Skip to main content
Article thumbnail
Location of Repository

OF TRUSTED SYSTEMS

By Fort George G. Meade

Abstract

Version 1 A Guide to Understanding Covert Channel Analysis of Trusted Systems provides a set of good practices related to covert channel analysis. We have written this guide to help the vendor and evaluator communities understand the requirements for covert channel analysis as described in the Department of Defense Trusted Computer System Evaluation Criteria (TCSEC). In an effort to provide guidance, we make recommendations in this technical guide that are not cited in the TCSEC. This guide is the latest in a series of technical guidelines published by the National Computer Security Center. These publications provide insight to the TCSEC requirements for the computer security vendor and technical evaluator. The goals of the Technical Guideline Program are to discuss each feature of the TCSEC in detail and to provide the proper interpretations with specific guidance

Topics: ACKNOWLEDGMENTS
Year: 1993
OAI identifier: oai:CiteSeerX.psu:10.1.1.135.6109
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://cs.unomaha.edu/~stanw/p... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.