Trusted Information Systems

Results: 75



#Item
11Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
12Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
13Security / Network security / Firewall / Trusted Information Systems / Proxy server / Copyright / Distributed firewall / Application firewall / Computer network security / Computing / Computer security

Trusted Information Systems Internet Firewall Toolkit An Overview 1 ©Copyright Trusted Information Systems 1993, All rights reserved

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:18
14Money / Banking in Canada / Interac / Accounting software / Accountancy / Bookkeeping / Accounts payable / Business / Finance / Payment systems

Public Accounting System We understand that an accounting system is really all about: Better Decision Making As a trusted advisor, you must be able to provide your clients with the information that may be important to ma

Add to Reading List

Source URL: www.intersoftsystems.com

Language: English - Date: 2015-04-15 18:55:49
15Crime prevention / National security / Data security / United States Agency for International Development / Information security / Trusted Computer System Evaluation Criteria / Vulnerability / Password / Access control / Security / Computer security / Public safety

Last RevisedFunctional SeriesManagement Services ChapterInformation Systems Security Table of Contents

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
16Internet standards / Request for Comments / Standards organizations / Task forces / Internet Architecture Board / Internet Engineering Task Force / Internet Engineering Steering Group / Internet Society / Internet Draft / Internet / Internet governance / Computing

Network Working Group Request for Comments: 1396 S. Crocker Trusted Information Systems, Inc. January 1993

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:56
17Aspect-oriented programming / Crime prevention / National security / Computer security / Aspect-oriented software development / Spring Framework / Information security / Vulnerability / InterTrust Technologies / Software development / Security / Computing

2nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-04-01 03:12:26
18Database management systems / Data warehousing / Business intelligence / Database theory / Extract /  transform /  load / Data warehouse / Big data / Apache Hadoop / Data center / Computing / Data management / Information technology management

IBM Software Delivering trusted information for the modern data warehouse Make information integration and governance a best practice in the big data era

Add to Reading List

Source URL: www.dotgroup.co.uk

Language: English - Date: 2014-11-25 16:29:49
19Database management systems / Relational database management systems / Business intelligence / Data warehousing / Record linkage / Master data management / Data quality / DBase / Database / Data management / Software / Information

With over 20 years’ experience in CRM and other data quality projects, DQ Global developed Match™ so you can trust your Customer and Contact data assets. Trusted by over 500 organisations worldwide, Match™ ensures

Add to Reading List

Source URL: www.dqglobal.com

Language: English - Date: 2014-01-31 04:36:09
20Crime prevention / National security / Evaluation / Trusted Computer System Evaluation Criteria / Mandatory access control / ITSEC / Common Criteria / CTCPEC / Information security / Computer security / Security / Data security

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00
UPDATE