This paper provides an introspective retrospective on the history and development of the United States Department of Defense Trusted Computer System Evaluation Criteria (TCSEC). Known to many as the Orange Book, the TCSEC contained a distillation of what many researchers considered to be the soundest proven principles and practices for achieving graded degrees of sensitive information protection on multiuser computing systems. While its seven stated evaluation classes were explicitly directed to standalone computer systems, many of its authors contended that its principles would stand as adequate guidance for the design, implementation, assurance, evaluation and certification of other classes of computing applications including database man...
Networked computer systems underlie a great deal of business, social, and government activity today....
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
Over the last few years, private and public organizations have suffered an increasing number of cybe...
This paper provides an introspective retrospective on the history and development of the United Stat...
With the progression of computer systems to local and wide area networks, the scope of computer secu...
In the paper a brief review of the evolution in developing and designing trusted computer system eva...
this document apply to the Office of the Secretary of Defense (ASD), the Military Departments, the O...
The most effective approach to evaluating the security of complex systems is to deliberately constru...
FOREWORD The Trusted Product Evaluation Questionnaire is the latest in a series of technical documen...
through its Trusted Product Evaluation Program, evaluates the security features of commercially prod...
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sh...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
With the increasing use of computer systems in governmental, commercial and industrial equipment, we...
"Library No. S225,711.""Supercedes CSC-STD-001-83, dtd 15 Aug 83.""DOD 5200.28-STD.""December 1985."...
Virus and computer attacks are common occurrences in today\u27s open computing platforms. As a resul...
Networked computer systems underlie a great deal of business, social, and government activity today....
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
Over the last few years, private and public organizations have suffered an increasing number of cybe...
This paper provides an introspective retrospective on the history and development of the United Stat...
With the progression of computer systems to local and wide area networks, the scope of computer secu...
In the paper a brief review of the evolution in developing and designing trusted computer system eva...
this document apply to the Office of the Secretary of Defense (ASD), the Military Departments, the O...
The most effective approach to evaluating the security of complex systems is to deliberately constru...
FOREWORD The Trusted Product Evaluation Questionnaire is the latest in a series of technical documen...
through its Trusted Product Evaluation Program, evaluates the security features of commercially prod...
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sh...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
With the increasing use of computer systems in governmental, commercial and industrial equipment, we...
"Library No. S225,711.""Supercedes CSC-STD-001-83, dtd 15 Aug 83.""DOD 5200.28-STD.""December 1985."...
Virus and computer attacks are common occurrences in today\u27s open computing platforms. As a resul...
Networked computer systems underlie a great deal of business, social, and government activity today....
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
Over the last few years, private and public organizations have suffered an increasing number of cybe...