Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments

Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Author :
Publisher :
Total Pages : 40
Release :
ISBN-10 : OCLC:74271970
ISBN-13 :
Rating : 4/5 (70 Downloads)

Book Synopsis Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments by :

Download or read book Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments written by and published by . This book was released on 1985 with total page 40 pages. Available in PDF, EPUB and Kindle. Book excerpt: The purpose of this technical report is to present background discussion and rationale for Computer Security Requirements--Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments (henceforth referred to as the Computer Security Requirements). The requirements were prepared in compliance with responsibilities assigned to the Department of Defense (DoD) Computer Security Center (DoDCSC) under DoD Directive 5215.1, which tasks the DoDCSC to "establish and maintain technical standards and criteria for the evaluation of trusted computer systems."


Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments Related Books

Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Language: en
Pages: 40
Authors:
Categories:
Type: BOOK - Published: 1985 - Publisher:

DOWNLOAD EBOOK

The purpose of this technical report is to present background discussion and rationale for Computer Security Requirements--Guidance for Applying the DoD Trusted
Technical Rationale Behind CSC-STD-003-85, Computer Security Requirements
Language: en
Pages: 52
Authors:
Categories: Computers
Type: BOOK - Published: 1988 - Publisher:

DOWNLOAD EBOOK

Technical Rationale Behind CSC-STD-003-85, Computer Security Requirements
Language: en
Pages: 41
Authors: United States. Department of Defense
Categories: Computers
Type: BOOK - Published: 1985 - Publisher:

DOWNLOAD EBOOK

Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Language: en
Pages: 40
Authors:
Categories:
Type: BOOK - Published: 1985 - Publisher:

DOWNLOAD EBOOK

The purpose of this technical report is to present background discussion and rationale for Computer Security Requirements--Guidance for Applying the DoD Trusted
Technical Rationale Behind CSC-STD-003-85
Language: en
Pages: 54
Authors: DIANE Publishing Company
Categories:
Type: BOOK - Published: 1995-09-01 - Publisher:

DOWNLOAD EBOOK

Two documents in 1: 1. The document Computer Security Requirements establishes computer security requirements for the DoD. 2. The accompanying technical report