Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
S
S
S&T
SAO
SAP
SAV
Say
SCG
SCI
SCP
SDR
Set
S-F
SFA
SI
SIG
SMM
SMO
SMU
SO
SOH
SON
SOS
SOW
SPK
Spl
SPO
SPS
Spy
SRI
SRP
SRR
SSE
SSO
SSR
STD
STI
STS
STU
STX
SUB
SYN
Security Domains
  • The sets of objects that a subject has the ability to access. (Source: Information Security: Dictionary of Concepts, Standards and Terms; Longley, Shain, Caelli; Macmillan, 1992).
  • (Class B3) Advanced Trusted Computing Base (TCB) which provides highly effective Discretionary Access Controls (DAC) and Mandatory Access Controls (MAC). Significant security and software engineering must be accomplished during the design, implementation, and testing phases to achieve the required level of confidence, or trust. Operational support features extend auditing capabilities as well as other functions needed for a trusted system recovery. (F:\NEWDEFS. TXT) (Class B3) Advanced Trusted Computing Base (TCB) which provides highly effective Discretionary Access Controls (DAC) and Mandatory Access Controls (MAC). Significant security and software engineering must be accomplished during the design, implementation, and testing phases to achieve the required level of confidence, or trust. Operational support features extend auditing capabilities as well as other functions needed for a trusted system recovery.