By Topic

A methodology for defining application-specific security requirements for C3 systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Creps, R.E. ; Unisys Defense Syst., McLean, VA, USA

It is noted that novel approaches are needed to ensure that the potential security risks inherent in the technologically advanced C3 (command, control, and communications) systems of the future are overcome. Crucial to these approaches is the ability to define system security requirements and security policies early in the development process and to refine them as needed throughout the process. A security requirements definition methodology (SRDM) has been developed for addressing these needs by helping nonsecurity technologists analyze and specify the security requirements of their C3 applications in application-specific terms. SRDM features a security requirements specification language (SRSL); a library of reusable SRSL specification building blocks derived from a comprehensive taxonomy of C3 security requirements; and a requirements definition process to promote optimal use of the language and library

Published in:

Military Communications Conference, 1989. MILCOM '89. Conference Record. Bridging the Gap. Interoperability, Survivability, Security., 1989 IEEE

Date of Conference:

15-18 Oct 1989