Trusted Computer System Evaluation Criteria

Results: 82



#Item
1Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2006-01-16 10:12:59
    2Trusted Computer System Evaluation Criteria

    Trusted Computer System Evaluation Criteria

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2006-01-16 10:12:50
      3æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

      æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:31
      4COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

      COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

      Add to Reading List

      Source URL: fm.csl.sri.com

      Language: English - Date: 2011-12-15 18:21:30
      5REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

      REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

      Add to Reading List

      Source URL: zedz.net

      Language: English - Date: 2002-12-08 10:16:42
        6White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

        White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:01:27
        7TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

        TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:26
        8Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

        Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:38
        9NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

        NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

        Add to Reading List

        Source URL: www.landwehr.org

        Language: English - Date: 2014-08-18 19:00:02