Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Trusted products evaluation
Chokhani S. Communications of the ACM35 (7):64-76,1992.Type:Article
Date Reviewed: Oct 1 1993

Commercial computer system products acquired by the US government to handle classified or other sensitive information must meet a security standard known as the “Orange Book.” Products are evaluated by the National Computer Security Center, which originated the standard and developed a procedure to perform evaluations, and which assigns each evaluated product a rating. A separate Department of Defense directive specifies what minimum rating is necessary for an application environment, depending on the sensitivity of the information and the clearance of the users. Getting products evaluated is therefore a major concern of computer system vendors supporting government customers.

This paper summarizes both the technical aspects of the standards and the evaluation procedures. As a member of the Technical Review Board, a consulting body that plays a crucial role in evaluations, the author is conversant with both areas, and the paper successfully conveys the flavor of the process as well as a considerable amount of factual information. I recommend it for anyone interested in how seriously the government treats computer security and for vendors who are considering having their products evaluated.

Reviewer:  Jon Millen Review #: CR116555
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
 
Protection Mechanisms (D.2.0 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Software Quality Assurance (SQA) (D.2.9 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
A comment on the ‘basic security theorem’ of Bell and LaPadula
McLean J. Information Processing Letters 20(2): 67-70, 1985. Type: Article
Dec 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy