Trusted Computer System Evaluation Criteria

Results: 82



#Item
11Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation

Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
12National security / Public safety / Evaluation / Data security / Information security / Trusted Computer System Evaluation Criteria / Common Criteria / Protection Profile / Computer security / Security / Crime prevention

White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
13National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
14Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:00
15Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
16National Security Agency / Data modeling / Decision theory / Security policy / Access control / Mandatory access control / Trusted Computer System Evaluation Criteria / EXPRESS / Security-Enhanced Linux / Computer security / Security / Policy

SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: 

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:24:30
17Ethics / Crime prevention / National security / Evaluation / Electronic commerce / Integrity / Formal verification / Trusted Computer System Evaluation Criteria / Computer security / Security / Computer network security

ARSPA 2004 Preliminary Version Believing the Integrity of a System (Invited Talk) Simon N. Foley 1,2 Department of Computer Science

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:12:34
18Crime prevention / National security / Data security / United States Agency for International Development / Information security / Trusted Computer System Evaluation Criteria / Vulnerability / Password / Access control / Security / Computer security / Public safety

Last RevisedFunctional SeriesManagement Services ChapterInformation Systems Security Table of Contents

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
19MINIX / Trusted Computer System Evaluation Criteria / Rainbow Series / Trusted computing base / Operating system / Trusted system / Discretionary access control / Andrew S. Tanenbaum / Ring / Computer architecture / Computer security / Computing

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
UPDATE