exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files

NCSC-TG-014.txt
Posted Aug 17, 1999

NCSC-TG-014: Guidelines for Formal Verification Systems, 1 April 1989. (Purple Book)

tags | paper
SHA-256 | 6332be201ddc80d087d74e8521b04c3b3a12ba03ce4467230ed288d5a032bd37

Related Files

NCSC-TR-002.txt
Posted Aug 17, 1999

NCSC Technical Report 002: Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems

tags | paper
SHA-256 | 761a271ec6333f8e0b91e8e68200eb2a33a056e59e5bd180005cd01b88a2855e
NCSC-TR-003.txt
Posted Aug 17, 1999

NCSC Technical Report 003: Turning Multiple Evaluated Products Into Trusted Systems

tags | paper
SHA-256 | 557e2dc5adcb3e97bc458dc4291957a31080718ac29a7b05656168284f7e2109
NCSC-TR-004.txt
Posted Aug 17, 1999

NCSC Technical Report 004: A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems

tags | paper
SHA-256 | 965b2950154a83e4f2f33f91c68102327e864652a20bce003816a01660df7e0a
NCSC-TR-005-1.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 1/5: Inference and Aggregation Issues In Secure Database Management Systems

tags | paper
SHA-256 | 2323d286401cba4250f29c3da7a46929bcab5c4421fceff4eee16aeb5519d0f9
NCSC-TR-005-2.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 2/5: Entity and Referential Integrity Issues In Multilevel Secure Database Management

tags | paper
SHA-256 | cb9b3882ec4659596a30c2d2b9731572bc9602925122930b456c30161032bf81
NCSC-TR-005-3.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 3/5: Polyinstantiation Issues In Multilevel Secure Database Management Systems

tags | paper
SHA-256 | 172efec7db5f471e9e8c192a2f6f78b1c2013210bc4e81fcc33d9a8f5adb3d97
NCSC-TR-005-4.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 4/5: Auditing Issues In Secure Database Management Systems

tags | paper
SHA-256 | bb5309ca82a9adf5a147a6913df47df2183f42ad78bb13f61890586338b4d5aa
NCSC-TR-005-5.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 5/5: Discretionary Access Control Issues In High Assurance Secure Database Management Systems

tags | paper
SHA-256 | 8605e03c9929e1c0109fb23f92303655bd52b875c2b6f8d58999d4b99f3987e7
NCSC-TG-027.txt
Posted Aug 17, 1999

NCSC-TG-027: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquiose Book)

tags | paper
SHA-256 | 89272408b0c73894e32d3875015c81feda77e8259a560f5938e3e00ec14dae9a
NCSC-TG-028.txt
Posted Aug 17, 1999

NCSC-TG-028: Assessing Controlled Access Protection, 25 May 1992. (Violet Book)

tags | paper
SHA-256 | 54a1461e2b36a8c02ca22616c1b0b7ad88d218fb38c5e86e61e867fb5ff02a42
NCSC-TG-029.txt
Posted Aug 17, 1999

NCSC-TG-029: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)

tags | paper
SHA-256 | 1a91dd973ae273314276529292ff1594bd6d3e27919c01120d35be066a26c9d3
NCSC-TG-030.txt
Posted Aug 17, 1999

NCSC-TG-030: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)

tags | paper
SHA-256 | 22b5421bc861f8aad644439ad976be08e9dc8fd4a9a832a310c60c888f901e3b
NCSC-TG-020-A.html
Posted Aug 17, 1999

NCSC-TG-020-A: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)

tags | paper
systems | unix
SHA-256 | 34d707f375dd37af66dbcbd7c385c1648b9a5a82556684ca5e00a55f3267f306
NCSC-TG-021.txt
Posted Aug 17, 1999

NCSC-TG-021: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)

tags | paper
SHA-256 | 5c6fe9586b7a5ea5023de4bd2f3571633922fc83aa75b82ee9e9e0cbb3e0ff88
NCSC-TG-022.txt
Posted Aug 17, 1999

NCSC-TG-022: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)

tags | paper
SHA-256 | cb8376f035c95a49e41a401e6ba45f951041cbe88d435d4d5066d31eca1a254d
NCSC-TG-023.txt
Posted Aug 17, 1999

NCSC-TG-023: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)

tags | paper
SHA-256 | 400531ce7490964ddddf06b71f3d3c894161b20bac3bcbdda85cf8d14671aa00
NCSC-TG-024-1.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 1/4: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)

tags | paper
SHA-256 | 5897799f03792a31752f3a777f7ca26d79affe0ae5908e2e3dc4d18146f3137e
NCSC-TG-024-2.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 2/4: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)

tags | paper
SHA-256 | c6f893c8c0a8fce8734ac5e51e95321e1c532e3f4119b209a94aef4d8352ecd2
NCSC-TG-024-3.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 3/4: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)

tags | paper
SHA-256 | f30a830b3bcf7343987b3df11145ff4bc1984732da0e6f79259b4646313061d9
NCSC-TG-025.2.html
Posted Aug 17, 1999

NCSC-TG-025 Ver. 2: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)

tags | paper
SHA-256 | c9a863fa02050b2dd778432d961b491c07af0ebfe767c6feea79f776b49976d1
NCSC-TG-026.txt
Posted Aug 17, 1999

NCSC-TG-026: A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book)

tags | paper
SHA-256 | 6b5ab63d7b7616768803e8531a76c42cc4929f3cf36e372ae489ce3afbbddc15
NCSC-TG-008.txt
Posted Aug 17, 1999

NCSC-TG-008: A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book)

tags | paper
SHA-256 | 02a1e0a2a49aab35adba5f616346b5a3fc0bd5620e0bd2a529673fc3d04f2da0
NCSC-TG-009.txt
Posted Aug 17, 1999

NCSC-TG-009: Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. (Venice Blue Book)

tags | paper
SHA-256 | 9f06251c53039ed6453b081d61b4d11118094bd99a73e134e04503d2dd6cb880
NCSC-TG-010.txt
Posted Aug 17, 1999

NCSC-TG-010: A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book)

tags | paper
SHA-256 | 8e6b2709c955a566bac180e5c3b3916b0e335f142f5fd4eae558f97fb09d3672
NCSC-TG-011.html
Posted Aug 17, 1999

NCSC-TG-011: Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book)

tags | paper
SHA-256 | 33a63ea69bb156e69e872270de314eeb4c87e757610efa59226a6efbe55b4483
Page 1 of 2
Back12Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    34 Files
  • 28
    Feb 28th
    27 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close