Thumbnail
Access Restriction
Subscribed

Author Lee, T.M.P.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©1988
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Information security ♦ Computer security ♦ National security ♦ Neutron spin echo ♦ Control systems ♦ Government ♦ Books ♦ Access control ♦ Kernel ♦ Context modeling
Abstract Government research, development, and standardization efforts in computer security have been repeatedly criticized as not being applicable to the commercial world. In particular, they have been criticized as not being able to support the kinds of security policies, such as separation of duties and well-formed transactions, used by the financial and other communities to control unauthorized changes to or falsification of information. It is shown two natural extensions-integrity categories and partially trusted subjects-of the principles of current US Department of Defense computer security standards could be used to implement such commercial security policies in a way that exploits the fundamental strengths of existing or future trusted systems.
Description Author affiliation: Trusted Inf. Syst. Inc., Minnetonka, MN, USA (Lee, T.M.P.)
ISBN 0818608501
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1988-04-18
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Size (in Bytes) 477.89 kB
Page Count 7
Starting Page 140
Ending Page 146


Source: IEEE Xplore Digital Library