<--- Back to Details
First PageDocument Content
Trusted Computer System Evaluation Criteria / Trusted computing / ITSEC / Trusted computing base / Common Criteria / Computer security / Security / National Security Agency
Date: 2013-03-12 10:46:51
Trusted Computer System Evaluation Criteria
Trusted computing
ITSEC
Trusted computing base
Common Criteria
Computer security
Security
National Security Agency

RELATING FUNCTIONALITY CLASS AND SECURITY SUB-PROFILE SPECIFICATIONS ABSTRACT

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 90,18 KB

Share Document on Facebook

Similar Documents

Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

DocID: 1r81S - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

DocID: 1quF6 - View Document

Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document