By Topic

Configuring a trusted system using the TNI

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Powanda, E.J. ; Unisys Corp., Paoli, PA, USA ; Genovese, J.W.

The authors summarize a study performed to identify and evaluate alternatives for achieving an acceptable level of risk in a distributed system by utilizing computer components with the lowest TCSEC (trusted computer system evaluation criteria) ratings acceptable under DoD guidelines. The security implications of connecting equipments that handle differing sensitivity levels of data are examined together with the consequences of using equipments using trusted system technology, utilizing personnel with higher clearances, and separating data by sensitivity level as ways of achieving a desired level of trust in a multilevel system. The rationale for choosing this system is that it is large enough to demonstrate the implications of the guidelines given in the trusted network interpretation (TNI), yet small enough to easily verify the validity of the results

Published in:

Aerospace Computer Security Applications Conference, 1988., Fourth

Date of Conference:

12-16 Dec 1988