First Page | Meta Content | |
---|---|---|
Document Date: 2005-11-21 16:32:53Open Document File Size: 218,73 KBShare Result on FacebookCityNew Orleans / /CompanyIBM / Hewlett Packard / Unisys / The MITRE Corporation / Secure Computer Systems / Boeing / TDI / /EventFDA Phase / /FacilityComputer Security Center / Case Western Reserve University / /HolidayEaster / /IndustryTermcomputer operating systems / higher security products / secure systems / technology artifacts / actual computer systems / communications lines / verification tools / technology shift / exemplar systems / homogeneous networks / heterogenous networks / technology movement / candidate systems / isolated networks / multilevel secure networks / contemporary systems / multilevel networking equipment / automatic verification systems / database management systems / periods processing / “trusted network / homogeneous network / dedicated equipment / software validation / descriptive machinery / ad hoc heterogeneous network / conceptual tools / heterogeneous networks / computing / closed-form solution / cross-product / particular network / connected secure systems / immediate solutions / /OperatingSystemUnix / XTS / VMS / Multics / Solaris / Windows NT / Xenix / PSOS / /OrganizationU.S. Air Force / Case Western Reserve University / National Computer Security Center / Bureau of Standards Computer Security Conference / Department of Defense Computer Security Evaluation Center / Air Force / Department of Defense / office of the Secretary / /PersonDavid Clark / Lee Schiller / Elliott Organick / David Wilson / Ken Thompson / Bell-La Padula / Steve Walker / /Positiongeneral / conceptual way / spy / good representative / scheduler / /ProductA1 / /TechnologyVirtual Machine / LAN / Unix / operating system / operating systems / PSOS / /SocialTag |