A high-level, technical summary of the Trusted Software Methodology (TSM) is provided in this paper. The trust principles and trust classes that comprise the TSM are presented and several engineering investigations and case studies surrounding the TSM are outlined. Appendices are included that highlight important areas of the TSM.
Cracker attack plans often include attempts to gain access to target local computing and networking resources via war dialed entry around firewall-protected gateways. This paper describes two methods for organizations to reduce this risk in environments where removal of unknown modems is not feasible. In particular, we outline a workstation-based war dial… (More)
This paper outlines a graduate course in computing security technology that has evolved during the past three years in the Computer Science Department at the Stevens Institute and the Software Engineering Department at Monmouth College. The paper includes descriptions of the primary themes emphasized in the course, the technical material covered in each… (More)