The Trusted System Evaluation Criteria - Part 2
Copyright(c) Management Analytics, 1995 - All Rights Reserved
Part II: Rationale and Guidelines
5.0 Control Objectives for Trusted Computer Systems
6.0 Rationale Behind the Evaluation Classes
7.0 The Relationship Between Policy and The Criteria
8.0 A Guideline on Covert Channels
9.0 A Guideline on Configuring Mandatory Access Control Features
10.0 A Guideline on Security Testing