Abstract:
The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of...Show MoreMetadata
Abstract:
The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of integrating the specified security functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of widely accepted security design methods. With the formalization of security evaluation criteria into an international standard known as Common Criteria, one of the barriers to a common approach for developing extensible IT security architectures has been lowered; however, more work remains. This paper describes a systematic approach for defining, modeling, and documenting security functions within a structured design process in order to facilitate greater trust in the operation of resulting IT solutions.
Published in: IBM Systems Journal ( Volume: 40, Issue: 3, 2001)
DOI: 10.1147/sj.403.0747