메뉴 건너뛰기




Volumn 2, Issue 5, 2004, Pages 64-67

Multilevel security: Reprise

Author keywords

[No Author keywords available]

Indexed keywords

MULTILEVEL SECURITY; PROVABLY SECURE OPERATING SYSTEM (PSOS); SECURITY LEVELS; TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSED);

EID: 12844250676     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.78     Document Type: Review
Times cited : (14)

References (7)
  • 3
    • 33845546418 scopus 로고    scopus 로고
    • Subversion as a threat in information warfare
    • E.A. Anderson, C.E. Irvine, and R.R. Schell, "Subversion as a Threat in Information Warfare," J. Information Warfare, vol. 3, no. 2; www.jinfowar.com/extranet/article.asp?section=extranet&ContentID=jiw32_5.
    • J. Information Warfare , vol.3 , Issue.2
    • Anderson, E.A.1    Irvine, C.E.2    Schell, R.R.3
  • 4
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE CS Press
    • D.D. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Computer Security and Privacy, IEEE CS Press, 1987, pp. 184-194.
    • (1987) Proc. IEEE Symp. Computer Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 5
    • 84888923739 scopus 로고    scopus 로고
    • National Computer Security Center, Department of Defense Trusted Computer Security Evaluation Criteria, DOD 5200.28-STD, 1985
    • National Computer Security Center, Department of Defense Trusted Computer Security Evaluation Criteria, DOD 5200.28-STD, 1985.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.