exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 48 RSS Feed

Files

5200.28-STD.txt
Posted Aug 17, 1999

5200.28-STD: DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)

tags | paper
SHA-256 | 4694e2614f4af7768ee1c255c347ff039be84d573514a13e69f393c94dcd921e
NCSC-TR-002.txt
Posted Aug 17, 1999

NCSC Technical Report 002: Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems

tags | paper
SHA-256 | 761a271ec6333f8e0b91e8e68200eb2a33a056e59e5bd180005cd01b88a2855e
NCSC-TR-003.txt
Posted Aug 17, 1999

NCSC Technical Report 003: Turning Multiple Evaluated Products Into Trusted Systems

tags | paper
SHA-256 | 557e2dc5adcb3e97bc458dc4291957a31080718ac29a7b05656168284f7e2109
NCSC-TR-004.txt
Posted Aug 17, 1999

NCSC Technical Report 004: A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems

tags | paper
SHA-256 | 965b2950154a83e4f2f33f91c68102327e864652a20bce003816a01660df7e0a
NCSC-TR-005-1.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 1/5: Inference and Aggregation Issues In Secure Database Management Systems

tags | paper
SHA-256 | 2323d286401cba4250f29c3da7a46929bcab5c4421fceff4eee16aeb5519d0f9
NCSC-TR-005-2.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 2/5: Entity and Referential Integrity Issues In Multilevel Secure Database Management

tags | paper
SHA-256 | cb9b3882ec4659596a30c2d2b9731572bc9602925122930b456c30161032bf81
NCSC-TR-005-3.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 3/5: Polyinstantiation Issues In Multilevel Secure Database Management Systems

tags | paper
SHA-256 | 172efec7db5f471e9e8c192a2f6f78b1c2013210bc4e81fcc33d9a8f5adb3d97
NCSC-TR-005-4.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 4/5: Auditing Issues In Secure Database Management Systems

tags | paper
SHA-256 | bb5309ca82a9adf5a147a6913df47df2183f42ad78bb13f61890586338b4d5aa
NCSC-TR-005-5.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 5/5: Discretionary Access Control Issues In High Assurance Secure Database Management Systems

tags | paper
SHA-256 | 8605e03c9929e1c0109fb23f92303655bd52b875c2b6f8d58999d4b99f3987e7
C-TR-111-91.txt
Posted Aug 17, 1999

C Technical Report 111-91: Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC, October 1991.

tags | paper
SHA-256 | fd03ddc9985555a813afacf3e136efaa208011af3de4e949c4d58a0aa5e9cbe4
C-TR-32-92.txt
Posted Aug 17, 1999

C Technical Report 32-92: The Design and Evaluation of INFOSEC systems: The Computer Security Contribution to the Composition Discussion, June 1992.

tags | paper
SHA-256 | 20aa48bd1d8cf82a4a9518c75eb984e7f31412703ff2d21288fc12313461783b
C-TR-79-91.txt
Posted Aug 17, 1999

C Technical Report 79-91: Technical Report, Integrity in Automated Information Systems, September 1991.

tags | paper
SHA-256 | a86893cddfb2c7681ec374e88db6490a4e96e4e97450777ae6bbe1842cc854d2
C1-TR-001.txt
Posted Aug 17, 1999

C1 Technical Report 001: Technical Report, Computer Viruses: Prevention, Detection, and Treatment, 12 March 1990

tags | paper
SHA-256 | 497e593a2fc854fcbd7aab1ad6ba2645a56dff287bf6ce5710bd51c5faa31e8e
NCSC-TG-027.txt
Posted Aug 17, 1999

NCSC-TG-027: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquiose Book)

tags | paper
SHA-256 | 89272408b0c73894e32d3875015c81feda77e8259a560f5938e3e00ec14dae9a
NCSC-TG-028.txt
Posted Aug 17, 1999

NCSC-TG-028: Assessing Controlled Access Protection, 25 May 1992. (Violet Book)

tags | paper
SHA-256 | 54a1461e2b36a8c02ca22616c1b0b7ad88d218fb38c5e86e61e867fb5ff02a42
NCSC-TG-029.txt
Posted Aug 17, 1999

NCSC-TG-029: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)

tags | paper
SHA-256 | 1a91dd973ae273314276529292ff1594bd6d3e27919c01120d35be066a26c9d3
NCSC-TG-030.txt
Posted Aug 17, 1999

NCSC-TG-030: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)

tags | paper
SHA-256 | 22b5421bc861f8aad644439ad976be08e9dc8fd4a9a832a310c60c888f901e3b
NCSC-TG-020-A.html
Posted Aug 17, 1999

NCSC-TG-020-A: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)

tags | paper
systems | unix
SHA-256 | 34d707f375dd37af66dbcbd7c385c1648b9a5a82556684ca5e00a55f3267f306
NCSC-TG-021.txt
Posted Aug 17, 1999

NCSC-TG-021: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)

tags | paper
SHA-256 | 5c6fe9586b7a5ea5023de4bd2f3571633922fc83aa75b82ee9e9e0cbb3e0ff88
NCSC-TG-022.txt
Posted Aug 17, 1999

NCSC-TG-022: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)

tags | paper
SHA-256 | cb8376f035c95a49e41a401e6ba45f951041cbe88d435d4d5066d31eca1a254d
NCSC-TG-023.txt
Posted Aug 17, 1999

NCSC-TG-023: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)

tags | paper
SHA-256 | 400531ce7490964ddddf06b71f3d3c894161b20bac3bcbdda85cf8d14671aa00
NCSC-TG-024-1.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 1/4: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)

tags | paper
SHA-256 | 5897799f03792a31752f3a777f7ca26d79affe0ae5908e2e3dc4d18146f3137e
NCSC-TG-024-2.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 2/4: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)

tags | paper
SHA-256 | c6f893c8c0a8fce8734ac5e51e95321e1c532e3f4119b209a94aef4d8352ecd2
NCSC-TG-024-3.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 3/4: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)

tags | paper
SHA-256 | f30a830b3bcf7343987b3df11145ff4bc1984732da0e6f79259b4646313061d9
NCSC-TG-025.2.html
Posted Aug 17, 1999

NCSC-TG-025 Ver. 2: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)

tags | paper
SHA-256 | c9a863fa02050b2dd778432d961b491c07af0ebfe767c6feea79f776b49976d1
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close