DocumentCode :
2562017
Title :
Trusted Software Verification: A Case Study
Author :
Vickers Benzel, Terry C. ; Tavilla, Deborah A.
Author_Institution :
MITRE Corp.
fYear :
1985
fDate :
22-24 April 1985
Firstpage :
14
Lastpage :
14
Abstract :
This paper presents a case study of the verification of the trusted software component of the SCOMP system Trusted Computing Base (TCB). The SCOMP system was developed by Honeywell and is the first system to achieve an A1 rating from the DoDCSC. A number of papers have been published that discuss the verification approach for the SCOMP system security kernel [15, 14, 12, 10]. The SCOMP system security kernel was verified using the Hierarchical Development Methodology in a manner similar to those used for previous kernel verifications [13]. Most of the research and applications to date have been directed towards verifying the security properties of kernel software. Much less is known about verifying the security properties of trusted software. This paper will present a case study of these trusted software verification in the SCOMP system. The case study will focus on defining what trusted software is in a kernelized systems, why trusted software is trusted, what are the security requirements to be proved, and how should these requirements be proven. Then a method developed at MITRE for the review of trusted software werification evidence using the Gypsy methodolgy will be presented. Finaly, area requiring futher research will be discussed.
Keywords :
Access control; Databases; Kernel; Maintenance engineering; Process control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0629-0
Type :
conf
DOI :
10.1109/SP.1985.10003
Filename :
6234832
Link To Document :
بازگشت