DocumentCode :
3383885
Title :
Software methodology for development of a trusted BMS: identification of critical problems
Author :
Crocker, Stephen D. ; Siarkiewicz, Emilie J.
Author_Institution :
Trusted Inf. Syst. Inc., Glenwood, MD, USA
fYear :
1989
fDate :
4-8 Dec 1989
Firstpage :
148
Lastpage :
165
Abstract :
The vast range of security levels/compartments, complex ownership, continuous evolution, adaptive policy requirements, and the large size of battle management systems (BMSs) make it evident that the trust issues are substantial and will require extensive attention throughout the development cycle of the system. The authors outline the software development process for a BMS and identify where trusted system development requirements fit into the process. The focus is on the identification and discussion of eight leverage points that cut across the entire development process and provide the greatest opportunity to affect the security of the software that is developed. These points are visibility, protocols, downloading, configuration control, monitoring and measurement, environment, communication, and verification
Keywords :
military computing; safety systems; security of data; software engineering; adaptive policy requirements; battle management systems; communication; configuration control; continuous evolution; critical problems identification; development; downloading; environment; measurement; monitoring; protocols; software methodology; trusted BMS; verification; visibility; Accreditation; Computer architecture; Contracts; Management information systems; National security; Programming; Real time systems; Sensor systems; Subcontracting; Weapons;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
Type :
conf
DOI :
10.1109/CSAC.1989.81047
Filename :
81047
Link To Document :
بازگشت