First Page | Document Content | |
---|---|---|
![]() Date: 2013-04-15 15:50:40National security Evaluation Trusted computing base Trusted system Operating system Protection mechanism Multilevel security XTS-400 Computer security Security Crime prevention | Add to Reading List |
![]() | The Case for Abstracting Security PoliciesDocID: 1qQWS - View Document |
![]() | rim NRL Report 8806 :f. rrDocID: 1a4eo - View Document |
![]() | FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1DocID: 19rum - View Document |
![]() | A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; thaDocID: 198TO - View Document |
![]() | CEE Nov12 Edn_Features.qxdDocID: 16YQT - View Document |