咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 3 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
  • 3 篇 理学
    • 2 篇 系统科学
    • 1 篇 物理学

主题

  • 4 篇 computer securit...
  • 4 篇 computers
  • 4 篇 hardware
  • 3 篇 operating system...
  • 3 篇 us department of...
  • 3 篇 kernel
  • 2 篇 computer archite...
  • 1 篇 file systems
  • 1 篇 access control
  • 1 篇 hierarchical sys...
  • 1 篇 concurrent compu...
  • 1 篇 bells
  • 1 篇 communication sy...
  • 1 篇 security of data
  • 1 篇 monitoring
  • 1 篇 computational mo...
  • 1 篇 semantics
  • 1 篇 application prog...
  • 1 篇 information secu...
  • 1 篇 security

机构

  • 6 篇 dod computer sec...
  • 3 篇 dod computer sec...
  • 1 篇 dod computer sec...
  • 1 篇 dod computer sec...

作者

  • 2 篇 schell roger r.
  • 2 篇 roger r. schell
  • 1 篇 marvin schaefer
  • 1 篇 bret a. hartman
  • 1 篇 taylor tad
  • 1 篇 woodie paul e.
  • 1 篇 schaefer marvin
  • 1 篇 tad taylor
  • 1 篇 hartman bret a.
  • 1 篇 paul e. woodie
  • 1 篇 schell rr

语言

  • 11 篇 英文
检索条件"机构=DoD Computer Security Center"
11 条 记 录,以下是1-10 订阅
排序:
A security KERNEL FOR A MULTIPROCESSOR MICROcomputer
收藏 引用
computer 1983年 第7期16卷 47-53页
作者: SCHELL, RR DoD Computer Security Center
First Page of the Article
来源: 评论
security enhancement through product evaluation  4
Security enhancement through product evaluation
收藏 引用
4th IEEE Symposium on security and Privacy, SP 1983
作者: Woodie, Paul E. DoD Computer Security Center United States
This paper describes a major goal of the dod computer security center, which is to encouraqe the easy availability of computer products with enhanced security features. The mechanisms by which this is to be accomplish... 详细信息
来源: 评论
Toward an Understanding of Extensible Architectures for Evaluated Trusted computer System Products  5
Toward an Understanding of Extensible Architectures for Eval...
收藏 引用
5th IEEE Symposium on security and Privacy, SP 1984
作者: Schaefer, Marvin Schell, Roger R. DoD Computer Security Center Fort George G. Meade MD United States
It has been a tenet of the computer security research and development community that policy enforcement mechanisms must be designed into systems at the time of their conception rather than retrofitted on to existing s... 详细信息
来源: 评论
Comparison Paper between the Bell and LaPadula Model  5
Comparison Paper between the Bell and LaPadula Model
收藏 引用
5th IEEE Symposium on security and Privacy, SP 1984
作者: Taylor, Tad DoD Computer Security Center Fort George G. MeadeMD20755 United States
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic differences between them. There ia a common misconception in the field that the MLS tool ... 详细信息
来源: 评论
Evaluating security properties of computer systems  4
Evaluating security properties of computer systems
收藏 引用
4th IEEE Symposium on security and Privacy, SP 1983
作者: Schell, Roger R. DoD Computer Security Center Fort George G. MeadeMD20755 United States
The Department of Defense has recently published Trusted computer System Evaluation Criteria that provide the basis for evaluating the effectiveness of security controls built into computer systems. This paper summari... 详细信息
来源: 评论
A Gypsy-Based Kernel  5
A Gypsy-Based Kernel
收藏 引用
5th IEEE Symposium on security and Privacy, SP 1984
作者: Hartman, Bret A. DoD Computer Security Center Fort George G. MeadeMD20755 United States
Several members of the Research and Development Office at the dod computer security center are involved in an in-house research effort on security kernels called VIKING (Verified Implementationof a Kernel IN Gypsy). T... 详细信息
来源: 评论
Evaluating security Properties of computer Systems
Evaluating Security Properties of Computer Systems
收藏 引用
IEEE Symposium on security and Privacy
作者: ROGER R. SCHELL DoD Computer Security Center
The Department of Defense has recently published Trusted computer System Evaluation Criteria that provide the basis for evaluating the effectiveness of security controls built into computer systems. This paper summari... 详细信息
来源: 评论
Comparison Paper between the Bell and LaPadula Model
Comparison Paper between the Bell and LaPadula Model
收藏 引用
IEEE Symposium on security and Privacy
作者: Tad Taylor DoD Computer Security Center
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic differences between them. There ia a common misconception in the field that the MLS tool ... 详细信息
来源: 评论
security Enhancement through Product Evaluation
Security Enhancement through Product Evaluation
收藏 引用
IEEE Symposium on security and Privacy
作者: Paul E. Woodie DoD Computer Security Center
This paper describes a major goal of the dod computer security center, which is to encouraqe the easy availability of computer products with enhanced security features. The mechanisms by which this is to be accomplish... 详细信息
来源: 评论
A Gypsy-Based Kernel
A Gypsy-Based Kernel
收藏 引用
IEEE Symposium on security and Privacy
作者: Bret A. Hartman DoD Computer Security Center
Several members of the Research and Development Office at the dod computer security center are involved in an in-house research effort on security kernels called VIKING (Verified Implementationof a Kernel IN Gypsy). T... 详细信息
来源: 评论