Categories: All - models - security - attacks - systems

by Robert Mccausland 17 years ago

858

Security Architecture and Design

Security Architecture and Design

Security Architecture and Design

Impacts from

Trusted computer base, reference monitors and kernels
Assurance, trust, confidence
Countermeasures
Maintenance hooks and privileged programs
Emanations
State attacks
Time of use
Time of check
Covert channels

Computer systems

Information Systems Evaluation Models

Security models