Title : 
A software engineering approach to designing trustworthy software
         
        
            Author : 
Cornwell, Mark R.
         
        
            Author_Institution : 
US Naval Res. Lab., Washington, DC, USA
         
        
        
        
        
        
            Abstract : 
Some specific formal techniques that have proven useful in the SMMS design are examined. Attention is given to a simplified example derived from experience with the actual design. The formal techniques examined incorporate the use of a formal security model, formal specifications of module interfaces, and proofs of correspondence between the two. The use of a proof-driven design approach ensured that: (1) security design proceeded in an orderly fashion; (2) the system has high security assurance; (3) security flaws were exposed early in the design; (4) the system is more amenable to change; and (5) specific security responsibilities are traceable to individual components of the system
         
        
            Keywords : 
security of data; software engineering; SMMS design; amenable to change; correspondence; formal security model; formal specifications; formal techniques; high security assurance; individual components; module interfaces; proof-driven design; proofs; security design; security flaws; software engineering; specific security responsibilities; traceable; trustworthy software; Design engineering; Heart; Information security; Information technology; Laboratories; Process design; Production; Software design; Software engineering; Software systems;
         
        
        
        
            Conference_Titel : 
Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on
         
        
            Conference_Location : 
Oakland, CA
         
        
            Print_ISBN : 
0-8186-1939-2
         
        
        
            DOI : 
10.1109/SECPRI.1989.36289