A Guide to Understanding Discretionary Access Control in Trusted Systems

A Guide to Understanding Discretionary Access Control in Trusted Systems PDF

Author:

Publisher:

Published: 1987

Total Pages: 40

ISBN-13:

DOWNLOAD EBOOK →

"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC

A Guide to Understanding Discretionary Access Control in Trusted Systems

A Guide to Understanding Discretionary Access Control in Trusted Systems PDF

Author:

Publisher:

Published: 1987

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK →

One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms.

A Guide to Understanding Design Documentation in Trusted Systems

A Guide to Understanding Design Documentation in Trusted Systems PDF

Author:

Publisher:

Published: 1988

Total Pages: 44

ISBN-13:

DOWNLOAD EBOOK →

The specific guidelines in this document provide a set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. This technical guideline has been written to help the vendor and evaluator community understand what deliverables are required for design documentation, as well as the level of detail required of the design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.

Guide to Understanding Design Documentation in Trusted Systems

Guide to Understanding Design Documentation in Trusted Systems PDF

Author:

Publisher: DIANE Publishing

Published: 1995-10

Total Pages: 44

ISBN-13: 9780788122309

DOWNLOAD EBOOK →

A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.

A Guide to Understanding Trusted Recovery in Trusted Systems

A Guide to Understanding Trusted Recovery in Trusted Systems PDF

Author: Virgil D. Gligor

Publisher: DIANE Publishing

Published: 1994-03

Total Pages: 68

ISBN-13: 9780788105517

DOWNLOAD EBOOK →

Provides a set of good practices related to trusted recovery. Helps the vendor and evaluator community understand the requirements for trusted recovery at all applicable classes. Includes: failures, discontinuities, and recovery; properties of trusted recovery; design approaches for trusted recovery; impact on trusted recovery; and satisfying requirements. Glossary and bibliography.

A Guide to Understanding Audit in Trusted Systems

A Guide to Understanding Audit in Trusted Systems PDF

Author:

Publisher:

Published: 1988

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK →

This publication, "A Guide to Understanding Audit in Trusted Systems," is being issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215.1. The guidelines described in this document provide a set of good practices related to the use of auditing in automatic data processing systems employed for processing classified and other sensitive information.