<--- Back to Details
First PageDocument Content
National security / Identity management / Data security / Password / Trusted Computer System Evaluation Criteria / One-time password / Information security / Access control / Discretionary access control / Computer security / Security / Crime prevention
Date: 2002-09-25 14:57:37
National security
Identity management
Data security
Password
Trusted Computer System Evaluation Criteria
One-time password
Information security
Access control
Discretionary access control
Computer security
Security
Crime prevention

Computer Security Richard A. Kemmerer

Add to Reading List

Source URL: www.cs.ucsb.edu

Download Document from Source Website

File Size: 153,41 KB

Share Document on Facebook

Similar Documents

Trusted Computer System Evaluation Criteria

DocID: 1vcmT - View Document

Trusted Computer System Evaluation Criteria

DocID: 1v5I6 - View Document

Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

DocID: 1qs1H - View Document

Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

DocID: 1qlIH - View Document

REFERENCES 1. DoD Computer Security Center, DoD Trusted Computer System Evaluation Criteria, CSC-STD, 15 August 1983.

DocID: 1kO0r - View Document