Guide to Understanding Discretionary Access Control in Trusted Systems

Guide to Understanding Discretionary Access Control in Trusted Systems

4.11 - 1251 ratings - Source



Department of Defense Trusted Computer System Evaluation Criteria, DoD, DoD 5200.28-STD, 1985. 2. Schell, R. R., aquot;Security Kernels: A Methodical Design of System Security, aquot; in Technical Papers, USE Inc., Spring Conference, 5-9 March 1979, pp. ... 4. Boebert, W.E., and Ferguson, C.T., aquot;A Partial Solution to the Discretionary Trojan Horse Problem, aquot; 9th Security Conference, ... Honeywell Informations Systems, Inc., Multics Programmera#39;s Manual a€” Reference Guide, 7 ed., AG91. 15.


Title:Guide to Understanding Discretionary Access Control in Trusted Systems
Author: Carole S. Jordan
Publisher:DIANE Publishing - 1987-06-01
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA