Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 72
Book Description
OS/VS2 MVS Resource Access Control Facility (RACF)
Resource Access Control Facility (RACF), Version 1, Release 5
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
The security features of RACF/MVS were evaluated against the requirements specified by the DoD Trusted Computer System Evaluation Criteria dated 15 Aug 1983 and found to satisfy all the requirements of evaluation Class C1. The Department of Defense Computer Security Center (DoDCSC) was established in January 1981 to encourage the widespread availability of trusted computer systems for use by facilities processing classified or other sensitive data. In the first quarter of FY83, International Business Machines Inc., (IBM), requested that the DoDCSC evaluate their commercially available Resource Access Control Facility (RACF) Program Product Version 1, Release 5 for the OS/VS2 MVS operating systems as specified in the RACF general Information Manual. MVS is an IBM operating system for its 303x, 308x, 370/158, and 370/168 processors. Keywords include: Trusted computer system evaluation criteria, Resource access control facility, C1, EPL, DoDCSC, RACF, IBM, and MVS.
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
The security features of RACF/MVS were evaluated against the requirements specified by the DoD Trusted Computer System Evaluation Criteria dated 15 Aug 1983 and found to satisfy all the requirements of evaluation Class C1. The Department of Defense Computer Security Center (DoDCSC) was established in January 1981 to encourage the widespread availability of trusted computer systems for use by facilities processing classified or other sensitive data. In the first quarter of FY83, International Business Machines Inc., (IBM), requested that the DoDCSC evaluate their commercially available Resource Access Control Facility (RACF) Program Product Version 1, Release 5 for the OS/VS2 MVS operating systems as specified in the RACF general Information Manual. MVS is an IBM operating system for its 303x, 308x, 370/158, and 370/168 processors. Keywords include: Trusted computer system evaluation criteria, Resource access control facility, C1, EPL, DoDCSC, RACF, IBM, and MVS.
Catalog of Copyright Entries. Third Series
Author: Library of Congress. Copyright Office
Publisher: Copyright Office, Library of Congress
ISBN:
Category : Copyright
Languages : en
Pages : 1914
Book Description
Publisher: Copyright Office, Library of Congress
ISBN:
Category : Copyright
Languages : en
Pages : 1914
Book Description
The Use of Passwords for Controlled Access to Computer Resources
Author: Helen M. Wood
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 64
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 64
Book Description
MVS Resource Access Control Facility (RACF) Command Language Reference
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computers
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages :
Book Description
NBS Special Publication
Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 464
Book Description
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 464
Book Description
A Guide to Writing the Security Features User's Guide for Trusted Systems
Author:
Publisher: DIANE Publishing
ISBN: 9780788122316
Category : Computers
Languages : en
Pages : 50
Book Description
Designed for authors of the Security Features User's Guide (SFUG) for a specific trusted system undergoing evaluation as a trusted product. Discusses the intent behind the requirement for a Security Features User's Guide and the relationship to other requirements in Trusted Computer System Evaluation Criteria. Describes the various approaches to writing a SFUG. Extensive bibliography.
Publisher: DIANE Publishing
ISBN: 9780788122316
Category : Computers
Languages : en
Pages : 50
Book Description
Designed for authors of the Security Features User's Guide (SFUG) for a specific trusted system undergoing evaluation as a trusted product. Discusses the intent behind the requirement for a Security Features User's Guide and the relationship to other requirements in Trusted Computer System Evaluation Criteria. Describes the various approaches to writing a SFUG. Extensive bibliography.
Catalog of Copyright Entries
Author: Library of Congress. Copyright Office
Publisher:
ISBN:
Category : Copyright
Languages : en
Pages : 2226
Book Description
Publisher:
ISBN:
Category : Copyright
Languages : en
Pages : 2226
Book Description
Introduction to IBM Direct Access Storage Devices
Author: Marilyn Bohl
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 244
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 244
Book Description
Health and the Environment Miscellaneous
Author: United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Health and the Environment
Publisher:
ISBN:
Category : Abortion
Languages : en
Pages : 628
Book Description
Publisher:
ISBN:
Category : Abortion
Languages : en
Pages : 628
Book Description