Guide to Understanding Discretionary Access Control in Trusted Systems
Author: Carole S. Jordan
Publisher: DIANE Publishing
Published: 1995-09
Total Pages: 42
ISBN-13: 9780788122347
DOWNLOAD EBOOK →Author: Carole S. Jordan
Publisher: DIANE Publishing
Published: 1995-09
Total Pages: 42
ISBN-13: 9780788122347
DOWNLOAD EBOOK →Author:
Publisher:
Published: 1987
Total Pages: 40
ISBN-13:
DOWNLOAD EBOOK →"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC
Author:
Publisher:
Published: 1987
Total Pages: 0
ISBN-13:
DOWNLOAD EBOOK →One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms.
Author: Carole S. Jordan
Publisher:
Published: 1989-12-01
Total Pages: 33
ISBN-13: 9780160176005
DOWNLOAD EBOOK →Author:
Publisher:
Published: 1988
Total Pages: 44
ISBN-13:
DOWNLOAD EBOOK →The specific guidelines in this document provide a set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. This technical guideline has been written to help the vendor and evaluator community understand what deliverables are required for design documentation, as well as the level of detail required of the design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.
Author:
Publisher: DIANE Publishing
Published: 1995-10
Total Pages: 44
ISBN-13: 9780788122309
DOWNLOAD EBOOK →A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.
Author: Virgil D. Gligor
Publisher: DIANE Publishing
Published: 1994-03
Total Pages: 68
ISBN-13: 9780788105517
DOWNLOAD EBOOK →Provides a set of good practices related to trusted recovery. Helps the vendor and evaluator community understand the requirements for trusted recovery at all applicable classes. Includes: failures, discontinuities, and recovery; properties of trusted recovery; design approaches for trusted recovery; impact on trusted recovery; and satisfying requirements. Glossary and bibliography.
Author:
Publisher:
Published: 1988
Total Pages: 0
ISBN-13:
DOWNLOAD EBOOK →This publication, "A Guide to Understanding Audit in Trusted Systems," is being issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215.1. The guidelines described in this document provide a set of good practices related to the use of auditing in automatic data processing systems employed for processing classified and other sensitive information.