Trusted Computer System Evaluation Criteria

Results: 82



#Item
1

Trusted Computer System Evaluation Criteria

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2006-01-16 10:12:59
    2

    Trusted Computer System Evaluation Criteria

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2006-01-16 10:12:50
      3Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

      æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:31
      4Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

      COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:30
      5

      REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

      Add to Reading List

      Source URL: zedz.net

      Language: English - Date: 2002-12-08 10:16:42
        6National security / Public safety / Evaluation / Data security / Information security / Trusted Computer System Evaluation Criteria / Common Criteria / Protection Profile / Computer security / Security / Crime prevention

        White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:01:27
        7Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing base / Vulnerability / Information security / Trusted system / Common Criteria / Software security assurance / Computer security / Security / Data security

        TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:26
        8National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention

        Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:38
        9Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

        NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:02
        UPDATE