Using proven Reference Monitor patterns for security evaluation

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

The most effective approach to evaluating the security of complex systems is to deliberatelyconstruct the systems using security patterns specifically designed to make them evaluable. Just suchan integrated set of security patterns was created decades ago based on the Reference Monitorabstraction. An associated systematic security engineering and evaluation methodology was codifiedas an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC). This paperexplains how the TCSEC and its Trusted Network Interpretation (TNI) constitute a set of securitypatterns for large, complex and distributed systems and how those patterns have been repeatedlyand successfully used to create and evaluate some of the most secure government and commercialsystems ever developed.

Cite

CITATION STYLE

APA

Heckman, M. R., & Schell, R. R. (2016). Using proven Reference Monitor patterns for security evaluation. Information (Switzerland), 7(2). https://doi.org/10.3390/info7020023

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free