First Page | Document Content | |
---|---|---|
Date: 2012-01-04 11:57:17National security National Security Agency Trusted Computer System Evaluation Criteria Trusted computing Mandatory access control Trusted computing base Clark–Wilson model Ring Capability-based security Computer security Security Crime prevention | DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]andAdd to Reading ListSource URL: www.nsa.govDownload Document from Source WebsiteFile Size: 661,45 KBShare Document on Facebook |