








Reports
​
Using a Trust Model to Assess Privacy, presentation slides in Proceedings of the Inaugural National Institute on Computing and the Law, American Bar Association, Chicago IL, 2007.
(with K. A. Metivier Carreiro), Computer Technology to Balance Accountability and Anonymity in Self-regulatory Privacy Regimes, Report CPI-1997-01, Cyberspace Policy Institute, George Washington University, February 1997.
(with I. Auston, B. Humphreys, P. Clayton, I. Kohane, and Z. Geisslerova) Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information, Report CBM 95-10 of National Library of Medicine, 1996.
Balanced Key Escrow, Report GWU-ICTSP-95-04, Institute for Computer and Telecommunications Systems Policy, The George Washington University, Washington, D. C., August 1995.
(with J. A. Fitch) A General Representation of Security and Integrity Cascade Problems in Networks, Report GWU‑IIST‑92‑06, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., February 1992.
Congressional Testimony on the Computer Security Act of 1987 and on Computer Viruses: Two Recent Statements, Report GWU‑IIST‑90‑11, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., March 1990.
(with Russell Davis) An Application of Parallelism and Pipelining in Computer Security, Report GWU‑IIST‑89-28, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., November 1989.
A Prototype Implementation of a General Risk Model, presented at the NBS/NCSC Invitational Workshop on Risk Management Models, May 24-26, 1988, Denver, Colorado
Making Every Vote Count: Security and Reliability of Computerized Vote-Counting Systems, Report GWU‑IIST‑87‑17, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., December 1987.
Smoking Out the Bad Actors: Risk Analysis in the Age of the Microcomputer, Report GWU‑IIST‑87‑16, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., October 1987.
(with W. Neugent, J. Gilligan, and Z. Ruthberg) Technology Assessment: Methods for Measuring the Level of Computer Security, National Bureau of Standards Special Pub 500‑133, October 1985.
Automated Risk Analysis Packages for Computer Security, Report GWU‑IIST‑85‑13, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., August 1985.
(with A. F. Westin) Privacy and Security Issues in the Use of Personal Information About Clients and Customers on Micro and Personal Computers used in Office Automation, U. S. Congress, Office of Technology Assessment, December 1984.
(with P. Woodard and R. Belair) Audit Manual for Criminal History Records Systems, Search Group, Inc., December 1982.
(with E. J. Novotny) Transborder Data Flows: The Emerging Issues, Report GWU‑IIST‑82‑02, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., 1982.
(with T. J. Nagy) Exploratory Evaluation of the Accuracy of Linguistic vs. Numeric Risk Assessment of Computer Security, Report GWU‑IIST‑81‑08, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., May 1981.
(with J. J. Cary) A Modular Method for Measuring Overhead Costs, Report GWU‑EECS‑79‑06, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D.C., December 4, 1979.
The Application of Networking to Basic Computer and Information Science Research (Editor), May 1978.
(with E. H. Michelman and D. Clements) SECURATE User's Manual, Memorandum No. UCB/ERL M77/49, Electronics Research Laboratory, University of California, Berkeley, July 1977.
Security Ratings for Computer Systems, Memorandum ERL‑M444, Electronics Research Laboratory, University of California, Berkeley, May 1974.
The Engineering of Access Control Mechanisms in Physics Data Bases, Stanford Linear Accelerator Center Report 118, July 1970.
(with D. Wortman) Steps Toward A Formalism for the Formulary Model, Stanford Linear Accelerator Center Computation Group, CGTM 83, December 1969.
Incremental Cost of Encoding Data in a Tape‑Based Information Storage and Retrieval System, or It's Dirt Cheap to Scramble Your Data!, Stanford Linear Accelerator Center Computation Group, CGTM 76, September 1969.
Social Data vs. Individual Privacy: Computers, Privacy, and the National Data Center, Stanford Linear Accelerator Center Computation Group, CGTM 74, August 1969.
The Importance of Access Mechanisms in Large Data Bases, Stanford Linear Accelerator Center Computation Group, CGTM 72, July 1969.
(with J. George) A Comparison of Manual and Computer‑Based Text Editing, Stanford Linear Accelerator Center Computation Group, CGTM 69, April 1969.
OLS360: An On‑Line Information Retrieval System for System/360, Stanford Linear Accelerator Center Graphics Studies Group, CGTM 42, June 1967.
D. Films
Three videotapes collectively entitled Techniques for Security and Privacy in Computer Systems, produced in 1977 in conjunction with the University of California College of Engineering, Extension Media Center, and Educational Television Office:
a) Authentication Methods in Computer Systems
b) Authorization and Logging in Computer Systems
c) Modern Encryption Techniques