1![Trusted Computer System Evaluation Criteria Trusted Computer System Evaluation Criteria](https://www.pdfsearch.io/img/dadb0b6478b5328334a090667cd820d9.jpg) | Add to Reading ListSource URL: seclab.cs.ucdavis.eduLanguage: English - Date: 2006-01-16 10:12:59
|
---|
2![Trusted Computer System Evaluation Criteria Trusted Computer System Evaluation Criteria](https://www.pdfsearch.io/img/fd63953810adf1642b5e753b1fc910c8.jpg) | Add to Reading ListSource URL: seclab.cs.ucdavis.eduLanguage: English - Date: 2006-01-16 10:12:50
|
---|
3![æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <> æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>](https://www.pdfsearch.io/img/c6ef6fe070b01527e945fd5330bd3994.jpg) | Add to Reading ListSource URL: fm.csl.sri.comLanguage: English - Date: 2011-12-15 18:21:31
|
---|
4![COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell](https://www.pdfsearch.io/img/6ac707fc235137314be4a5f8b9c1f11d.jpg) | Add to Reading ListSource URL: fm.csl.sri.comLanguage: English - Date: 2011-12-15 18:21:30
|
---|
5![REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983. REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.](https://www.pdfsearch.io/img/6514c50da09d66edab8032fdd9c1b4b4.jpg) | Add to Reading ListSource URL: zedz.netLanguage: English - Date: 2002-12-08 10:16:42
|
---|
6![White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste](https://www.pdfsearch.io/img/4537b99628fbc3a1283cbec1f3f67bc0.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:01:27
|
---|
7![TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337 TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337](https://www.pdfsearch.io/img/0faae60e95a23f7484af4944edf4d139.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:00:26
|
---|
8![Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc](https://www.pdfsearch.io/img/8984aded4f33f548aac3cc77c2cd9996.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:00:38
|
---|
9![NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR](https://www.pdfsearch.io/img/d86b8ed2a8f168493489c38941c8c511.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:00:02
|
---|