The Community for Technology Leaders
ABSTRACT
The Department of Defense has recently published Trusted Computer System Evaluation Criteria that provide the basis for evaluating the effectiveness of security controls built into computer systems. This paper summarizes basic security requirements and the technical criteria that are used to classify systems into eight hierarchical classes of enhanced security protection. These criteria are used in specifying security requirements during acquisition, guiding the design and development of trusted systems and evaluating systems used to process sensitive information.
INDEX TERMS
CITATION
ROGER R. SCHELL, "Evaluating Security Properties of Computer Systems", , vol. 00, no. , pp. 89, 1983, doi:10.1109/SP.1983.10013
REFERENCES
(Ver 3.3 (11022016))