<--- Back to Details
First PageDocument Content
United States government secrecy / Data security / Sensitive Security Information / Sensitive but unclassified / Freedom of Information Act / Classified information / Information sensitivity / Security awareness / Vulnerability / Security / National security / Computer security
Date: 2014-05-06 23:09:11
United States government secrecy
Data security
Sensitive Security Information
Sensitive but unclassified
Freedom of Information Act
Classified information
Information sensitivity
Security awareness
Vulnerability
Security
National security
Computer security

Control and Protection of "Sensitive Security Information"

Add to Reading List

Source URL: fas.org

Download Document from Source Website

File Size: 97,18 KB

Share Document on Facebook

Similar Documents

Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

DocID: 1vhH7 - View Document

Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

DocID: 1uWKs - View Document

Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

DocID: 1udHt - View Document

2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

DocID: 1tPax - View Document

Protect, encrypt or delete sensitive personal information and contacts on your filming device in case it’s confiscated. Complete a security assessment to protect yourself and those you are filming.

DocID: 1t6vE - View Document