What people are saying - Write a review
We haven't found any reviews in the usual places.
An Internet System Security Policy and Formal Model
A Computer Security Modeling Environment
14 other sections not shown
Other editions - View all
access control activity ADP RA allows analysis application approach architecture associated ASVT audit data authentication automated classification clearance communication compiler component Computer Security Computer Security Center computer system COMSEC covert channel database DBMS defined detect discretionary access control EHDM encryption environment Ethernet evaluation example execution expert system Figure formal formal verification functions hardware host implementation integrity interface JDSSC label language layer mandatory access control mechanism MIDAS military message module Multilevel Secure National Computer Security node object operating system problem processor proof protection protocol query requirements risk SDVS Secret security class security kernel security model security policy sensitivity level servers specification standard SunOS TCSEC tion Trojan horse Trusted Computer trusted system Unisys user's verification systems workstation