Fifth Annual Computer Security Applications Conference, Tucson, Arizona, December 4-8, 1989

Fifth Annual Computer Security Applications Conference, Tucson, Arizona, December 4-8, 1989

4.11 - 1251 ratings - Source



Proceedings of the fifth annual conference (see title) held in Tucson, AZ, December, 1989. Addresses the lack of trust that computers can properly control access to widely varying degrees of sensitive information. Treats unclassified systems security, risk management, crime, audit applications, architecture and mechanisms, and security policy and models. Acidic paper; no subject index. Annotation copyrighted by Book News, Inc., Portland, ORThe third and final interval consists of three DOD- STD-2167A design phases: CSC Integration and Testing, CSCI ... that the implemented system meets its specifications, and on developing operation and support documentation. ... Several draft Request For Proposala#39;s (RFP) from the Air Force will require the use of a software development process ... aquot;Process model for high performance trusted systems in ada, aquot; tech. rep., TRW Systems Division, Computational Logic Inc., August 1989.


Title:Fifth Annual Computer Security Applications Conference, Tucson, Arizona, December 4-8, 1989
Author:
Publisher: - 1990
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA