首页> 美国政府科技报告 >Analysis of Trusted Computer Evaluation and Certification
【24h】

Analysis of Trusted Computer Evaluation and Certification

机译:可信计算机评估与认证分析

获取原文

摘要

At the very heart of our war-fighting capability is computer systems. We dependupon these machines as a key force multiplier to defeat a larger and more heavily armed adversary. Yet these machines are vulnerable to many security threats. Progress in developing and acquiring trusted computer systems-hardware and software together that enforce a security policy has been slow over the past 10 years, providing users with few products. Clearly this situation must improve. Our command, control, and communication systems need trusted computer systems to counteract the growing threat to our systems and provide a multilevel secure processing capability. The author has thoroughly examined the trusted computer evaluation and certification processes. Although there are significant problems in developing and acquiring trusted systems, The report reveals an increase in interest and support at all levels to resolve this important issue. The recommendations address actions the Air Force can take to assist computer security personnel in the difficult job of developing and acquiring these systems.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号