Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_classification
|
| gptkbp:alsoKnownAs |
Controlled Access Protection
|
| gptkbp:appliesTo |
gptkb:personal_computer
operating systems |
| gptkbp:definedIn |
gptkb:Orange_Book
|
| gptkbp:introducedIn |
1983
|
| gptkbp:lowerAward |
TCSEC B1
|
| gptkbp:partOf |
gptkb:Trusted_Computer_System_Evaluation_Criteria
|
| gptkbp:rank |
TCSEC C1
|
| gptkbp:requires |
discretionary access control
audit of security-relevant events object reuse protection user identification and authentication |
| gptkbp:usedIn |
U.S. Department of Defense computer security evaluations
|
| gptkbp:bfsParent |
gptkb:Trusted_Xenix
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
TCSEC C2
|