A high-level, technical summary of the Trusted Software Methodology (TSM) is provided in this paper. The trust principles and trust classes that comprise the TSM are presented and several engineering investigations and case studies surrounding the TSM are outlined. Appendices are included that highlight important areas of the TSM.
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing… (More)
Combining the various methods of securing the cloud infrastructure, services, and content can help meet or exceed the protection benefits of a traditional enterprise perimeter.
Long-term dialysed patients can develop an arthropathy, called dialysis arthropathy, due to the deposition and transformation of the beta2 microglobulin into amyloid. The involvement of the spine, called destructive spondyloarthropathy (DSA), occurs between 10 and 25 percent; of these patients, and sometimes causes neurological damage. The disc space… (More)
This paper outlines a graduate course in computing security technology that has evolved during the past three years in the Computer Science Department at the Stevens Institute and the Software Engineering Department at Monmouth College. The paper includes descriptions of the primary themes emphasized in the course, the technical material covered in each… (More)