DescriptionTrusted Computer System Evaluation Criteria DOD 5200.28-STD.pdf English: The Trusted Computer System Evaluation Criteria (TCSEC), also known...
DescriptionTrusted Computer System Evaluation Criteria CSC-STD-001-83.pdf English: The Trusted Computer System Evaluation Criteria (TCSEC), also known...
Computer Security Conference - A Report on the 10th National Computer Security Conference, Baltimore, Md, September 21-24, 1987 ( ) Author Isaac, I...
draft Type SSAA for Certification and Accreditation of the NP. Subjects: Computer security; United States Language English Publication date March 2003 Current...
Thesis advisor, William J. Haga AD-A257 327 Thesis (M.S. in Information Systems) Naval Postgraduate School, Sept. 1992 Bibliography: p. 70-71 Subjects:...
preliminary development evaluation ( ) Author Flahavin, Ellen Colvin Title The TMACH experiment phase 1 - preliminary development evaluation Volume NISTIR 5810...
Source Internet Archive identifier: applyingbusiness109454510 https://archive.org/download/applyingbusiness109454510/applyingbusiness109454510.pdf...
https://archive.org/download/annalysisofutoma109452039/annalysisofutoma109452039.pdf Permission (Reusing this file) Approved for public release, distribution...
information systems to enforce computer security policies ( ) Author Graham, Scott W.;Mills, Stephen E. Title Monitoring information systems to enforce...
such mechanism is called a Trusted Path. A Trusted Path provides a protected communications channel that permits the computer to authenticate itself to...