Title :
Proposed security for critical Air Force missions
Author :
Johnson, Howard L. ; Arvin, Chuck ; Jenkinson, Earl ; Pierce, Captain Bob
Abstract :
Air Force missions could be forced to fail by an enemy agent launching a malicious logic attack. These missions must be protected. Because of the imminent, potential danger, a protection approach has been developed that is easily understood and implemented for a minimum cost-because it uses Orange Book methods and mechanisms. The criteria for protection of critical systems are given as the G3 division/class of the Air Force Trusted Critical Computer System Evaluation Criteria (AFTCCSEC)
Keywords :
computer viruses; military computing; security of data; Orange Book methods; critical Air Force missions; enemy agent; malicious logic attack; Computer aided instruction; Computer crime; Computer security; Cryptography; Fault detection; Information security; Logic; Military computing; Object detection; Protection;
Conference_Titel :
Computer Security Applications Conference, 1991. Proceedings., Seventh Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-2280-6
DOI :
10.1109/CSAC.1991.213004