H. Johnson, Chuck Arvin, Earl Jenkinson, B. Pierce
{"title":"空军关键任务的拟议安全","authors":"H. Johnson, Chuck Arvin, Earl Jenkinson, B. Pierce","doi":"10.1109/CSAC.1991.213004","DOIUrl":null,"url":null,"abstract":"Air Force missions could be forced to fail by an enemy agent launching a malicious logic attack. These missions must be protected. Because of the imminent, potential danger, a protection approach has been developed that is easily understood and implemented for a minimum cost-because it uses Orange Book methods and mechanisms. The criteria for protection of critical systems are given as the G3 division/class of the Air Force Trusted Critical Computer System Evaluation Criteria (AFTCCSEC).<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Proposed security for critical Air Force missions\",\"authors\":\"H. Johnson, Chuck Arvin, Earl Jenkinson, B. Pierce\",\"doi\":\"10.1109/CSAC.1991.213004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Air Force missions could be forced to fail by an enemy agent launching a malicious logic attack. These missions must be protected. Because of the imminent, potential danger, a protection approach has been developed that is easily understood and implemented for a minimum cost-because it uses Orange Book methods and mechanisms. The criteria for protection of critical systems are given as the G3 division/class of the Air Force Trusted Critical Computer System Evaluation Criteria (AFTCCSEC).<<ETX>>\",\"PeriodicalId\":108621,\"journal\":{\"name\":\"Proceedings Seventh Annual Computer Security Applications Conference\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings Seventh Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1991.213004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1991.213004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Air Force missions could be forced to fail by an enemy agent launching a malicious logic attack. These missions must be protected. Because of the imminent, potential danger, a protection approach has been developed that is easily understood and implemented for a minimum cost-because it uses Orange Book methods and mechanisms. The criteria for protection of critical systems are given as the G3 division/class of the Air Force Trusted Critical Computer System Evaluation Criteria (AFTCCSEC).<>