A Guide to Procurement of Trusted Systems, Volume 3
DIANE Publishing, 1993 - Computer security - 124 pages
A guideline to help facilitate the acquisition of trusted computer systems in accordance with DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria." Also includes information being developed for certification and accreditation guidance. Addresses the regulations and standards to be satisfied in providing a secure system. Tables.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control acronyms ADDRESSEES APPROVAL DATE Arabic numerals Block 16 Class 82 collection of information Computer Security Center Computer System Evaluation configuration management consecutively using Arabic Contract Data Requirements contractor Covert Channel Analysis Data Item Description Data Requirements List DD Form Defense Trusted Computer deleted Department of Defense describe design documentation Design Specification Discretionary Access Control documentation requirements DTLS equivalent systems firmware Formal Security Policy FTLS GOVERNMENT COMMENTS 45 guideline hardware implementation Informal Security Policy Jefferson Davis Highway Level Specification mandatory access control National Computer Security NUMBER operational Philosophy of Protection Policy Model document PREPARATION INSTRUCTIONS Continued product or equivalent protection mechanism(s Protection Report sample CDRLs security documentation Security Features Security Policy Model Security Test Plan SFUG subsections 10.3 System Evaluation Criteria TCB Class TCB Verification Report TCSEC Class A1 Test Procedures test/inspection report Trusted Computer System Trusted Computing Base Trusted Facility Manual Version-1