First Page | Document Content | |
---|---|---|
Date: 2007-04-07 00:40:38National Security Agency Trusted computing Trusted computing base Trusted Computer System Evaluation Criteria Operating system Mandatory access control Kernel Ring Device driver Computer security Computer architecture Computing | The Army Secure Operating System Neil A. Waldhart TRW Systems Integration GroupAdd to Reading ListSource URL: www.cs.washington.eduDownload Document from Source WebsiteFile Size: 949,07 KBShare Document on Facebook |
Trusted Computer System Evaluation CriteriaDocID: 1vcmT - View Document | |
Trusted Computer System Evaluation CriteriaDocID: 1v5I6 - View Document | |
æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>DocID: 1qs1H - View Document | |
COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. SchellDocID: 1qlIH - View Document | |
REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.DocID: 1kO0r - View Document |