<--- Back to Details
First PageDocument Content
CTCPEC / Protection Profile / Security Target / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / Labeled Security Protection Profile / Computer security / Evaluation / ITSEC
Date: 2013-03-11 15:42:29
CTCPEC
Protection Profile
Security Target
Trusted Computer System Evaluation Criteria
Trusted computing base
Common Criteria
Labeled Security Protection Profile
Computer security
Evaluation
ITSEC

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 218,04 KB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Mathematics / Boolean algebra / Complexity classes / Metalogic / Model theory / True quantified Boolean formula / Satisfiability / FO / PSPACE-complete / Well-formed formula

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

Design of experiments / Causal inference / Evaluation / Observational study / Methodology / Knowledge / Impact assessment / Confounding / Experiment / Quasi-experiment / Program evaluation / Impact evaluation

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

Education / Learning / Educational psychology / Course evaluation / Formative assessment / Educational assessment / Peer feedback / Educational technology / Active learning / Classroom Assessment Techniques

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document