Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,964,102 papers from all fields of science
Search
Sign In
Create Free Account
Trusted Computer System Evaluation Criteria
Known as:
TCSEC 1
, D (disambiguation)
, A1 security
Expand
Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
A/UX
AIX
Access control
Clark–Wilson model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
An approximating C2 non-stationary subdivision scheme
Sunita Daniel
,
P. Shunmugaraj
Computer Aided Geometric Design
2009
Corpus ID: 42288987
Highly Cited
2006
Highly Cited
2006
Chapter 4 On the Selection of Domains and Orbital Pairs in Local Correlation Treatments
H. Werner
,
K. Pflüger
2006
Corpus ID: 88506167
Highly Cited
2006
Highly Cited
2006
Ukraine's Orange Revolution, NGOs and the Role of the West*
Andrew Wilson
2006
Corpus ID: 144657370
This article examines the role of Western support for domestic non-governmental organisations during the 2004 Ukrainian election…
Expand
2004
2004
If A1 is the answer, what was the question? An Edgy Naif's retrospective on promulgating the trusted computer systems evaluation criteria
M. Schaefer
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 9864571
This paper provides an introspective retrospective on the history and development of the United States Department of Defense…
Expand
2002
2002
DoD 5200 . 28-STD-DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
2002
Corpus ID: 145028280
This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the…
Expand
Highly Cited
2002
Highly Cited
2002
On the role of middleware in architecture-based software development
N. Medvidović
International Conference on Software Engineering…
2002
Corpus ID: 803126
Software architectures promote development focused on modular functional building blocks (components), their interconnections…
Expand
Review
1999
Review
1999
The evaluation of legal knowledge based systems
A. Stranieri
,
John Zeleznikow
International Conference on Artificial…
1999
Corpus ID: 16261707
Evaluation strategies to assess the effectiveness of legal knowledge based systems enable strengths and limitations of systems to…
Expand
Review
1996
Review
1996
Safety and Immunogenicity of a Candidate HIV-1 Vaccine in Healthy Adults: Recombinant Glycoprotein (rgp) 120: A Randomized, Double-Blind Trial
B. Graham
,
M. Keefer
,
+7 authors
P. Fast
Annals of Internal Medicine
1996
Corpus ID: 53087650
Development of a vaccine is crucial for controlling the global epidemic of human immunodeficiency virus type 1 (HIV-1) infection…
Expand
1979
1979
Proposed Technical Evaluation Criteria for Trusted Computer Systems
G. H. Nibaldi
1979
Corpus ID: 60459857
Abstract : The DoD has established a Computer Security Initiative to foster the wide-spread availability of trusted computer…
Expand
Highly Cited
1978
Highly Cited
1978
Non-linear fracture mechanics
S. Burns
,
J. Pollet
,
C. Chow
International Journal of Fracture
1978
Corpus ID: 134980733
The fracture of solids is analyzed using the formalism of equilibrium mechanics. A partially cracked, mechanically loaded…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE