Title :
A software engineering approach to designing trustworthy software
Author :
Cornwell, Mark R.
Author_Institution :
US Naval Res. Lab., Washington, DC, USA
Abstract :
Some specific formal techniques that have proven useful in the SMMS design are examined. Attention is given to a simplified example derived from experience with the actual design. The formal techniques examined incorporate the use of a formal security model, formal specifications of module interfaces, and proofs of correspondence between the two. The use of a proof-driven design approach ensured that: (1) security design proceeded in an orderly fashion; (2) the system has high security assurance; (3) security flaws were exposed early in the design; (4) the system is more amenable to change; and (5) specific security responsibilities are traceable to individual components of the system
Keywords :
security of data; software engineering; SMMS design; amenable to change; correspondence; formal security model; formal specifications; formal techniques; high security assurance; individual components; module interfaces; proof-driven design; proofs; security design; security flaws; software engineering; specific security responsibilities; traceable; trustworthy software; Design engineering; Heart; Information security; Information technology; Laboratories; Process design; Production; Software design; Software engineering; Software systems;
Conference_Titel :
Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-1939-2
DOI :
10.1109/SECPRI.1989.36289