Show simple item record

dc.contributor.authorIrvine, Cynthia
dc.contributor.authorLevin, Tim
dc.contributor.authorNguyen, Thuy
dc.contributor.otherCenter for Information Systems Security Studies and Research
dc.date.accessioned2013-08-20T20:15:06Z
dc.date.available2013-08-20T20:15:06Z
dc.date.issued2011-04
dc.identifier.urihttps://hdl.handle.net/10945/35288
dc.descriptionThe purpose of the Trusted Computing Exemplar (TCX) project is to provide a working example that shows how trusted computing systems and components can be constructed.en_US
dc.language.isoen_US
dc.publisherMonterey, California, Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subjectoperating systemen_US
dc.subjectCOTSen_US
dc.subjectmedium robustnessen_US
dc.subjectmultilevelen_US
dc.subjectmandatory access controlen_US
dc.subjectMACen_US
dc.subjectdiscretionary access controlen_US
dc.subjectDACen_US
dc.subjectlabelsen_US
dc.subjectintegrityen_US
dc.subjectcryptographyen_US
dc.subjectmandatory integrity controlen_US
dc.subjectMICen_US
dc.titleTrusted Computing Exemplar (TCX) Project (archived)en_US
dc.typeWeb Page Captureen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record