O'Reilly logo

Computer Security: Art and Science by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 21. Evaluating Systems

 

LEONATO: O, she tore the letter into a thousandhalfpence; railed at herself, that she should beso immodest to write to one that she knew wouldflout her; 'I measure him,' says she, 'by my ownspirit; for I should flout him, if he writ to me;                  yea, though I love him, I should.'

 
 --Much Ado About Nothing, II, iii, 150–161

Evaluation is a process in which the evidence for assurance is gathered and analyzed against criteria for functionality and assurance. It can result in a measure of trust that indicates how well a system meets particular criteria. The criteria used depend on the goals of the evaluation and the evaluation technology used. The Trusted Computer System Evaluation Criteria (TCSEC) was the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required