Access matrix
Access object
Access subject
Access to information
Authorized access to information
Authentication
Cryptographic information protection facility
Discretionary access control
Identification
Information integrity
Information security
Mandatory access control
Multilevel secure
Password
Protection certificate
Protection class of computer systems
Protection criterion of computer systems
Protection facility
Protection from unauthorized access
Protection level certification
Protection model
Reference monitor concept
Secret information security system
Security administrator
Security kernel
Security policy
Security policy realization
Security policy violator
Security policy violator's model
Sensitive information
Sensitivity label
Subject privilege
System of protection from unauthorized access to information
Trusted computing base
Trusted computer system
Unauthorized access to information
Verification