<--- Back to Details
First PageDocument Content
National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention
Date: 2010-09-02 21:29:55
National security
Evaluation
Access control
Trusted Computer System Evaluation Criteria
Common Criteria
Information security
Discretionary access control
Protection Profile
Trusted computing base
Computer security
Security
Crime prevention

CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

Add to Reading List

Source URL: www.commoncriteriaportal.org

Download Document from Source Website

File Size: 369,45 KB

Share Document on Facebook

Similar Documents

Smartcard IC Platform Protection Profile Version 1.0 Julydeveloped by

DocID: 1uLi4 - View Document

DP-1 Profile of General Population and Housing Characteristics: Demographic Profile Data NOTE: For more information on confidentiality protection, nonsampling error, and definitions, see http://www.census.gov

DocID: 1uE3f - View Document

DP-1 Profile of General Population and Housing Characteristics: Demographic Profile Data NOTE: For more information on confidentiality protection, nonsampling error, and definitions, see http://www.census.gov

DocID: 1uE1R - View Document

C A S E S T UDY Wunderlich invests in ransomware protection Malwarebytes helps proactively protect company and customer data Business profile

DocID: 1uA57 - View Document

Legal Protection by Design in the Smart Grid Privacy, data protection & profile transparency Prof. mr. dr. Mireille Hildebrandt of Radboud University Nijmegen

DocID: 1uvvX - View Document