High Assurance Computer Systems: A Research Agenda

نویسندگان

  • John McLean
  • Constance Heitmeyer
چکیده

As computers and their supporting communication networks have become increasingly enmeshed in our national technological fabric, we have become increasingly dependent on high assurance computer systems, i.e., computer systems for which compelling evidence is required that the system delivers its services in a manner that satis es certain critical properties. Obvious examples of high assurance systems include military systems (e.g., weapon systems, CI systems, etc), ight programs for both commercial and military aircraft, air tra c control systems, nancial and commerce systems, medical systems (including medical databases and medical equipment), etc. Less obvious examples are the various components of the information infrastructure that supports such systems and their communications (e.g., the NII). These systems are extremely complicated and the science and engineering principles that underlie them are yet to be completely worked out. Nevertheless, our national well-being depends upon these systems satisfying certain critical properties including:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda

The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...

متن کامل

Policy-Based Security for Wireless Components in High Assurance Computer Systems

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...

متن کامل

Conference Report: COMPASS ’96 THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE Gaithersburg, MD June 17–21, 1996

The Eleventh Annual Conference on Computer Assurance (COMPASS ’96) was hosted by the Computer Systems Laboratory of the National Institute of Standards and Technology on June 17-21, 1996. COMPASS is an organization whose mission is to advance the theory and practice of building assurance into critical computer systems. Each year, COMPASS brings together researchers, developers, and evaluators o...

متن کامل

Making Plug and Play Safe for Networked Medical Devices

Building “plug-and-play” systems in which multiple devices can be integrated on the fly, and new devices can be added, removed, and modified dynamically during system operation, offers significant potential benefits for the medical community. However, due to the critical health and safety issues associated with medical devices, it is essential to maintain high confidence in the correct function...

متن کامل

The Handbook for the Computer Security Certification of Trusted Systems

The Navy has designated the Naval Research Laboratory (NRL) as its Center for Computer Security Research and Evaluation. NRL is actively developing a Navy capability to certify trusted systems. This paper describes the NRL e ort to understand assurance, certi cation, and trusted system certi cation criteria through the production of the Handbook for the Computer Security Certi cation of Trusted...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995