The following links are broken (they point to a copy of the bibliography in the wrong Google Drive... and the right copy does not have the index.html in it...)
Bell/La Padula 1973 - Secure Computer Systems: Mathematical Foundations
Bell/La Padula 1976 - Secure Computer Systems Unfied Exposition and Multics Interpretation
Schell 1979 - Computer Security the Achilles' heel of the electronic Air Force?
Gamble - Turning Multiple Evaluated Products into Trusted Systems
Saltzer/Schroeder - A Hardware Architecture for Implementing Protection Rings
Kuhn/Anderson - Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Myers - Subversion: The Neglected Aspect of Computer Security
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Saltzer/Schroeder - The Protection of Information in computer Systems
Schell - Information Security: Science, Pseudoscience, and Flying Pigs
Handbook of Applied Cryptography
Trusted DBMS Interpretation
Security Engineering
The Multics System: An Examination of Its Structure
Building a Secure Computer System
Covert channel vulnerabilities in anonymity systems
5200.28-STD ORANGE - DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
C1-TR-001 - COMPUTER VIRUSES: PREVENTION, DETECTION, AND TREATMENT
CSC-STD-001-93 - DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
CSC-STD-002-85 GREEN - DEPARTMENT OF DEFENSE PASSWORD MANAGEMENT GUIDELINE
CSC-STD-004-85 YELLOW - TECHNICAL RATIONAL BEHIND CSC-STD-003-85: COMPUTER SECURITY REQUIREMENTS
n-c-1-87 - National Telecommunications and Information Systems Security Advisory Memorandum
NCSC-TG-001-2 TAN - A Guide to Understanding Audit in Trusted Systems
NCSC-TG-002 BRIGHT BLUE - Trusted Product Security Evaluation Program
NCSC-TG-003 NEON ORANGE - Discretionary Access Control in Trusted Systems
NCSC-TG-004 TEAL GREEN - Glossary of Computer Security Terms
NCSC-TG-006 AMBER - Configuration Management in Trusted Systems
NCSC-TG-007 BURGUNDY - A Guide to Understanding Design Documentation in Trusted Systems
NCSC-TG-008 DARK LAVAENDAR - A Guide to Understanding Trusted Distribution in Trusted Systems
NCSC-TG-009 VENICE BLUE - Computer Security Subsystem Interpretation of the TCSEC
NCSC-TG-010 AQUA - A Guide to Understanding Security Modeling in Trusted Systems
NCSC-TG-011 RED - Trusted Network Interpretation Environments Guideline (TNI)
NCSC-TG-013 PINK version 2 - Rating Maintenance Phase Program
NCSC-TG-014 PURPLE - Guidelines for Formal Verification Systems
NCSC-TG-015 BROWN - Guide to Understanding Trusted Facility Management
NCSC-TG-016 YELLOW GREEN - Guidelines for Writing Trusted Facility Manuals
NCSC-TG-017 LIGHT BLUE - Identification and Authentication in Trusted Systems
NCSC-TG-019v2 BLUE - Trusted Product Evaluation Questionnaire
NCSC-TG-021 PURPLE - Trusted Database Management System Interpretation of the TCSEC (TDI)
NCSC-TG-023 BRIGHT ORANGE - Security Testing and Test Documentation in Trusted Systems
NCSC-TG-025v2 FOREST GREEN - Guide to Understanding Data Remanence in Automated Information Systems.
NCSC-TG-026 HOT PEACH - Writing the Security Features User's Guide for Trusted Systems
NCSC-TG-030 LIGHT PINK - Covert Channel Analysis of Trusted Systems
NCSC-TR-003 - TURNING MULTIPLE EVALUATED PRODUCTS INTO TRUSTED SYSTEMS
NCSC-TR-004 - A GUIDE TO PROCUREMENT OF SINGLE AND CONNECTED SYSTEMS
NCSC-TR-005-1 - Inference and Aggregation Issues In Secure Database Management Systems
NCSC-TR-005-2 - Entity and Referential Integrity Issues In Multilevel Secure Database Management
NCSC-TR-005-3 - Polyinstantiation Issues In Multilevel Secure Database Management Systems
NCSC-TR-005-4 - Auditing Issues In Secure Database Management Systems
Trusted Software Program Demonstration, Assessment, and Refinement Volume 1
Trusted Software Program Demonstration, Assessment, and Refinement Volume 2
DCID 6/3 - Protecting Sensitive Compartmented Information Within Information Systems Policy
DCID 6/3 - Protecting Sensitive Compartmented Information Within Information Systems Manual
DCID 6/3 - Protecting Sensitive Compartmented Information Within Information Systems Appendices
DCID 6/9 - Physical Security Standards for Sensitive Compartmented Information Facilities
The following is a list of algorithms with example values for each algorithm. These samples were taken from the NIST website on April 6, 2009
SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher TDES
FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm Skipjack
SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques AES
SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques TDES
FIPS 186-3 - Digital Signature Standard DSA All Domain Parameter Sizes
FIPS 186-3 - Digital Signature Standard ECDSA All Prime Curves
FIPS 186-3 - Digital Signature Standard ECDSA All Characteristic2 Curves
FIPS 180-2 - Secure Hash Standard Additional data for SHA2 algorithms (without intermediate values)
FIPS 186-2 - Digital Signature Standard, Appendices 3.1 and 3.2 and Change Notice #1
FIPS 198 - The Keyed-Hash Message Authentication Code (HMAC) All Hash Sizes
Security Requirements for Cryptographic Modules
Minimum Security Requirements for Federal Information and Information Systems
Standards for Security Categorization of Federal Information and Information Systems
The Keyed-Hash Message Authentication Code (HMAC)
Advanced Encryption Standard
Entity Authentication Using Public Key Cryptography
Guideline for The Analysis of Local Area Network Security
Guideline for the Use of Advanced Authentication Technology Alternatives
Standard Security Label for Information Transfer
Digital Signature Standard (DSS)
Escrowed Encryption Standard
Automated Password Generator
Secure Hash Standard (SHS)
Information Security Training Requirements: A Role and Performance-Based Model
Directions in Security Metrics Research
Secure Domain Name System (DNS) Deployment Guide
The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Guide to Enterprise Telework and Remote Access Security
Recommended Security Controls for Federal Information Systems and Organizations
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Security Architecture Design Process for Health Information Exchanges (HIEs)
Recommendation for EAP Methods Used in Wireless Network Access Authentication
Electronic Authentication Guideline
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography
Recommendation for Digital Signature Timeliness
Recommendation for Key Management, Part 3 Application-Specific Key Management Guidance
Guide to Industrial Control Systems (ICS) Security
National Checklist Program for IT Products--Guidelines for Checklist Users and Developers
Guide for Security Authorization of Federal Information Systems: A Security Lifecycle Approach
Security Content Automation Protocol (SCAP) Validation Program Test Requirements
Guidelines on Firewalls and Firewall Policy
The Common Configuration Scoring System (CCSS)
Managing Risk from Information Systems: An Organizational Perspective
Security Assessment Provider Requirements and Customer Responsibilities: Building a Security Assessment Credentialing Program for Federal Information Systems
An Ontology of Identity Credentials, Part I: Background and Formulation