ABSTRACT

Ironically, many of the features of Orange Book that were shunned in the commercial marketplace decades ago are now being embraced in one form or another in security implementations as the only sensible solutions to the environment we fi nd ourselves in today. Perhaps Orange Book requirements were simply decades ahead of their time.