Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
National Computer Security Center, DoD Trusted Computer System Evaluation Criteria, DoD, DoD 5200.28-STD, 1985.
Gligor, Virgil D., “Guidelines for Trusted Facility Management and Audit,” University of Maryland, 1985.
Brown, Leonard R., “Guidelines for Audit Log Mechanisms in Secure Computer Systems,” Technical Report TR-0086A(2770-29)-1, The Aerospace Corporation, 1986.
Subcommittee on Automated Information System Security, Working Group #3, “Dictionary of Computer Security Terminology,” 23 November 1986.
National Computer Security Center, Criterion Interpretation, Report No. C1-CI-02-87, 1987.
Author information
Consortia
Editor information
Copyright information
© 1985 National Computer Security Center
About this chapter
Cite this chapter
US Department of Defense. (1985). A Guide to Understanding Audit in Trusted Systems. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_10
Download citation
DOI: https://doi.org/10.1007/978-1-349-12020-8_10
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-0-333-53947-7
Online ISBN: 978-1-349-12020-8
eBook Packages: Computer ScienceComputer Science (R0)