Back to Results
First PageMeta Content
National security / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Mandatory access control / Trusted computing base / Clark–Wilson model / Ring / Capability-based security / Computer security / Security / Crime prevention


DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]and
Add to Reading List

Document Date: 2012-01-04 11:57:17


Open Document

File Size: 661,45 KB

Share Result on Facebook

City

Monterey / Washington / D.C. / Cambridge / /

Company

Computer Society Press / A2 / /

Currency

STD / /

Facility

Fort George G. Meade / Harvard University / /

IndustryTerm

software failures / software features / achievable technology / configuration management / software device / potential hardware / multilevel devices / software mechanisms / security-relevant hardware / requisite theoretical solutions / sufficient hardware / above systems / software architecture / /

Organization

DOD Computer Security Center / Harvard University / National Computer Security Center / Department of Defense Computer Security Center / Department of Defense Trusted Computer System Evaluation Criteria / Department of Defense / Naval Postgraduate School / D~partment ofD~f~nH Trust / U.S. Department of Defense / /

Person

David R. Wilson / Fred Cohen / GEORGE F.JELEN / Ai / David D. Clark / Philip A. Myers / /

Position

system administrator / Model / administrator / /

ProvinceOrState

Maryland / California / /

Technology

encryption / cryptography / artificial intelligence / /

SocialTag