2016
DOI: 10.3390/info7020023
|View full text |Cite
|
Sign up to set email alerts
|

Using Proven Reference Monitor Patterns for Security Evaluation

Abstract: Abstract:The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC). This paper explains how the TCS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The research on information security is extensive, yet while most concepts regarding information security have been reviewed and discussed in the existing literature, some critical areas remain unaddressed [21]. For example, few studies examined information security awareness training [17].…”
Section: Information Security Awarenessmentioning
confidence: 99%
“…The research on information security is extensive, yet while most concepts regarding information security have been reviewed and discussed in the existing literature, some critical areas remain unaddressed [21]. For example, few studies examined information security awareness training [17].…”
Section: Information Security Awarenessmentioning
confidence: 99%
“…• In [202], three indices (completeness, isolation, and verifiability) are used as the engineering principles of security kernel. • [203] is related to security patterns of a grid system.…”
Section: Security Characteristicmentioning
confidence: 99%
“…The paper by Heckman and Schell [6] leverages patterns to design systems that can be proven to be secure. As a basic pattern they use a Reference Monitor, the implementation of which is a multilevel model security kernel.…”
mentioning
confidence: 99%