Secure Systems Design Technology
Authors introduce a novel approach to the problem of secure system design, based on consistent and correct implementation of information flows and flow controls, fitted well with security policy, and on practical experience of security violation analysis. On this basis, concept of secure system design and development are proposed, forming a basis for secure information technologies development. Proposed technology and concepts can be applied from application tools and information systems design to operating system.
KeywordsAccess Control Information Processing System Security Policy Security Service Security Model
Unable to display preview. Download preview PDF.
- 1.Zegzhda, D.P., Ivashko, A.M.: On creation of secure information processing systems. “Information security problems. Computer systems”. 1 (1999) 99–105 (in Russian)Google Scholar
- 2.Zegzhda, D.P.: The analysis of Internet security accidents causes. “Vesnik Svyazi”. 4 (1999) 95–99 (in Russian)Google Scholar
- 3.Zegzhda D.P., Ivashko A.M.: Information systems security basics. “Goryachaya linia — Telekom”. Moscow (2000) 449 (in Russian)Google Scholar