Security kernels (1974) (11)
- Computer Security: the Achilles' Heel of the Electronic Air Force? (2013) (10)
- A Security Kernel for a Multiprocessor Microcomputer (1983) (10)
- Firewalls: An Expert Roundtable (1997) (10)
- Using Proven Reference Monitor Patterns for Security Evaluation (2016) (8)
- Evaluating Security Properties of Computer Systems (1983) (8)
- Multics Security Evaluation Volume II. Vulnerability Analysis. (1974) (7)
- A high-assurance, virtual guard architecture (2012) (6)
- Evaluation Criteria for Trusted Systems (2006) (6)
- A multi-level secure file sharing server and its application to a multi-level secure cloud (2015) (4)
- The importance of high assurance computers for command, control, communications, and intelligence systems (1988) (4)
- The Neglected Aspect of Computer Security (3)
- The Structure of a Security Kernel for the Z8000 Multiprocessor (1981) (3)
- Cyber defense triad for where security matters (2016) (3)
- Using the bootstrap concept to build an adaptable and compact subversion artifice (2002) (3)
- Using a high assurance TCB for infrastructure security (2011) (2)
- COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS (2011) (2)
- Security in Automatic Data Processing (ADP) Network Systems. (1976) (2)
- Towards Formal Evaluation of a High-Assurance Guard (2012) (2)
- Genesis of a secure application: a multilevel secure message preparation workstation demonstration (1988) (1)
- A Secure Approach to Data Base Management System Design (1974) (1)
- In Memoriam: Paul Karger (2010) (1)
- 15 Top Level Security Points for Global Electronic Commerce (1999) (1)
- Design and implementation of a secure terminal gateway (1988) (1)
- Starship Mission Destination Enterprise L Spying M 1 Rigel M 2 Enterprise L Spying M 1 ? Enterprise L ? Rigel M 2 5 Polyinstantiation Integrity Figure 6: Element-level Classiication 4.3 Tradeoo 4.2 Element-level Classiication (1993) (0)
- Computer Security: A Historical Perspective† (2014) (0)
- Current and future trends and challenges in critical infrastructure cybersecurity (2016) (0)
- The future of trusted computer systems (1984) (0)
- Oral history interview with Roger R. Schell (2012) (0)
- Computer Security: A Historical Perspective (2008) (0)
- Volatility Estimation using Extreme-Value- Estimators & MLP model (2016) (0)
- Architecture for an embedded secure data base management system (1990) (0)
- Prellmin'ary Notes . on the Design,qf Secure Mllltary Computer Systems (0)
- 3.3 Validity Checking (2007) (0)
- The Naval Postgraduate School secure archival storage system, Part II : Segment and process management implementation (1981) (0)
- The Seaview Security (2009) (0)
- Processing requirements of secure C3/I and battle management systems - Development of Gemini trusted multiple microcomputer base (1985) (0)
- Processing Of Infrared Images By Multiple Microcomputer System (1980) (0)
- The Naval Postgraduate School secure archival storage system, Part I. Design (1980) (0)
- Some Comments From The General Chairman (1982) (0)
This paper list is powered by the following services:
Other Resources About Roger R. Schell
What Schools Are Affiliated With Roger R. Schell?
Roger R. Schell is affiliated with the following schools: