Using Proven Reference Monitor Patterns for Security Evaluation

@article{Heckman2016UsingPR,
  title={Using Proven Reference Monitor Patterns for Security Evaluation},
  author={Mark R. Heckman and Roger R. Schell},
  journal={Information},
  year={2016},
  volume={7},
  pages={23}
}
The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC). This paper explains how… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 3 times over the past 90 days. VIEW TWEETS
3 Citations
31 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 31 references

Building a Secure Computer System

  • M. Gasser
  • 1988
Highly Influential
7 Excerpts

Trusted Network Interpretation

  • NCSC-TG 005
  • National Computer Security Center: Fort Meade, FL…
  • 2016
Highly Influential
8 Excerpts

HSRP—A1’ing a large-scale management information system

  • D. Gambel, S. Walter, M. Fordham
  • In Proceedings of the 7th Computers in Aerospace…
  • 1989
Highly Influential
3 Excerpts

Designing the GEMSOS security kernel for security and performance

  • R. Schell, T. F. Tao, M. Heckman
  • In Proceedings of the 8th National Computer…
  • 1985
Highly Influential
3 Excerpts

Afdsc

  • Site History
  • Available online: http://www.multicians.org/site…
  • 2016
1 Excerpt

An Integrated Collection of Essays; IEEE Computer Society Press: Los Alamitos, CA, USA, 1995; pp

  • D. L. Brinkley, R. R. Concepts Schell, Terminology for Computer Security. In Information Security
  • 40–97. Available online: http://www.acsa-admin…
  • 2016
1 Excerpt

Dockmaster

  • Site History
  • Available online: http://www.multicians.org/site…
  • 2016
1 Excerpt

Security Patterns Template and Tutorial

  • D. M. Kienzle, D. T. Elder, J. Edwards-Hewitt
  • Available online: http://citeseerx.ist.psu.edu…
  • 2016
1 Excerpt

Similar Papers

Loading similar papers…