Bibliography

[biblio03_01] (DOD 1985) Department of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria, (DOD 5200.28-STD, Supercedes CSC-STD-001-83, dtd 15 Aug 83), http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html. 26 December 1985.

[biblio03_02] (Karger 1991) Karger,P.A., M.E.Zurko, D.W.Bonin, A.H.Mason, and C.E.Kahn. “A Retrospective on the VAX VMM Security Kernel,” Transactions on Software Engineering, 17(11):1147–1165. November 1991.

[biblio03_03] (ITSEC 1991) Commission of the European Communities. Information Technology Security Evaluation Criteria, Provisional Harmonised Criteria, Version 1.2, http://www.oc.ccn.cni.es/pdf/ITSEC.pdf. 28 June 1991.

[biblio03_04] (Common Criteria 2005) Common Criteria ...

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.