David P. Gilliam

Learn More
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Traditionally, software security has been treated as an afterthought leading to a cycle of 'penetrate and patch.' Due to its criticality, security should be integrated as a(More)
This paper discusses new joint work by the California Institute of Technology's Jet Propulsion Laboratory and the University of California at Davis sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the sojiware development and maintenance life cycle. The assessment instrument is a collection of(More)
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach(More)
This paper discusses joint work by the California Institute of Technology's Jet Propulsion Laboratov and sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the software development arid niaititetiatice life cysle. The assessment instrument is a collection of tools and procedures to support(More)
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which specifies security properties in a library that(More)
1. Antagonists of the N-methyl-D-aspartate (NMDA) glutamate (Glu) receptor, including [(+)-5-methyl-10,11-dihydro-5H-dibenzo[a,d]cyclohepten-5,10-imine maleate], dizocilpine maleate (MK-801), injure pyramidal neurons in the posterior cingulate/retrosplenial (PC/RS) cortex when administered systemically to adult rats and mice. 2. These results have, to our(More)
The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software and systems. Each tool's resulting output provides feedback(More)
Genetic factors influence fetal alcohol spectrum disorders (FASDs) in both humans and animals. Experiments using inbred and selectively bred mouse stocks that controlled for (1) ethanol dose, (2) maternal and fetal blood ethanol levels, and (3) fetal developmental exposure stage, show genotype can affect teratogenic outcome. Other experiments distinguish(More)
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification(More)