First Page | Document Content | |
---|---|---|
![]() Date: 2009-10-08 10:40:04National security Evaluation Access control Trusted Computer System Evaluation Criteria Common Criteria Information security Discretionary access control Protection Profile Trusted computing base Computer security Security Crime prevention | Source URL: www.niap-ccevs.orgDownload Document from Source WebsiteFile Size: 388,86 KBShare Document on Facebook |