Kategorie: Wszystkie - models - security - attacks - systems

przez Robert Mccausland 17 lat temu

852

Security Architecture and Design

Security Architecture and Design

Security Architecture and Design

Impacts from

Trusted computer base, reference monitors and kernels
Assurance, trust, confidence
Countermeasures
Maintenance hooks and privileged programs
Emanations
State attacks
Time of use
Time of check
Covert channels

Computer systems

Information Systems Evaluation Models

Security models