Evaluating Security Properties of Computer Systems

  • Authors:
  • ROGER R. SCHELL

  • Affiliations:
  • -

  • Venue:
  • SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
  • Year:
  • 1983

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Department of Defense hasrecently published Trusted Computer SystemEvaluation Criteria that provide the basisfor evaluating the effectiveness ofsecurity controls built into computersystems. This paper summarizes basicsecurity requirements and the technicalcriteria that are used to classify systemsinto eight hierarchical classes ofenhanced security protection. Thesecriteria are used in specifying securityrequirements during acquisition, guidingthe design and development of trustedsystems and evaluating systems used toprocess sensitive information.