{"title":"Applying the TNI to system certification and accreditation","authors":"R. Niemeyer","doi":"10.1109/CSAC.1989.81058","DOIUrl":null,"url":null,"abstract":"Department of Defense systems that process sensitive (including classified) information must undergo formal technical assessment and approval before they are allowed to operate. The technical assessment and approval processes are called certification and accreditation, respectively. The author presents issues involved in certifying and accrediting networks with respect to the two network views, the Single Trusted System (STS) view and the Interconnected Accredited AIS (IAA) view, presented in the Trusted Network Interpretation of the Trusted Computer Security Evaluation Criteria, NCSC-TG-005. Certification and Accreditation procedures differ significantly between the STS view and the IAA view of networks.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Department of Defense systems that process sensitive (including classified) information must undergo formal technical assessment and approval before they are allowed to operate. The technical assessment and approval processes are called certification and accreditation, respectively. The author presents issues involved in certifying and accrediting networks with respect to the two network views, the Single Trusted System (STS) view and the Interconnected Accredited AIS (IAA) view, presented in the Trusted Network Interpretation of the Trusted Computer Security Evaluation Criteria, NCSC-TG-005. Certification and Accreditation procedures differ significantly between the STS view and the IAA view of networks.<>