<--- Back to Details
First PageDocument Content
National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention
Date: 2014-08-18 19:00:38
National security
National Security Agency
Mandatory access control
Multilevel security
Access Control Matrix
Information security
Trusted Computer System Evaluation Criteria
Access control
Trusted computing base
Computer security
Security
Crime prevention

Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Add to Reading List

Source URL: www.landwehr.org

Download Document from Source Website

File Size: 158,03 KB

Share Document on Facebook

Similar Documents

Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

DocID: 1r81S - View Document

Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

DocID: 1quF6 - View Document

Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document