A Guide to Understanding Audit in Trusted Systems
暂无分享,去创建一个
Abstract : This publication, "A Guide to Understanding Audit in Trusted Systems," is being issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215.1. The guidelines described in this document provide a set of good practices related to the use of auditing in automatic data processing systems employed for processing classified and other sensitive information.
[1] William S. Saric,et al. Visualization of Different Transition Mechanisms , 1986 .
[2] R L Brown. Guidelines for Audit Log Mechanisms in Secure Computer Systems , 1987 .