<--- Back to Details
First PageDocument Content
National security / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Mandatory access control / Trusted computing base / Clark–Wilson model / Ring / Capability-based security / Computer security / Security / Crime prevention
Date: 2012-01-04 11:57:17
National security
National Security Agency
Trusted Computer System Evaluation Criteria
Trusted computing
Mandatory access control
Trusted computing base
Clark–Wilson model
Ring
Capability-based security
Computer security
Security
Crime prevention

DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]and

Add to Reading List

Source URL: www.nsa.gov

Download Document from Source Website

File Size: 661,45 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

DocID: 1vdXi - View Document

High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center

DocID: 1uEep - View Document

Thoughts about Trusted Computing Joanna Rutkowska Confidence, Krakow, Poland, May 15-16, 2009 EuSecWest, London, UK, May 27-28, 2009

DocID: 1t8NU - View Document

Trusted Computing Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

DocID: 1t0LN - View Document