A Guide to Understanding Security Modeling in Trusted Systems

A Guide to Understanding Security Modeling in Trusted Systems

4.11 - 1251 ratings - Source



Provides guidance on the construction, evaluation, and use of security policy models for automated information systems (AIS) used to protect sensitive and classified information. Includes an overview of a security modeling process and discusses techniques for security modeling techniques and specific systems, security levels and partially ordered sets, and available support tools. Also, philosophy of protection outline and security model outline. Glossary and references.Rigorous, general frameworks for computer security have not yet been developed. ... The Ina Jo specification processor automatically generates correctness assertions to the effect that every reachable state satisfies the provided stateanbsp;...


Title:A Guide to Understanding Security Modeling in Trusted Systems
Author:
Publisher:DIANE Publishing - 1993-05-01
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA