Tutorial Computer and Network SecurityIEEE Computer Society Press, 1987 - 430 lappuses |
Saturs
Overview | 3 |
Security Considerations for Personal Computers | 26 |
Conflicting Practices and Policy Choices | 41 |
Autortiesības | |
21 citas sadaļas nav parādītas.
Bieži izmantoti vārdi un frāzes
access class access control access modes algorithm applications architecture associated attacks audit authentication automated Bell-LaPadula model checksum classification communications components computer and network Computer Security Computer Security Center covert channels cryptographic database system DBMS decryption defined Department of Defense devices discretionary discretionary access control discussed domain end-to-end enforce entities environment Evaluation Criteria example execution formal functions hardware host implementation integrity interface labels layer mandatory security ment modify Multics multilevel multilevel secure National network security object operating system password performance personal computers problem processor protection protocol query reference monitor risk Scomp SE/VMS secret Section security kernel security level security policy security requirements segment sensitive specific standard system high system security TCSEC techniques tion Trojan Horse Trusted Computer System Trusted Computing Base tuple unauthorized untrusted VAX/VMS verification