What people are saying - Write a review
We haven't found any reviews in the usual places.
Computer Security Framework
Models of Secure Systems
Operating System Security
7 other sections not shown
Other editions - View all
access control list AFIPS Press agency algorithm application audit authentication authorized bits block capability certification cipher ciphertext communication complete compromise computer networks computer security computer system Conf context cryptanalyst cryptographic cryptographic system cryptosystems data base Data Encryption Standard data processing database deciphering decryption descriptor register devices digital signature enciphering environment error example Federal flow formal function hardware identifier IEEE implementation individual input internal key distribution keystream KSOS machine memo memory ment Multics object operating system output password plaintext possible problem Proc procedure proof protection mechanism protection system protocol public key public key cryptosystems puter queries records request result rotor machine rotors S-boxes secret Security Kernel security policies segment sequence specific stmt storage structure techniques terminal threats tion unauthorized UNIX virtual processor