By Topic

Developing secure systems in a modular way

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Q. Shi ; Dept. of Comput. Sci., York Univ., UK ; J. A. McDermid ; J. D. Moffett

The authors present a new technique for development and verification of secure systems in a modular way. At the heart of the technique is a general approach for coping with the composition of modules. In abstract system design, this composition approach is applied to determine security of the overall system and then to produce appropriate security requirements for its modules in terms of functional specifications. These modular security requirements enable different modules to have different security properties. In concrete system design, only correspondences between the modular security requirements and source code of the modules need to be demonstrated to ensure that the final system is secure. To handle changes of functional specifications during system development, dependencies among modular security requirements are analyzed. These can be used to locate the modules affected by changes, and to avoid unnecessary security reevaluation of other modules

Published in:

Computer Assurance, 1993. COMPASS '93, Practical Paths to Assurance. Proceedings of the Eighth Annual Conference on

Date of Conference:

14-17 Jun 1993