Back to Results
First PageMeta Content
Computer network security / Crime prevention / National security / Multilevel security / Information security / Mandatory access control / Trusted Computer System Evaluation Criteria / Security token / Ring / Computer security / Security / Computing


Document Date: 1998-10-28 00:00:00


Open Document

File Size: 60,35 KB

Share Result on Facebook

Company

Microsoft / /

/

Event

Product Issues / /

IndustryTerm

dedicated systems / network security protocols / authentication server / system-wide solution / secure systems / local key management server / trusted software / inbound services / establishment services / system security solution / interconnected computing systems / transportation systems / client software / security solution / web browser / network security protocol / system security services / role operating systems / accepted security solutions / flawed and malicious software / cryptographic algorithm / physically-secure dedicated systems / transport protocol / malicious software / helper applications / integrity services / allowed inbound services / personal computing systems / microkernel-based research operating systems / malicious applications / untrusted native applications / local communications / electronic commerce system / cryptographic algorithms / security services / trustworthy software / external network / untrustworthy applications / server applications / independently-developed security solutions / secure operating systems / untrustworthy software / minimal services / client applications / mobile code systems / required security services / external services / mainstream operating systems / confidentiality services / perimeter network / internal network / security solutions / /

OperatingSystem

DTOS / Solaris / Microsoft Windows / /

Organization

MIT / Department of Defense / /

Person

F. Farrell tos / Stephen D. Smalley / Patrick A. Muckelbauer / John F. Farrell / Ruth C. Taylor / /

Position

safe interpreter / Java Security Manager / General / system security policy administrator / /

Product

Windows NT / Assumption / /

ProgrammingLanguage

Java / Tcl / Postscript / /

Technology

Java system / Virtual Machine / underlying transport protocol / 4.3 Network Security Protocols The IPSEC network security protocols / network security protocol / network security protocols / secret key / operating system / application protocol / SSL / operating systems / cryptographic algorithm / cryptography / Java / ActiveX control / firewall / SSL protocol / HTTP / ActiveX / IPSEC protocols / digital signature / /

SocialTag