<--- Back to Details
First PageDocument Content
Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria
Date: 2014-05-07 00:20:20
Trusted computing
Security
Rainbow Series
Multilevel security
Mandatory access control
Evaluation
Trusted system
Discretionary access control
Reference monitor
Computer security
National Security Agency
Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Download Document from Source Website

File Size: 422,56 KB

Share Document on Facebook

Similar Documents

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

DocID: 1qCHd - View Document

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

DocID: 1qe75 - View Document

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011  Abstract

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

DocID: 1pV0t - View Document

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

DocID: 1pekr - View Document

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

DocID: 1lfak - View Document