. . .
, : ( ), ( ), ( ). , , . , .
() : , .
() , (, , ), .
() , , . () , .
(Security Policy).
, -
.
(Security Model).
.
,
(Discretionery Access Control). , -
-
( <-
, , >).
, ,
(Mandatory Access Control). ,
,
, -
,
.
(Trusted Computing Base ()).-
,
, .
(Identification).
(-
).
( Autentification).
(-
) .
(Assurance). -
, -
|
|
-
( ).
, -
(Evaluation).
.
(Taxonomy). -
,
. , -
-,
( -).
(Trusted Path). -
( ,
), ,
.