Proceedings of the Sixth Seminar on the DOD Computer Security Initiative
Author :
Publisher :
Page : 168 pages
File Size : 21,19 MB
Release : 1984
Category : Computers
ISBN :
Author :
Publisher :
Page : 168 pages
File Size : 21,19 MB
Release : 1984
Category : Computers
ISBN :
Author :
Publisher :
Page : 158 pages
File Size : 37,66 MB
Release : 1984
Category : Computer networks
ISBN :
Author :
Publisher :
Page : 168 pages
File Size : 49,31 MB
Release : 1984
Category : Computers
ISBN :
Author : United States. Superintendent of Documents
Publisher :
Page : pages
File Size : 35,95 MB
Release : 1985
Category : Government publications
ISBN :
February issue includes Appendix entitled Directory of United States Government periodicals and subscription publications; September issue includes List of depository libraries; June and December issues include semiannual index
Author :
Publisher :
Page : 798 pages
File Size : 30,65 MB
Release : 1985
Category : Government publications
ISBN :
Author :
Publisher :
Page : 426 pages
File Size : 17,43 MB
Release : 1995
Category : Computer security
ISBN :
Author :
Publisher :
Page : 846 pages
File Size : 45,10 MB
Release : 1992
Category : Computer security
ISBN :
Author :
Publisher :
Page : 256 pages
File Size : 21,95 MB
Release : 1986
Category : Computer security
ISBN :
Author :
Publisher :
Page : 252 pages
File Size : 44,81 MB
Release : 1986
Category : Computer security
ISBN :
Author : DEPARTMENT OF DEFENSE WASHINGTON DC.
Publisher :
Page : 261 pages
File Size : 41,92 MB
Release : 1980
Category :
ISBN :
This is the second in a series of seminars to acquaint computer system developers and users with the status of 'trusted' ADP system developments within the Department of Defense and current planning for the integrity evaluation of commercial implementations of similar systems. This seminar will go into more detail both on the technical experiences of the DoD research efforts in this area and the implications of trusted systems on the use of computers. Following the first day of topics of general interest the seminar will divide into two parallel sessions. The technical session, intended for operating system developers and sophisticated computer science technical experts, will provide a detailed analysis of the Trusted Computing Base concept which is the emerging generalized basis upon which high integrity operating systems may be evaluated, followed by discussions by the principal designers of the major DoD trusted system developments relating their systems to the Trusted Computing Base Concept. The non-technical session will provide indepth discussion of policy issues as they apply to multilevel secure computer systems, an analysis of applications of such systems within the DoD and beyond, and a not-so-technical review of the Trusted Computing Base concepts. The Trusted Computing Base concept being introduced at this seminar is a first draft specification against which the integrity of computer systems may be evaluated. This draft specification is the result of much interaction within the DoD community and is being introduced here to obtain reactions from industry and other users.