Architectures for Secure Computing Systems,

reportActive / Technical Report | Accession Number: ADA009221 | Need Help?

Abstract:

The need for certifiable protection of information has been well established. This paper defines and describes architectural features of computers that would allow the effective construction of a secure computer system. Five large scale machines are compared with the identified architectural features. The machine judged most desirable for implementing a secure system is the Honeywell 6180. The other machines in the comparison are the Burroughs B6700, DEC System KI-10, IBM 370, and XDS Sigma 9.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release

RECORD

Collection: TR
Identifying Numbers
Subject Terms