Trusted Computer System Evaluation Criteria

Results: 82



#Item
61Crime prevention / National security / Multilevel security / Mandatory access control / Trusted Computer System Evaluation Criteria / Information security / Security token / Access control / Kerberos / Computer security / Security / Computer network security

The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-01-14 18:20:50
62Steganography / Computer network security / NSD / Trusted Computer System Evaluation Criteria / Multilevel security / Bell–LaPadula model / Network security / Mediation / Overt channel / Computer security / Security / Covert channel

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
63Trusted Execution Technology / Trusted computing base / Trusted Computer System Evaluation Criteria / TCB / Microkernel / Operating system / Secure environment / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

Dynamic Root of Trust in Trusted Computing Cong Nie Helsinki University of Technology

Add to Reading List

Source URL: www.tml.tkk.fi

Language: English - Date: 2008-01-03 05:01:33
64National security / Identity management / Data security / Password / Trusted Computer System Evaluation Criteria / One-time password / Information security / Access control / Discretionary access control / Computer security / Security / Crime prevention

Computer Security Richard A. Kemmerer

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2002-09-25 14:57:37
65Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
66Virtual machines / Hypervisor / Bell–LaPadula model / Hyper-V / VM / Xen / Biba Model / Trusted Computer System Evaluation Criteria / Covert channel / System software / Computing / Software

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
67McAfee / Evaluation / FreeBSD / Trusted system / Common Criteria / Trusted operating system / Robert Watson / GEOM / Access control / Computer security / Security / Computing

[removed]TrustedBSD: Trusted Operating

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-12-09 06:53:06
68System administration / Unix / HP-UX / System V / Identity management / Password / Trusted Computer System Evaluation Criteria / Operating system / Access control / Computer security / Software / System software

HP-UX 11 Security Overview1 This document describes the security-related features and benefits of the HP-UX core operating system.

Add to Reading List

Source URL: www.nasi.com

Language: English - Date: 2011-01-13 18:21:32
69XTS-400 / Evaluation Assurance Level / Trusted Computer System Evaluation Criteria / Common Criteria / Mandatory access control / BAE Systems / Security Target / Operating system / Access control / Computer security / Evaluation / Security

Security Target, Version 1.22 for

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
70National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
UPDATE