5.8 Terms and Concepts

 <  Free Open Study  >  

secure, 230

lattice model, 239

trust, 231

Bell “La Padula model, 241

trusted process, 231

simple security property, 242

trusted software, 231

*-property, 242

trusted system, 231

write-down, 242

security policy, 232

Biba model, 243

military security policy, 232

simple integrity policy, 243

sensitivity level, 232

integrity *-property, 243

object, 232

Graham “Denning model, 244

need-to-know rule, 232

Harrison “Ruzzo “Ullman model, 245

compartment , 232

take “grant system, 248

classification, 234

least privilege, 252

clearance, 234

economy of mechanism, 252

dominance , 234

open design, 252

subject, 234

complete mediation, 252

hierarchical security, 235

permission-based access, 252

nonhierarchical security, 235

separation of privilege, 252

Clark “Wilson policy, 236

least common mechanism, 252

well- formed transaction, 237

ease of use, 253

constrained data item, 237

user authentication, 253

transformation procedure, 237

memory protection, 254

access triple, 237

object access control, 254

separation of duty, 237

enforced sharing, 254

Chinese wall policy, 237

fair service, 254

interprocess communication, 254

formal verification, 278

synchronization, 254

proof of correctness, 278

protected control data, 254

theorem prover, 278

user identification and authentication, 256

validation, 281

requirements checking, 281

mandatory access control, 256

design and code review, 281

discretionary access control, 256

module and system testing, 281

object reuse, 256

open source, 281

magnetic remanence, 257

evaluation, 282

trusted path , 257

Orange Book (TCSEC), 283

audit, 257

D, C1, C2, B1, B2, B3, A1 rating, 283

audit log reduction, 258

German Green Book, 286

accountability, 258

functionality class, 287

intrusion detection, 259

assurance level, 287

kernel, 259

British evaluation criteria, 287

nucleus, 259

claims language, 287

core , 259

action phrase, 287

security kernel, 260

target phrase, 288

reference monitor, 260

CLEF, 289

tamperproofness, 261

comparable evaluation, 289

unbypassability, 261

transferable evaluation, 289

analyzability, 261

ITSEC, 289

trusted computing base (TCB), 261

effectiveness, 289

process activation, 262

target of evaluation, 289

execution domain switching, 263

security-enforcing function, 289

memory protection, 263

mechanism, 290

physical separation, 265

strength of mechanism, 290

temporal separation, 265

target evaluation level, 290

cryptographic separation, 266

suitability of functionality, 290

logical separation, 266

binding of functionality, 290

virtualization, 266

vulnerabilities, 290

virtual machine, 266

Combined Federal Criteria, 291

virtual memory, 267

protection profile, 291

layering, 269

security target, 291

hierarchically structured operating system, 271

Common Criteria, 292

extensibility, 294

assurance, 273

granularity, 294

flaw exploitation, 274

objectivity, 295

I/O processing flaw, 274

portability, 295

access ambiguity flaw, 274

emphatic assertion, 297

incomplete mediation flaw, 275

Unix, 298

generality flaw, 274

PR/SM, 299

time-of-check to time-of-use flaw, 275

logical partition manager, 300

testing, 276

domain, 300

test coverage, 276

VAX Security Kernel, 301

penetration testing, 276

 
 <  Free Open Study  >  


Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net