Abstract
The history of attempts to secure computer systems against threats to confidentiality, integrity, and availability of data is briefly surveyed, and the danger of repeating a portion of that history is noted. Areas needing research attention are highlighted, and a new approach to developing certified systems is described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hodges A. Alan Turing: the enigma. Simon and Schuster, New York, 1983.
Sandhu R. On four definitions of data integrity. In: Keefe, T (ed) Proc. IFIP WG11.3 seventh working conf. on database security, Sept., 1993 (to appear as Database Security VII: Status and Prospects, Elsevier, 1994).
Linde R. Operating system penetration. In: Proc. National Computer Conference, 1975. AFIPS Press, Montvale, N.J., 1975, pp 361–368.
Neumann P G. Computer security evaluation. In: Proc. National Computer Conference, 1978. AFIPS Press, Montvale, N.J., 1978, pp 1087–1095.
Bisbey R. Personal communication. 26 July 1990.
Landwehr C E, Bull A R, McDermott J P, Choi W S. A taxonomy of computer program security flaws with examples. NRL Report (forthcoming), Naval Research Laboratory, Washington DC, 1993.
Anderson J P. Computer security technology planning study (vols I and II). ESD-TR-73-51, Hanscom Field, Bedford MA; NTIS AD 758 206, 1972.
Gasser M. Building a secure computer system. Van Nostrand Reinhold, New York, 1988.
Lipner S B. Criteria, evaluation, and the international environment: where have we been, where are we going? In: Lindsay and Price (ed), Proc. IFIP-SEC 91, Brighton, England. Elsevier — North Holland, 1991.
Craigen D, Gerhart S, Ralston T. An international survey of industrial applications of formal methods. NRL Report 9554, Naval Research Laboratory, Washington DC, 1993.
Gray J W. On introducing noise into the bus-contention channel. In: Proc. 1993 IEEE CS Symp. on Research in Security and Privacy. IEEE Computer Society Press, 1993, pp 90–99.
Millen J K. A resource allocation model for denial of service. In: Proc. 1992 IEEE CS Symp. on Research in Security and Privacy. IEEE Computer Society Press, 1992, pp 137–147.
Landwehr C E, Heitmeyer C L, McLean J. A security model for military message systems. ACM Trans. on Computer Systems 1984; 2(3):198–222.
Froscher J N, Carroll J M. Security requirements of Navy embedded computers. NRL Memorandum Report 5425, Naval Research Laboratory, Washington DC, 1984.
Payne C N, Froscher J N, Landwehr C E. Toward a comprehensive INFOSEC certification methodology. In: Proc. 16th National Computer Security Conference. National Institutes of Standards and Technology / National Computer Security Center, Baltimore, MD, Sept. 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 Springer-Verlag London Limited
About this paper
Cite this paper
Landwehr, C.E. (1993). How Far Can You Trust A Computer?. In: Górski, J. (eds) SAFECOMP ’93. SAFECOMP 1993. Springer, London. https://doi.org/10.1007/978-1-4471-2061-2_31
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2061-2_31
Published:
Publisher Name: Springer, London
Print ISBN: 978-3-540-19838-3
Online ISBN: 978-1-4471-2061-2
eBook Packages: Springer Book Archive