A transaction flow approach to software security certification for document handling systems
暂无分享,去创建一个
A security certification method is described for a document handling system for a major government organization. The security evaluation process includes identification of the exposures of the system, determination of the controls that cover those exposures, and evaluation of the appropriateness and effectiveness of the controls. Included are the details of the analysis performed and the types of results expected in that analysis, both of which constitute the basic evaluation of the document handling system. The certification analysis approach can be extended naturally to other types of computing systems.
[1] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[2] J Miguel. A composite cost/benefit/risk analysis methodology , 1984 .
[3] L. J. Fraim. Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.
[4] D. Parker. Computer Security Management , 1981 .
[5] Virgil D. Gligor,et al. A New Security Testing Method and Its Application to the Secure Xenix Kernel , 1987, IEEE Transactions on Software Engineering.