(meme) Three and Three Meme – Answer #2

Snarfed from rialtus. Make a comment in this entry. I’ll go to your profile, pick 3 userpics and interests, and then you explain them in your journal.

Which I did in his journal, and here’s my answer:

Gaming. This image was snarfed and adapted from BoardGameGeek, and is an image from the wonderful game Ticket to Ride. It’s a great introduction to modern German gaming. Come over one day and I’ll teach it to you.
Soapbox. My soapbox or ranting userpic. I adapted this from somewhere. Isn’t it a great image for when you’re in a ranting mood?
Tortuga Huevos. This was adapted from an image on this page, translated here. It is from a campaign to prevent the slaughter of the Marine Turtle by folks who believe that eating the eggs of said turtle provides viagra-like effects. As this image says, some don’t need such eggs. I use the image for slightly-racy posts.

And, for the interests…

bell-lapadula. This refers to the classic paper by David Bell (a really neat fellow) and Len LaPadula about the policy for multilevel security. It defined the basic lattice model for confidentiality of labels, as well as the simple security property and the *-property. A fundamental of computer security.

shep cooke. Shep Cooke is a folk singer who sang many years ago with Linda Ronstadt and the Stone Poneys. A biography states:

As a member of the legendary “Stone Poneys,” Shep Cooke performed with Linda Ronstadt for several years – from high school days thru network appearances on Joey Bishop and Johnny Carson (he played bass). Shep has done guitar and vocal work on major album releases by Tom Waits, the Floating House Band and Linda Ronstadt, as well as featured solo act appearances in concerts with Roger Miller, Marty Robbins, Tanya Tucker, Tom Waits, John David Souther and others.

I saw Shep many many years ago at McCabes, and I still love his albums. He hasn’t done anything in years.

orange book. The “Orange Book”, better known as the Trusted Computer System Evaluation Criteria (TCSEC) (get a copy) was based on the bell-lapadula model mentioned above. The TCSEC defines hierachical security digraphs. These were integrated into an evaluation paradigm that I was proud to be a part of. I was one of the architects on BLACKER, one of the first A1 network systems, and served as an evaluation from 1988 until the program turned into CCEVS (Common Criteria Evaluations), for which I still serve as an evaluator. I was a member of the TCSEC Interpretations Body, and still perform a similar function for CCEVS.