4.4.1 (discretionary access control) , , ( ) ᒺ (, ᒺ) .
4.4.2 (mandatory access control) , , ᒺ , , .
4.4.3 (information export) - .
4.4.4 (information import) .
4.4.5 (identification) ᒺ ᒺ ; .
4.4.6 (authentication) - ᒺ ᒺ; .
4.4.7 (authentication information) , .
4.4.8 (password) , , , .
4.4.9 ; ϲ (personal identification number, PIN) , , , , .
4.4.10 (trusted path) , , , , .
4.4.11 (audit, auditing) , ᒺ, .
4.4.12 (audit trail) , 䳿.
4.4.13 (discretionary confidentiality) , .
4.4.14 (mandatory confidentiality) , .
4.4.15 (discretionary integrity) , .
4.4.16 (mandatory integrity) , .
|
|
4.4.17 (memory clearing) .
4.4.18 ᒺ (shared object) ᒺ , / .
4.4.19 ᒺ (object reuse) , 䳿 ᒺ, , .
4.4.20 (covert channels analyse) , , , , , .
4.4.21 (flow control) , , . 쳺 , ᒺ ᒺ .
4.4.22 ³ (rollback) , ᒺ ᒺ .
4.4.23 (quota) .
4.4.24 (fault tolerance) , .
4.4.25 (initialization) ᒺ .
4.4.26 (reference monitor) , : , .
4.4.27 (security kernel) , , .
4.4.28 (tag, access mediation information) - ᒺ , .
4.4.29 (access matrix) n- , ᒺ (ᒺ-, ᒺ- ᒺ), .
4.4.30 (access control list) / ᒺ , .
4.4.31 (privilege list, profile) ᒺ , .
4.4.32 ̳ (label) , ᒺ .
4.4.33 (security level) 峺 , (, ) .
4.4.34 г (access level) ᒺ.
4.4.35 г (clearance) , ᒺ, .
|
|
4.4.36 , , .
4.4.37 .
4.4.38 (data encryption) .
4.4.39 (data decryption) .
4.4.40 ³ (clear text) .
4.4.41 (ciphertext) , .
4.4.42 (key) , .
4.4.43 (data authentication code) , , .
4.4.44 (digital signature) , / (-, , , . .), .
4.4.45 (notarization) , , .