.


:




:

































 

 

 

 





Access identifier

Access matrix

Access object

Access subject

Access to information

Authorized access to information

Authentication

Cryptographic information protection facility

Discretionary access control

Identification

Information integrity

Information security

Mandatory access control

Multilevel secure

Password

Protection certificate

Protection class of computer systems

Protection criterion of computer systems

Protection facility

Protection from unauthorized access

Protection level certification

Protection model

Reference monitor concept

Secret information security system

Security administrator

Security kernel

Security policy

Security policy realization

Security policy violator

Security policy violators model

Sensitive information

Sensitivity label

Subject privilege

System of protection from unauthorized access to information

Trusted computing base

Trusted computer system

Unauthorized access to information

Verification

 

.
.

30 1992 .

-

-

-

-

-

-

-

-

-

-

-

- -

-

-

-

- -

- -

1.1. , , (), .

1.2. , , , .

1.3. - , :

;

;

.

1.4. , , : , , , .

, , , , , .

, , , .

, () () , () , , .

, .. .

2.1. , , , , .

, , , , .

2.2. , , , .

, .





:


: 2016-10-27; !; : 499 |


:

:

.
==> ...

1505 - | 1431 -


© 2015-2024 lektsii.org - -

: 0.011 .