A method for designing secure solutions | IBM Journals & Magazine | IEEE Xplore

A method for designing secure solutions


Abstract:

The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of...Show More

Abstract:

The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of integrating the specified security functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of widely accepted security design methods. With the formalization of security evaluation criteria into an international standard known as Common Criteria, one of the barriers to a common approach for developing extensible IT security architectures has been lowered; however, more work remains. This paper describes a systematic approach for defining, modeling, and documenting security functions within a structured design process in order to facilitate greater trust in the operation of resulting IT solutions.
Published in: IBM Systems Journal ( Volume: 40, Issue: 3, 2001)
Page(s): 747 - 768
Date of Publication: 31 December 2001
Print ISSN: 0018-8670

Contact IEEE to Subscribe