<--- Back to Details
First PageDocument Content
National Security Agency / Trusted computing / Trusted computing base / Trusted Computer System Evaluation Criteria / Operating system / Mandatory access control / Kernel / Ring / Device driver / Computer security / Computer architecture / Computing
Date: 2007-04-07 00:40:38
National Security Agency
Trusted computing
Trusted computing base
Trusted Computer System Evaluation Criteria
Operating system
Mandatory access control
Kernel
Ring
Device driver
Computer security
Computer architecture
Computing

The Army Secure Operating System Neil A. Waldhart TRW Systems Integration Group

Add to Reading List

Source URL: www.cs.washington.edu

Download Document from Source Website

File Size: 949,07 KB

Share Document on Facebook

Similar Documents

Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria

DocID: 1vcmT - View Document

Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria

DocID: 1v5I6 - View Document

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

DocID: 1kO0r - View Document