Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ACKNOWLEDGEMENTS<br />
This document has been produced under <strong>the</strong> guidance <strong>of</strong> Major (USA) Melvin L.<br />
DeVilbiss, assisted by CPT (USA) Michael Gold and Mary Whittaker, from <strong>the</strong><br />
National Security Agency. Much <strong>of</strong> this document is taken directly from<br />
"Computer Security in Acquisitions (Draft)," prepared by <strong>the</strong> Air Force<br />
Intelligence Command (AFIC), Air Force Cryp<strong>to</strong>logic Support Center, Direc<strong>to</strong>rate<br />
<strong>of</strong> Securities (AFCSC/SR), under <strong>the</strong> direction <strong>of</strong> Captain (USAF) Bob Pierce.<br />
Initial ideas for <strong>the</strong> Air Force draft document were those <strong>of</strong> TRACOR, Inc.<br />
Interpretation and adaptation as a DoD handbook was accomplished by Howard<br />
Johnson, Information Intelligence Sciences, Inc.<br />
The following organizations were particularly helpful in providing<br />
constructive reviews and advice: Harris, Grumman Data <strong>Systems</strong>, CTA, Inc.,<br />
Seidcon, Naval Computer and Telecommunications Command, Naval Electronic<br />
<strong>Systems</strong> Security Engineering Center, U.S. Army Information <strong>Systems</strong> Engineering<br />
Command, GSA, MlTRE, Federal Emergency Management Agency, and Logicon.<br />
Special thanks <strong>to</strong> Carol Oakes, Senior Technical Edi<strong>to</strong>r, MITRE, for her<br />
assistance with final editing <strong>of</strong> this guideline.<br />
<strong>Page</strong> 12