First Page | Document Content | |
---|---|---|
![]() Date: 2009-02-19 00:00:00Role-based access control National Security Agency Data security Discretionary access control Mandatory access control Trusted Computer System Evaluation Criteria Multilevel security PERMIS Separation of duties Computer security Security Access control | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 60,15 KBShare Document on Facebook |
![]() | Trusted Computer System Evaluation CriteriaDocID: 1vcmT - View Document |
![]() | Trusted Computer System Evaluation CriteriaDocID: 1v5I6 - View Document |
![]() | æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>DocID: 1qs1H - View Document |
![]() | COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. SchellDocID: 1qlIH - View Document |
![]() | REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.DocID: 1kO0r - View Document |