Gaithersburg, MD: Defense Computer Security Center and Institute of Computer Science and Technology of the National Bureau of Standards, 1985. Presumed First Edition, First printing thus. Brochure. 20 pages plus covers (includes conference and hotel registration postcards). Staple holes. Format is 4 inches by 9.25 inches. Conference brochure. Some writing to text. Mailing information and postage on back cover. This is the eighth in a series of conferences co-sponsored by the DoD Computer Security Center and the National Bureau of Standards. The theme of this year's conference is, "Computer Security in the National Arena." The program is directed toward the users as well as the developers of computer security products, and includes presentations on the efforts of the Department of. Defense and National Bureau of Standards, of trusted product researchers and developers, and of the private sector. The specific topics this year include secure networks, verification, assurance, formal models, security architecture, sanitization, applications on secure bases, labeling, a profile of hackers, performance tuning of secure products, and market analysis of secure products. In January, 1981, the Computer Security Center was established in the Department of Defense. The Center is encouraging the development of trusted computing systems through technology transfer with industry, and is defining ADP system evaluation procedures to be applied to both Government-developed and commercially developed trusted computing systems. In September, 1984, the President enlarged the mission of the Center to include the Federal civil establishment and segments of the private sector. The National Bureau of Standards' Institute for Computer Sciences and Technology, through its Computer Security and Risk Management Standards Program, seeks new technology to satisfy Federal ADP security requirements. The Institute promulgated cost-effective technology in Federal Information Processing Standards and Guidelines. The Institute cooperated with the Department of Defense in transferring the Computer Security Center's research results throughout the Government and to private industry. Condition: Good.
Keywords: 8th National Computer Security Conference, Defense Computer Security Center, NIST, Computer Science, Computer Technology, Hackers, Sheila Brand, James Burrows, Trusted Systems, William Odom, Lara Baker, Multilevel Security, B1-Enhanced OS/1100, GEMSO