Accession Number:
ADA393187
Title:
A Guide to Understanding Identification and Authentication in Trusted Systems
Descriptive Note:
Final rept.
Corporate Author:
NATIONAL COMPUTER SECURITY CENTER FORT GEORGE G MEADE MD
Personal Author(s):
Report Date:
1991-09-01
Pagination or Media Count:
34.0
Abstract:
This document provides a set of good practices related to the design and implementation of identification and authentication I A for systems employed for processing classified and other sensitive information. Its written to help vendors and evaluators understand I A requirements. It contains suggestions and recommendations derived from Trusted Computer System Evaluation Criteria TCSEC objectives but which arent required by the TCSEC.
Descriptors:
Subject Categories:
- Computer Systems Management and Standards