... operation, will be one of the first systems to use the Honeywell Secure Communications Processor (SCOMP) in an operational environment. ... The security perimeter for the system is clearly defined, including manual and automatic trusted processes to control access to ... We are all familiar with the scenario of the user whose password is the spousea#39;s or childrensa#39; first names. ... One system we looked at allowed any user to look at the audit trail, change it, or delete the whole thing.
|Title||:||Proceedings of the sixth Seminar on the DOD Computer Security Initiative|
|Author||:||United States. Dept. of Defense|