A Guide to Understanding Identification and Authentication in Trusted Systems
NATIONAL COMPUTER SECURITY CENTER FORT GEORGE G MEADE MD
Pagination or Media Count:
This document provides a set of good practices related to the design and implementation of identification and authentication I A for systems employed for processing classified and other sensitive information. Its written to help vendors and evaluators understand I A requirements. It contains suggestions and recommendations derived from Trusted Computer System Evaluation Criteria TCSEC objectives but which arent required by the TCSEC.
- Computer Systems Management and Standards