首页> 美国政府科技报告 >Guide to Understanding Trusted Recovery in Trusted Systems
【24h】

Guide to Understanding Trusted Recovery in Trusted Systems

机译:了解可信系统中可信恢复的指南

获取原文

摘要

This document provides a set of good practices related to the design andimplementation of trusted recovery functions for systems employed for processing classified and other sensitive information. It provides guidance to manufacturers on what functions of trusted recovery to incorporate into their systems, and to system evaluators on how to evaluate the design and implementation of trusted recovery functions. It contains suggestions and recommendations derived from Trusted Computer System Evaluation Criteria (TCSEC) objectives but which aren't required by the TCSEC. This guideline isn't a tutorial introduction to the topic of recovery but is a summary of trusted recovery issues that should be addressed by operating systems designed to satisfy the requirements of the B3 and Al classes, Computer security: Trusted Computer System Evaluation Criteria (TCSEC); automated data processing (ADP); trusted recovery; operating systems.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号