By Topic

A validated security policy modeling approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Freeman, J.W. ; CTA Inc., Colorado Springs, CO, USA ; Neely, R.B. ; Heckard, M.A.

The paper presents a security policy modeling approach that can be applied to many types of systems, including networks and distributed systems. The approach is driven by security requirements and by system architecture. It is compatible with the modeling principles offered by recent modeling guidelines and the TCSEC modeling requirements at the B1-A1 assurance levels. The approach has been validated through its application to various development, certification and research projects, including tactical systems, secure gateways, and C3I systems. The approach presented here has been favorably reviewed by security evaluation teams for government agencies. The paper illustrates the approach by applying it to an example tactical system

Published in:

Computer Security Applications Conference, 1994. Proceedings., 10th Annual

Date of Conference:

5-9 Dec 1994