Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,389,617 papers from all fields of science
Search
Sign In
Create Free Account
Trusted Computer System Evaluation Criteria
Known as:
TCSEC 1
, D (disambiguation)
, A1 security
Expand
Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
A/UX
AIX
Access control
Clark–Wilson model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
Ukraine's Orange Revolution, NGOs and the Role of the West*
Andrew Wilson
2006
Corpus ID: 144657370
This article examines the role of Western support for domestic non-governmental organisations during the 2004 Ukrainian election…
Expand
2004
2004
If A1 is the answer, what was the question? An Edgy Naif's retrospective on promulgating the trusted computer systems evaluation criteria
M. Schaefer
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 9864571
This paper provides an introspective retrospective on the history and development of the United States Department of Defense…
Expand
Highly Cited
2003
Highly Cited
2003
Strategies for Information Systems Evaluation : Six Generic Types
Stefan Cronholm
,
G. Goldkuhl
2003
Corpus ID: 11529140
The aim of this paper is to contribute to the decision of how to perform evaluation depending on the evaluation context. Three…
Expand
2002
2002
DoD 5200 . 28-STD-DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
2002
Corpus ID: 145028280
This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the…
Expand
Highly Cited
2002
Highly Cited
2002
On the role of middleware in architecture-based software development
N. Medvidović
International Conference on Software Engineering…
2002
Corpus ID: 803126
Software architectures promote development focused on modular functional building blocks (components), their interconnections…
Expand
1998
1998
Information security management (1): why information security is so important
R. V. Solms
Information Management & Computer Security
1998
Corpus ID: 31887942
Information security has become very important in most organizations. The main reason for this is that access to information and…
Expand
Review
1996
Review
1996
Safety and Immunogenicity of a Candidate HIV-1 Vaccine in Healthy Adults: Recombinant Glycoprotein (rgp) 120: A Randomized, Double-Blind Trial
B. Graham
,
M. Keefer
,
+7 authors
P. Fast
Annals of Internal Medicine
1996
Corpus ID: 53087650
Development of a vaccine is crucial for controlling the global epidemic of human immunodeficiency virus type 1 (HIV-1) infection…
Expand
1987
1987
Network security: Protocol reference model and the trusted computer system evaluation criteria
M. Abrams
,
Albert B. Jeng
IEEE Network
1987
Corpus ID: 17544152
Issues arising from the application of the Trusted Computer System Evaluation Criteria (TCSEC) to networks are discussed…
Expand
1979
1979
Proposed Technical Evaluation Criteria for Trusted Computer Systems
G. H. Nibaldi
1979
Corpus ID: 60459857
Abstract : The DoD has established a Computer Security Initiative to foster the wide-spread availability of trusted computer…
Expand
Highly Cited
1979
Highly Cited
1979
Investigations on the inheritance of color and carotenoid content in phloem and xylem of carrot roots (Daucus carota L.)
J. G. Buishand
,
andW. H. Gabelman
Euphytica
1979
Corpus ID: 20325765
SummaryInvestigations on the inheritance of root color in carrot (Daucus carota L.) were carried out by crossing uniformly…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE