What people are saying - Write a review
We haven't found any reviews in the usual places.
COMPUTER SECURITY AND PRIVACY
3 other sections not shown
Other editions - View all
access control access control list access privileges access rights address space allow application program audit authentication Bell and LaPadula capability category theory command communication computer security cryptographic data base management data files data processing DBAM descriptor developed distribution encoded entry environment error evaluation execution explicit mapping approach facility Figure function hardware identification implementation implementor subsystem input integrity kernel software ment microprogram Multics multilevel security object representation operating system parameters password performance problem procedures processor protection mechanism reference monitor requirements Research safeguards Saltzer SCOMP sealing mechanism secrecy key secure computer secure computer system security kernel security level shared segments Stanford Research Institute storage structure subroutine switch system domain system work segment techniques template terminal test signature threats time-sharing tion transformations true signatures user interface user programs user subsystem validation variables verified virtual