Show simple item record

dc.contributor.authorClark, Paul C.
dc.contributor.authorIrvine, Cynthia E.
dc.contributor.authorNguyen, Thuy D.
dc.dateDecember 12, 2014
dc.date.accessioned2015-04-22T22:31:38Z
dc.date.available2015-04-22T22:31:38Z
dc.date.issued2014-12-12
dc.identifier.urihttp://hdl.handle.net/10945/44986
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractThis document describes the Life Cycle Management Plan for the development of a high assurance secure product. A high assurance product is one for which its users have a high level of confidence that its security policies will be enforced continuously and correctly. Such products are constructed so that they can be analyzed for these characteristics. Lifecycle activities ensure that the product reflects the intent to ensure that the product is trustworthy and that vigorous efforts have been made to ensure the absence of unspecified functionality, whether accidental or intentional. The purpose of this document is, first, to describe the high-level procedures and policy for Configuration Management (CM), and, second to create a CM plan that aims to ensure the integrity of the configuration items, track changes to the configuration items, and ensure that only authorized changes are made to the configurations items.en_US
dc.description.sponsorshipPrepared for United States Navy, OPNAV N2/N6 and funded in part by United States Navy, OPNAV N2/N6. A portion of the material presented here is based upon work supported by the National Science Foundation under Grant No. CNS-0430566 and CNS-0430598.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleTrusted Computing Exemplar: Configuration Management Planen_US
dc.typeTechnical Reporten_US
dc.contributor.corporateCyber Academic Groupen_US
dc.contributor.departmentCyber Academic Group
dc.subject.authorMachinery control systemsen_US
dc.subject.authorMCSen_US
dc.subject.authorlife cycle securityen_US
dc.subject.authorhigh assuranceen_US
dc.subject.authorsystem securityen_US
dc.subject.authortrustworthy systemsen_US
dc.identifier.npsreportNPS-CAG-14-003


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record