首页> 外文期刊>Information >Using Proven Reference Monitor Patterns for Security Evaluation
【24h】

Using Proven Reference Monitor Patterns for Security Evaluation

机译:使用经过验证的参考监控器模式进行安全性评估

获取原文
获取外文期刊封面目录资料

摘要

The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC). This paper explains how the TCSEC and its Trusted Network Interpretation (TNI) constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.
机译:评估复杂系统安全性的最有效方法是使用专门设计的安全性模式故意构建系统,以使其可评估。几十年前,基于参考监视器抽象就创建了这样一套集成的安全模式。相关的系统安全工程和评估方法已被编入“可信计算机系统评估标准”(TCSEC)中,作为工程标准。本文解释了TCSEC及其可信网络解释(TNI)如何构成用于大型,复杂和分布式系统的一组安全模式,以及这些模式如何被反复成功地用于创建和评估一些最安全的政府和商业系统曾经发展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号