<--- Back to Details
First PageDocument Content
Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria
Date: 2014-05-07 00:20:20
Trusted computing
Security
Rainbow Series
Multilevel security
Mandatory access control
Evaluation
Trusted system
Discretionary access control
Reference monitor
Computer security
National Security Agency
Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Download Document from Source Website

File Size: 422,56 KB

Share Document on Facebook

Similar Documents

Technical Reference - Q&A TSD-QA89Q: How could I enable 3D feature on Asrock Vision 3D and ION3D system? A: Different monitor/TV/content/playback software may have different settings.

DocID: 1v8RL - View Document

New UVC Class SuperSpeed USB Bridge Demo F-HD@60 fps *Camera and TV monitor images shown for reference only and are not indicative of the actual hardware used in demo design.

DocID: 1uCEm - View Document

Fortresses Built Upon Sand Dixie B. Baker, Ph.D. Science Applications International Corporation The current “trusted system” paradigm is built upon the notion of a Reference Monitor that assumes the existence of a we

DocID: 1tsJ5 - View Document

ARMS TRADE TREATY Terms of Reference CARICOM Arms Trade Treaty Monitor 1

DocID: 1rKTo - View Document

Concurrency control / Linearizability / Non-blocking algorithm / Hazard pointer / Compare-and-swap / Lock / Monitor / Reference counting / Mutual exclusion / File locking / Concurrent data structure / Standard Template Library

Lock-free Dynamically Resizable Arrays Damian Dechev, Peter Pirkelbauer, and Bjarne Stroustrup Texas A&M University College Station, TX {dechev, peter.pirkelbauer}@tamu.edu,

DocID: 1p8Ow - View Document