By Topic

Software security evaluation based on a top-down McCall-like approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Copigneaux, F. ; Verilog, Toulouse, France ; Martin, S.

The authors present a methodology for software security evaluation and certification. A systematic approach has been used to build software security throughout the whole life cycle. This leads to using specific development and certification techniques according to the initial risk and vulnerability analysis. In the security certification process, it is of prime importance to measure the specific security nonfunctional attributes of software. The authors therefore propose a top-down approach for their definitions. This approach is compatible with the factor, criteria, and metrics approach of J.A. McCall et al. (1977), thus enabling a common approach with software quality assurance practices

Published in:

Aerospace Computer Security Applications Conference, 1988., Fourth

Date of Conference:

12-16 Dec 1988