Restricted access processor - An application of computer security technologyThis paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
Document ID
19850060449
Acquisition Source
Legacy CDMS
Document Type
Conference Paper
Authors
Mcmahon, E. M. (Computer Sciences Corp. Systems Div., Falls Church, VA, United States)
Date Acquired
August 12, 2013
Publication Date
January 1, 1985
Subject Category
Computer Operations And Hardware
Meeting Information
Meeting: Protecting intellectual property in space