Skip to main content

A Guide to Understanding Audit in Trusted Systems

  • Chapter
The ‘Orange Book’ Series
  • 1047 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Computer Security Center, DoD Trusted Computer System Evaluation Criteria, DoD, DoD 5200.28-STD, 1985.

    Google Scholar 

  2. Gligor, Virgil D., “Guidelines for Trusted Facility Management and Audit,” University of Maryland, 1985.

    Google Scholar 

  3. Brown, Leonard R., “Guidelines for Audit Log Mechanisms in Secure Computer Systems,” Technical Report TR-0086A(2770-29)-1, The Aerospace Corporation, 1986.

    Google Scholar 

  4. Subcommittee on Automated Information System Security, Working Group #3, “Dictionary of Computer Security Terminology,” 23 November 1986.

    Google Scholar 

  5. National Computer Security Center, Criterion Interpretation, Report No. C1-CI-02-87, 1987.

    Google Scholar 

Download references

Author information

Consortia

Editor information

Copyright information

© 1985 National Computer Security Center

About this chapter

Cite this chapter

US Department of Defense. (1985). A Guide to Understanding Audit in Trusted Systems. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-12020-8_10

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-0-333-53947-7

  • Online ISBN: 978-1-349-12020-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics