90 pages matching Building a Secure Computer System gasser in this book
Results 1-3 of 90
What people are saying - Write a review
We haven't found any reviews in the usual places.
Why Systems Are Not Secure
9 other sections not shown
abstract access class access control access control list access matrix access modes access rights allows applications authentication called checks communicate computer security computer system concept constraints correspondence covert channels curity data link data link layer database datagram device discretionary discretionary access control disk domain encryption enforced entities example figure file system flow analysis formal specification functions hardware implementation integrity interface mandatory access controls mandatory controls mapping mechanism Multics multilevel security packet Padula model password path physical memory plaintext prevent privileged procedure processor proof protection PROTOCOL LAYER prove public key reference monitor restrictions ring running secret secure network secure operating system secure system security attributes security controls security kernel security model security perimeter security-relevant server structure subsystem techniques Trojan horse trusted types unique ID untrusted user's variables verification violate virtual address virtual machine virtual memory wiretapper write