First page Back Continue Last page Graphics
Concept of Trusted Systems
We’ve been concerned with protecting a message from active or passive attack by given user
Different requirement is to protect data or resources on the basis of security levels (unclassified, confidential, secret and top secret)