Using build-integrated static checking to preserve correctness invariants
Proceedings of the 11th ACM conference on Computer and communications security
Hi-index | 0.00 |
The Department of Defense hasrecently published Trusted Computer SystemEvaluation Criteria that provide the basisfor evaluating the effectiveness ofsecurity controls built into computersystems. This paper summarizes basicsecurity requirements and the technicalcriteria that are used to classify systemsinto eight hierarchical classes ofenhanced security protection. Thesecriteria are used in specifying securityrequirements during acquisition, guidingthe design and development of trustedsystems and evaluating systems used toprocess sensitive information.