Trusted Computing Exemplar: Personnel Security Plan
dc.contributor.author | Clark, Paul C. | |
dc.contributor.author | Irvine, Cynthia E. | |
dc.contributor.author | Nguyen, Thuy D. | |
dc.date | December 12, 2014 | |
dc.date.accessioned | 2015-04-22T22:40:44Z | |
dc.date.available | 2015-04-22T22:40:44Z | |
dc.date.issued | 2014-12-12 | |
dc.identifier.uri | https://hdl.handle.net/10945/44988 | |
dc.description.abstract | This document describes the Life Cycle Management Plan for the development of a high assurance secure product. A high assurance product is one for which its users have a high level of confidence that its security policies will be enforced continuously and correctly. Such products are constructed so that they can be analyzed for these characteristics. Lifecycle activities ensure that the product reflects the intent to ensure that the product is trustworthy and that vigorous efforts have been made to ensure the absence of unspecified functionality, whether accidental or intentional. The purpose of this plan is to provide the personnel policy necessary to protect the confidentiality and integrity of a product during the development and maintenance phases of its life cycle. Integrity is the primary concern of this plan, though confidentiality is not disregarded. | en_US |
dc.description.sponsorship | Prepared for United States Navy, OPNAV N2/N6 and funded in part by United States Navy, OPNAV N2/N6. A portion of the material presented here is based upon work supported by the National Science Foundation under Grant No. CNS-0430566 and CNS-0430598. | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Trusted Computing Exemplar: Personnel Security Plan | en_US |
dc.type | Technical Report | en_US |
dc.contributor.corporate | Cyber Academic Group | en_US |
dc.contributor.department | Cyber Academic Group | |
dc.subject.author | Machinery control systems | en_US |
dc.subject.author | MCS | en_US |
dc.subject.author | life cycle security | en_US |
dc.subject.author | high assurance | en_US |
dc.subject.author | system security | en_US |
dc.subject.author | trustworthy systems | en_US |
dc.identifier.npsreport | NPS-CAG-14-005 | |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
All Technical Reports Collection
Includes reports from all departments. -
Cyber Academic Group (NPS-CAG)
-
Faculty and Researchers' Publications