ThesaHelp: references m-o
Topic: security by secure domains
Topic: security by access rights
Topic: security leaks and weaknesses
| |
Reference
McLean, J.,
"The specification and modeling of computer security",
Computer, January 1990, pp. 9-16.
Google
Quotations
9 ;;Quote: mandatory access control limits damage a Trojan horse can do; e.g., military security levels (clearance for classified objects)
| 10 ;;Quote: computer security concerns unauthorized disclosure, unauthorized alteration, and denial of service
| 10 ;;Quote: simple security--users and programs not permitted to view data with a higher classification
| 10+;;Quote: *-property for security--programs not permitted to copy data to a lower classification level
| 10 ;;Quote: covert channel analysis--bound the rate that high-level input can effect low-level output
|
Related Topics
ThesaHelp: references m-o (268 items)
Topic: security by secure domains (45 items)
Topic: security by access rights (38 items)
Topic: security leaks and weaknesses (67 items)
|