As part of my work with the OSET Institute we submitted were asked to comment on Voting Equipment Security and Security Best Practices in the State of California to the Little Hoover Government Commission. July 26, 2018 Here is a link to our submission.

Much of my professional life I was engaged in information, network, and system security research and development, standards work, and consulting. My refereed publications list (and a few others) for that period is:

  • “Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies” Deborah Shands, Richard Yee, Jay Jacobs, E. John Sebes Proceedings of Network and Distributed System Security Symposium (NDSS 2000), San Diego, California, February 2000.
  • “Scalable Access Control for Distributed Object Systems” Daniel F. Sterne, E. John Sebes, et. al. Proceedings of the 8th USENIX Security Symposium Washington, D.C., USA, August 23-26, 1999
  • “CORBA and Firewalls: Rationale and Specification” Third Workshop on Distributed Object Computing Security, July 1999.
  • “Security for the Emerging Object Web” TISC Security Conference, 1999.
  • “Multi-Protocol Authentication Gateway for CORBA over the Internet”, Michelle Abram, John Sebes, Deborah Shands, Second Workshop on Distributed Object Computing Security, May 1998.
  • “Advanced Security Proxies” E. John Sebes, Steve Schwab, 1998 IEEE Symposium on Security and Privacy May 4-6, 1998, Oakland, California
  • “Joint Revised Submission: CORBA/Firewall Security” BEA Systems, Inc., Borland International, Inc., Expersoft Corporation, FUJITSU LIMITED, International Business Machines Corporation, IONA Technologies PLC, NEC Corporation, Netscape Communications Corporation, Oracle Corporation, Sun Microsystems, Inc., Object Management Group, May 18, 1998.
  • “Sigma: Security for Distributed Object Interoperability between Trusted and Untrusted Systems” John Sebes, T.C. Vickers-Benzel, Proceedings of IEEE Information Survivability Conference, 1999.
  • “A Scalable Approach to Access Control in Distributed Object Systems”, G. Tally, D. Sterne, D. McDonnell, D. Sherman, D. Sames, P. Pasturel, J. Sebes, Advanced Security Research Journal, 1998.
  • “Architecture and Design for Secure Virtual Enclaves” T. Benzel, J. Sebes, R. Yee, Advanced Security Research Journal, 1998.
  • “Collaborative Computing, Virtual Enterprises, and Component Software” John Sebes, T.C. Vickers-Benzel, Workshop on Compositional Software Architectures, December 1997.
  • “Security and Interoperability for Heterogeneous Distributed Systems” E. John Sebes NSA/OMG Security Workshop 1997.
  • The Triad System: The Design of a Distributed, Real-Time, Trusted System, E. Sebes, P. Pasturel, T. Vickers Benzel, D. Hollingworth, E. Cohen, P. Wang, Trusted Information Systems, Inc.; M. Barnett, D. Gallon, R. Zacjew, Locus Computing Corporation, 11th Annual Computer Security Applications Conference December 11-15, 1995,
  • “Identification of Subjects and Objects in a Trusted Extensible Client Server Architecture,” Terry C. Vickers Benzel, E. John Sebes, Homayoon Tajalli, Proceedings of the 18th National Information Systems Security Conference, Baltimore, MD, Oct. 10- 13, 1995
  • “The Architecture of Triad, a Trusted Distributed Real-Time System” by John Sebes, et. al. Proceedings of the National Computer Security Conference, Baltimore, Maryland, October 1994.
  • “Modularity of Assembly Language Implementation of Trusted Systems,” John Sebes, T.C. Vickers-Benzel, Proceedings of the National Computer Security Conference, Baltimore, Maryland, September 1993.
  • “Distributed Trusted Mach Architecture,” John Sebes, et. al. Proceedings of the Usenix Mach Symposium, Monterey, California, November 1991.
  • “Trusted Distributed Computing: Using Untrusted Network Software,” John Sebes, R.J. Feiertag, Proceedings of the 14th National Computer Security Conference, Washington, D.C., October 1991.
  • “Implicit Discretionary Access Propagation: A New Interpretation of DAC,” R.J. Feiertag, John Sebes, Proceedings of the Computer Security Foundations Workshop IV, Franconia, New Hampshire, June 1991.
  • “Distributed Trusted Mach Concept Exploration,” R.J. Feiertag, John Sebes, USAF Rome Laboratories RL-TR-91-246, September 1991.
  • “The SDOS System: A Secure Distributed Operating System Prototype,” R. Wong, M. Chacko, E. Ding, B. Kahn, N. Proctor, John Sebes, R. Varadarajan, 12th National Computer Security Conference, Baltimore, Maryland, October 1989.
  • “Comparing UNIX shells” John Sebes., UNIX Papers for UNIX Developers and Power Users , Mitchell Waite, editor. Howard W. Sams & Co. / MacMillan, 1987.