. . .. 3
. . 11
. . . .. 17
. . . . 45
. , . 63
. . . . . 83
. . . . 25 1997 . 97
. . - . - , . 101
.
.
30 1992 .
.
.
. .
( ) , , .
, .
1. () Access to information | , , , |
2. () Security policy | , |
3. Authorized access to information | , |
4. () Unauthorized access to information | , , . , |
5. ( ) Protection from unauthorized access | |
6. () Access subject | , |
7. () Access object | , |
8. Access matrix | , |
9. Subject privilege | |
10. ( ) Security policy violator | , |
11. ( ) Security policy violators model | ( ) |
12. () Trusted computing base | , |
13. () Security policy realization | |
14. Access identifier | |
15. Identification | () |
16. Password | , () |
17. Authentication | ; |
18. ( ) Trusted computer system | ( ), |
19. ( ) Protection facility | , - , |
20. Protection model | ( ) - () |
21. Information security | , , |
22. Information integrity | () () |
23. Sensitive information | , |
24. Discretionary access control | . |
25. Mandatory access control | , , , () |
26. Multilevel secure | , |
27. Reference monitor concept | , , |
28. ( ) Security kernel | , , |
29. Security administrator | , |
30. () Sensitivity label | , , |
31. Verification | |
32. ( ) Protection class of computer systems | ( ) |
33. ( ) Protection criterion of computer systems | , , , |
34. () Secret information security system | - ( ) |
35. ( ) System of protection from unauthorized access to information | - ( ) |
36. () Cryptographic information protection facility | , |
37. () Protection certificate | , () |
38. () Protection level certification |
|
|
|
|
|
|
( )
( )