<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Assurance in C4I Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">C4I systems</style></keyword><keyword><style  face="normal" font="default" size="100%">common criteria.</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">evaluation criteria</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">43-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents a broader definition of security and examines the components of information assurance, as well as the main features of the information security policy, a set of requirements, and a system for information security. It reflects the authors' experience in development and implementation of information security systems in the Automated Information System of the Bulgarian armed forces, as well as their participation in the creation of the Strategy for Development of Information Society in Bulgaria. Some conclusions and recommendations from the 1999 U.S.-Bulgarian study of the C4 systems in the Bulgarian armed forces were also taken into account</style></abstract></record></records></xml>