Accession Number:

ADA393187

Title:

A Guide to Understanding Identification and Authentication in Trusted Systems

Descriptive Note:

Final rept.

Corporate Author:

NATIONAL COMPUTER SECURITY CENTER FORT GEORGE G MEADE MD

Personal Author(s):

Report Date:

1991-09-01

Pagination or Media Count:

34.0

Abstract:

This document provides a set of good practices related to the design and implementation of identification and authentication I A for systems employed for processing classified and other sensitive information. Its written to help vendors and evaluators understand I A requirements. It contains suggestions and recommendations derived from Trusted Computer System Evaluation Criteria TCSEC objectives but which arent required by the TCSEC.

Subject Categories:

  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE