Title :
Software methodology for development of a trusted BMS: identification of critical problems
Author :
Crocker, Stephen D. ; Siarkiewicz, Emilie J.
Author_Institution :
Trusted Inf. Syst. Inc., Glenwood, MD, USA
Abstract :
The vast range of security levels/compartments, complex ownership, continuous evolution, adaptive policy requirements, and the large size of battle management systems (BMSs) make it evident that the trust issues are substantial and will require extensive attention throughout the development cycle of the system. The authors outline the software development process for a BMS and identify where trusted system development requirements fit into the process. The focus is on the identification and discussion of eight leverage points that cut across the entire development process and provide the greatest opportunity to affect the security of the software that is developed. These points are visibility, protocols, downloading, configuration control, monitoring and measurement, environment, communication, and verification
Keywords :
military computing; safety systems; security of data; software engineering; adaptive policy requirements; battle management systems; communication; configuration control; continuous evolution; critical problems identification; development; downloading; environment; measurement; monitoring; protocols; software methodology; trusted BMS; verification; visibility; Accreditation; Computer architecture; Contracts; Management information systems; National security; Programming; Real time systems; Sensor systems; Subcontracting; Weapons;
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
DOI :
10.1109/CSAC.1989.81047