Login / Signup
Using a high assurance TCB for infrastructure security.
Mark R. Heckman
Roger R. Schell
Edwards E. Reed
Published in:
CSIIRW (2011)
Keyphrases
</>
high assurance
software systems
operating system
fault tolerant
access control
distributed systems
insider attacks
security requirements
security architecture
security issues
trusted computing
highly distributed
security services
security mechanisms
databases
security policies
software engineering