Security Architecture and Design

m

Security models

Information Systems Evaluation Models

Computer systems

Impacts from

Covert channels

State attacks

Time of check

Time of use

Emanations

Maintenance hooks and privileged programs

Countermeasures

Assurance, trust, confidence

Trusted computer base, reference monitors and kernels