{"title":"将COMPUSEC原理应用于封闭网络系统","authors":"B. Worger, J. McDonald, B. Schaefer","doi":"10.1109/NAECON.1991.165751","DOIUrl":null,"url":null,"abstract":"Discusses the application of the trusted computer system evaluation criteria (TCSEC) and the trusted network interpretation (TNI) to closed network systems (systems which are entirely contained within a single secure enclosure such as a tank, ship, or aircraft). The authors discuss various COMPUSEC (computer security) principles (focused in the B division, but not specific to a class) and their applicability to closed systems. They also make suggestions on how to use unique properties of the closed systems to reduce the impact of incorporating COMPUSEC principles into these systems.<<ETX>>","PeriodicalId":247766,"journal":{"name":"Proceedings of the IEEE 1991 National Aerospace and Electronics Conference NAECON 1991","volume":"449 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Apply COMPUSEC principles to closed network systems\",\"authors\":\"B. Worger, J. McDonald, B. Schaefer\",\"doi\":\"10.1109/NAECON.1991.165751\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Discusses the application of the trusted computer system evaluation criteria (TCSEC) and the trusted network interpretation (TNI) to closed network systems (systems which are entirely contained within a single secure enclosure such as a tank, ship, or aircraft). The authors discuss various COMPUSEC (computer security) principles (focused in the B division, but not specific to a class) and their applicability to closed systems. They also make suggestions on how to use unique properties of the closed systems to reduce the impact of incorporating COMPUSEC principles into these systems.<<ETX>>\",\"PeriodicalId\":247766,\"journal\":{\"name\":\"Proceedings of the IEEE 1991 National Aerospace and Electronics Conference NAECON 1991\",\"volume\":\"449 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE 1991 National Aerospace and Electronics Conference NAECON 1991\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON.1991.165751\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE 1991 National Aerospace and Electronics Conference NAECON 1991","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.1991.165751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Apply COMPUSEC principles to closed network systems
Discusses the application of the trusted computer system evaluation criteria (TCSEC) and the trusted network interpretation (TNI) to closed network systems (systems which are entirely contained within a single secure enclosure such as a tank, ship, or aircraft). The authors discuss various COMPUSEC (computer security) principles (focused in the B division, but not specific to a class) and their applicability to closed systems. They also make suggestions on how to use unique properties of the closed systems to reduce the impact of incorporating COMPUSEC principles into these systems.<>