<--- Back to Details
First PageDocument Content
National security / Evaluation / Trusted computing base / Trusted system / Operating system / Protection mechanism / Multilevel security / XTS-400 / Computer security / Security / Crime prevention
Date: 2013-04-15 15:50:40
National security
Evaluation
Trusted computing base
Trusted system
Operating system
Protection mechanism
Multilevel security
XTS-400
Computer security
Security
Crime prevention

Proposed Technical Evaluation for Trusted Computer Systems

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,35 MB

Share Document on Facebook

Similar Documents

The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

rim  NRL Report 8806 :f. rr

rim NRL Report 8806 :f. rr

DocID: 1a4eo - View Document

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University  1

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

DocID: 19rum - View Document

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory  Military systems that process classified information must operate in a secure manner; tha

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

DocID: 198TO - View Document

CEE Nov12 Edn_Features.qxd

CEE Nov12 Edn_Features.qxd

DocID: 16YQT - View Document