<--- Back to Details
First PageDocument Content
Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation
Date: 2014-08-18 19:01:35
Crime prevention
National security
Common Criteria
Trusted Computer System Evaluation Criteria
Information security
Trusted computing base
Operating system
National Security Agency
Multilevel security
Computer security
Security
Evaluation

Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Download Document from Source Website

File Size: 144,14 KB

Share Document on Facebook

Similar Documents

Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria

DocID: 1vcmT - View Document

Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria

DocID: 1v5I6 - View Document

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

DocID: 1kO0r - View Document