Architectures for Secure Computing Systems,
MITRE CORP BEDFORD MASS
Pagination or Media Count:
The need for certifiable protection of information has been well established. This paper defines and describes architectural features of computers that would allow the effective construction of a secure computer system. Five large scale machines are compared with the identified architectural features. The machine judged most desirable for implementing a secure system is the Honeywell 6180. The other machines in the comparison are the Burroughs B6700, DEC System KI-10, IBM 370, and XDS Sigma 9.
- Computer Hardware
- Computer Systems Management and Standards