Computer security subsystem interpretation of the trusted computer system evaluation criteria / National Computer Security Center.

Other author National Computer Security Center (U.S.)
Format Book
Publication Info[Fort George G. Meade, MD] : The Center ; [Washington, D.C.?] : [Supt. of Docs., U.S. G.P.O., distributor], [1988]
Descriptionvi, 36 pages ; 28 cm.
Subjects

SeriesNCSC-TG ; 009, version-1
NCSC-TG 009. ^A367628
Abstract "This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
General noteCover title.
General noteShipping list no.: 89-557-P.
General note"16 September 1988."
Report noteFinal.
GPO item number306-A-19
Govt. docs number D 1.79/4:009/ver.1
Stock number008-000-00510-9 GPO

Availability

Library Location Call Number Status Item Actions
Joyner Fed Docs Stacks D 1.79/4:009/VER.1 ✔ Available Place Hold