Security Architecture and Design
Security models
Information Systems Evaluation Models
Computer systems
Impacts from
Covert channels
State attacks
Time of check
Time of use
Emanations
Maintenance hooks and privileged programs
Countermeasures
Assurance, trust, confidence
Trusted computer base, reference monitors and kernels