File:Bell76.pdf
Original file (1,275 × 1,650 pixels, file size: 738 KB, MIME type: application/pdf, 134 pages)
Captions
Summary
[edit]DescriptionBell76.pdf | A unified narrative exposition of the ESD/MITRE computer security model is presented. A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications paths, sabotage and integrity) conclude the report. A full, formal presentation of the model is included in the appendix. |
Date | |
Source | US Government |
Author | Bell, D.E.; La Padula, L.J |
Licensing
[edit]Public domainPublic domainfalsefalse |
This image or file is a work of a U.S. Air Force Airman or employee, taken or made as part of that person's official duties. As a work of the U.S. federal government, the image or file is in the public domain in the United States.
العربية ∙ беларуская (тарашкевіца) ∙ català ∙ čeština ∙ Deutsch ∙ English ∙ español ∙ eesti ∙ فارسی ∙ suomi ∙ français ∙ italiano ∙ 日本語 ∙ 한국어 ∙ македонски ∙ മലയാളം ∙ မြန်မာဘာသာ ∙ norsk bokmål ∙ Plattdüütsch ∙ Nederlands ∙ polski ∙ português ∙ português do Brasil ∙ русский ∙ sicilianu ∙ slovenčina ∙ slovenščina ∙ српски / srpski ∙ svenska ∙ Türkçe ∙ українська ∙ Tiếng Việt ∙ 中文(简体) ∙ 中文(繁體) ∙ +/− |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 18:52, 7 July 2010 | 1,275 × 1,650, 134 pages (738 KB) | Mbstern (talk | contribs) | {{Information |Description=A unified narrative exposition of the ESD/MITRE computer security model is presented. A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications |
You cannot overwrite this file.
File usage on Commons
There are no pages that use this file.
File usage on other wikis
The following other wikis use this file:
- Usage on en.wikipedia.org
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Secure Computer System: Unified Exposition and Multics Interpretation |
---|---|
Image title | computer security |
Author | David E. Bell, Leonard J. LaPadula |
Keywords |
|
Software used | PdfCompressor 5.0.143 |
Conversion program | CVISION Technologies |
Encrypted | yes (print:yes copy:yes change:no addNotes:no algorithm:RC4) |
Version of PDF format | 1.4 |
Page size | 612 x 792 pts (letter) |