14th National Computer Security Conference: Omni Shoreham Hotel, Washington, D.C., 1-4 October 1991 : Proceedings, Volumes 1-2National Institute of Standards and Technology, National Computer Security Center, 1991 - Computer security - 715 pages |
Contents
13 | |
25 | |
37 | |
45 | |
59 | |
69 | |
78 | |
88 | |
101 | |
110 | |
120 | |
137 | |
147 | |
157 | |
167 | |
177 | |
188 | |
195 | |
205 | |
215 | |
226 | |
237 | |
246 | |
257 | |
267 | |
283 | |
295 | |
305 | |
313 | |
328 | |
338 | |
347 | |
357 | |
Common terms and phrases
access control accreditation algorithm analysis application approach architecture attributes audit data audit records authentication behavior certification client communication components Computer Security Conference confidentiality covert channel criteria database DBMS defined discretionary access control disk distributed documentation encryption environment evaluation example executable expert system formal verification function host identified implementation information security Information Systems INFORMIX-OnLine/Secure integrity interface intrusion detection issues ITSEC Kerberos lattice-value login mandatory access control mechanisms modification monitor multilevel multilevel secure National Computer Security network security nodes object operating system ORGCON paper password performance privileges problem protection protocol query quorums restricted risk scenario security policy security requirements server solution specific standard subsystem system security target TCSEC techniques threat agent Trusted Computing Base Trusted Information Systems trusted systems UNIX untrusted virus viruses window