A high-level, technical summary of the Trusted Software Methodology (TSM) is provided in this paper. The trust principles and trust classes that comprise the TSM are presented and several engineering investigations and case studies surrounding the TSM are outlined. Appendices are included that highlight important areas of the TSM.
This paper outlines a graduate course in computing security technology that has evolved during the past three years in the Computer Science Department at the Stevens Institute and the Software Engineering Department at Monmouth College. The paper includes descriptions of the primary themes emphasized in the course, the technical material covered in each… (More)
Combining the various methods of securing the cloud infrastructure, services, and content can help meet or exceed the protection benefits of a traditional enterprise perimeter. he advantages of virtualizing servers, databases, and applications into the cloud are well known: hardware costs are reduced, content becomes more ubiquitous, and IT services can… (More)