Hidden fields
Books Books
" ... computer system - including hardware, firmware, and software - the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system.... "
Glossary of Computer Security Terms - Page 49
1989 - 55 pages
Full view - About this book

Trusted Network Interpretation of the Trusted Computer System Evaluation ...

Computer networks - 1987 - 314 pages
...for enforcing a security policy ... the ability of a Trusted Computing Base to correctly enforce a security policy depends solely on the mechanisms within...system administrative personnel of parameters (eg, a users' clearance) related to the security policy." In particular, the TCB includes those mechanisms...
Full view - About this book

Trusted Network Interpretation of the Trusted Computer System Evaluation ...

Computers - 1994 - 304 pages
...for enforcing a security policy ... the ability of a Trusted Computing Base to correctly enforce a security policy depends solely on the mechanisms within...system administrative personnel of parameters (eg, a users' clearance) related to the security policy." In particular, the TCB includes those mechanisms...
Full view - About this book

Guide to Understanding Configuration Management in Trusted Systems

James N. Menendez - Computers - 1989 - 46 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy.[l] 1 . National Computer Security Center, DOD Trusted Computer System...
Full view - About this book

A Guide to Understanding Trusted Distribution in Trusted Systems

Computers - 1988 - 36 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. [7] REFERENCES 1. American National Standards Institute, Financial...
Full view - About this book

Guide to Understanding Trusted Distribution in Trusted Systems

Scott Wright - Computers - 1995 - 40 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. [7] REFERENCES 1. American National Standards Institute, Financial...
Full view - About this book

Guide to Understanding Design Documentation in Trusted Systems

1995 - 44 pages
...correctly enforce a security policy depends solely on the mechanisms within the Trusted Computing Base and on the correct input by system administrative...user's clearance level) related to the security policy. [9] REFERENCES 1. Bell, DE, and LJ La Padula, "Secure Computer System: Unified Exposition and Multics...
Full view - About this book

A Guide to Understanding Design Documentation in Trusted Systems

Electronic data processing documentation - 1988 - 44 pages
...correctly enforce a security policy depends solely on the mechanisms within the Trusted Computing Base and on the correct input by system administrative...a user's clearance level) related to the security policy.[9] UMVER8TTY OF MtCHKUN llllllllllllllllll III! Ill 1111 REFERENCES 3 9015 02890 7072 1. Bell,...
Full view - About this book

Trusted Product Evaluation Questionnaire

Electronic data processing departments - 1990 - 64 pages
...required for a trusted computer system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. Trusted Path A mechanism by which a person at a terminal can communicate...
Full view - About this book

A Guide to Understanding Trusted Recovery in Trusted Systems

Virgil D. Gligor - Computers - 1994 - 68 pages
...security. For example, making a "blind copy" of a sensitive file for the creator of the Trojan Horse. TRUSTED COMPUTING BASE (TCB) The totality of protection...user's clearance level) related to the security policy. USER Person or process accessing an Automated lnformation System either by direct connections (ie,...
Full view - About this book

A Guide to Understanding Identification and Authentication in Trusted Systems

Computer security - 1991 - 40 pages
...additional user services required for a trusted computer system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. TRUSTED PATH A mechanism by which a person at a terminal can communicate...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF