Architectures for Secure Computing Systems,
Abstract:
The need for certifiable protection of information has been well established. This paper defines and describes architectural features of computers that would allow the effective construction of a secure computer system. Five large scale machines are compared with the identified architectural features. The machine judged most desirable for implementing a secure system is the Honeywell 6180. The other machines in the comparison are the Burroughs B6700, DEC System KI-10, IBM 370, and XDS Sigma 9.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution:
Approved For Public Release
RECORD
Collection: TR