Some papers and articles not always easily accessible elsewhere.
Heckman, Mark R, et al. “Chapter 32: Toward a Maritime Cyber Security Compliance Regime.” Issues in Maritime Cyber Security, edited by Fred S Roberts et al., Westphalia Press, 2017, pp. 543–568.
Heckman, Mark R. “The Promise and Limits of BIG DATA for Improving INTRUSION DETECTION.” ISSA Journal, June 2017, pp. 22–46.
Mark R. Heckman, Cybersecurity Education's Cargo Cult, United States Cybersecurity Magazine, Winter 2016.
Mark R. Heckman, Every Secure System Wants to Be a Reference Monitor, ISSA Journal, Vol. 13, No. 7, July 2015.
Heckman, Mark R. "The Difference Between Data Security and Privacy." United States Cybersecurity Magazine, Winter 2017.
M.R. Heckman and R.R. Schell, “Using proven reference monitor patterns for security evaluation,” Information, Vol. 7, No. 2, pp. 23:1-23:24, Apr 2016 [Online]. Available: http://dx.doi.org/10.3390/info7020023.
Mark R. Heckman, Roger R. Schell, Edwards E. Reed, "A multi-level secure file sharing server and its application to a multi-level secure cloud". In Proc. MILCOM 2015, October 26 - 28, 2015, Tampa, FL.
Mark R. Heckman, Roger R. Schell, Edwards E. Reed, "Towards formal evaluation of a high-assurance guard". In Proc. 6th Layered Assurance Workshop (LAW) 2012, December 3-4, 2012, Orlando, FL., pp. 25-31. (Entire proceedings available)
Mark R. Heckman, Roger R. Schell, Edwards E. Reed, "A high-assurance, virtual guard architecture". In Proc. MILCOM 2012, October 29 - November 1, 2012, Orlando, FL.
Mark R. Heckman, Roger R. Schell, Edwards E. Reed, "Composing a high-assurance infrastructure out of TCB components". Presented at the Layered Assurance Workshop (LAW) 2011, December 2011, Orlando, FL.
R. R. Schell, T. F. Tao, and M. Heckman. “Designing the GEMSOS security kernel for security and performance”. In Proceedings of the 8th National Computer Security Conference, pages 108-119, September 1985.
Copyright 2011-2019 Mark R. Heckman. All rights reserved.
mark at mrheckman dot com