<--- Back to Details
First PageDocument Content
Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control
Date: 2009-02-19 00:00:00
Role-based access control
National Security Agency
Data security
Discretionary access control
Mandatory access control
Trusted Computer System Evaluation Criteria
Multilevel security
PERMIS
Separation of duties
Computer security
Security
Access control

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 60,15 KB

Share Document on Facebook

Similar Documents

Trusted Computer System Evaluation Criteria

DocID: 1vcmT - View Document

Trusted Computer System Evaluation Criteria

DocID: 1v5I6 - View Document

Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

DocID: 1kO0r - View Document