Need to Know More?
Protection rings: www.multicians.org/protection.pdf
Common Criteria: http://www.niap-ccevs.org/cc-scheme/
Smashing the stack for fun and profit: http://insecure.org/stf/smashstack.html
Covert-channel attacks: http://www.cyberguard.com/download/white_paper/en_cg_covert_channels.pdf
Java security: http://java.sun.com/javase/technologies/security/
How Windows measures up to TCSEC standards: http://technet.microsoft.com/en-us/library/cc767092.aspx
The Rainbow Series: http://csrc.nist.gov/publications/secpubs/rainbow/
The Bell-LaPadula model: http://www.computing.dcu.ie/~davids/courses/CA548/C_I_Policies.pdf
ISO 17799: http://www.iso.org/iso/home.htm