Criteria Security Evaluation for Information
Technology
Introduction and general model
Security functional requirements
Security assurance requirements Evaluation Methodology for Information Technology Security
Introduction and general model
Evaluation Methodology Methodology for Information Technology Security Evaluation
Evaluation Methodology FOREWORD
Role-Based Access Control Models
Guidelines on Active Content and Mobile Code
Recommendations of the National Institute of Standards and Technology
THE CHINESE WALL SECURITY POLICY
Introduction and general model
Security functional requirements
Security assurance requirements Evaluation Methodology for Information Technology Security
Introduction and general model
Evaluation Methodology Methodology for Information Technology Security Evaluation
Evaluation Methodology FOREWORD
Role-Based Access Control Models
Guidelines on Active Content and Mobile Code
Recommendations of the National Institute of Standards and Technology
THE CHINESE WALL SECURITY POLICY