High Assurance Computer Systems: A Research Agenda
نویسندگان
چکیده
As computers and their supporting communication networks have become increasingly enmeshed in our national technological fabric, we have become increasingly dependent on high assurance computer systems, i.e., computer systems for which compelling evidence is required that the system delivers its services in a manner that satis es certain critical properties. Obvious examples of high assurance systems include military systems (e.g., weapon systems, CI systems, etc), ight programs for both commercial and military aircraft, air tra c control systems, nancial and commerce systems, medical systems (including medical databases and medical equipment), etc. Less obvious examples are the various components of the information infrastructure that supports such systems and their communications (e.g., the NII). These systems are extremely complicated and the science and engineering principles that underlie them are yet to be completely worked out. Nevertheless, our national well-being depends upon these systems satisfying certain critical properties including:
منابع مشابه
Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda
The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users. From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...
متن کاملPolicy-Based Security for Wireless Components in High Assurance Computer Systems
To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...
متن کاملConference Report: COMPASS ’96 THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE Gaithersburg, MD June 17–21, 1996
The Eleventh Annual Conference on Computer Assurance (COMPASS ’96) was hosted by the Computer Systems Laboratory of the National Institute of Standards and Technology on June 17-21, 1996. COMPASS is an organization whose mission is to advance the theory and practice of building assurance into critical computer systems. Each year, COMPASS brings together researchers, developers, and evaluators o...
متن کاملMaking Plug and Play Safe for Networked Medical Devices
Building “plug-and-play” systems in which multiple devices can be integrated on the fly, and new devices can be added, removed, and modified dynamically during system operation, offers significant potential benefits for the medical community. However, due to the critical health and safety issues associated with medical devices, it is essential to maintain high confidence in the correct function...
متن کاملThe Handbook for the Computer Security Certification of Trusted Systems
The Navy has designated the Naval Research Laboratory (NRL) as its Center for Computer Security Research and Evaluation. NRL is actively developing a Navy capability to certify trusted systems. This paper describes the NRL e ort to understand assurance, certi cation, and trusted system certi cation criteria through the production of the Handbook for the Computer Security Certi cation of Trusted...
متن کامل