Design principles and guidelines for security

Download
Author
Levin, Timothy E.
Irvine, Cynthia E.
Benzel, Terry V.
Clark, Paul C.
Nguyen, Thuy D.
Bhaskara, Ganesha
Date
2007-11-21Metadata
Show full item recordAbstract
This report provides a distillation, synthesis and organization of key principles for the construction of secure computing systems, and supports the analysis with examples where needed for clarity. Our conclusions reflect a broad range of previous related work including the landmark study by Saltzer and Schroeder and several subsequent reports. We found that some of the early design principles required re-examination due to, for example, advances in performance and extensibility as well as the effects of various new technologies. We focus on a concise summary articulation of the principles as they apply to the development of the most elemental components of a basic security system. The results are organized into several major categories: structure, logic and function, system lifecycle, and lessons learned.
NPS Report Number
NPS-CS-07-014Related items
Showing items related by title, author, creator and subject.
-
The principles of war: are they still applicable?
Ettrich, Brian B. (Monterey California. Naval Postgraduate School, 2005-06);The purpose of this thesis is to examine the principles of war as derived from the teachings of Baron Antoine Henri de Jomini and analyze them in terms of their continued applicability. This thesis looks at the complex ... -
The principles of war are they still applicable?
Ettrich, Brian B. (Monterey, California. Naval Postgraduate School, 2005-06);The purpose of this thesis is to examine the principles of war as derived from the teachings of Baron Antoine Henri de Jomini and analyze them in terms of their continued applicability. This thesis looks at the complex ... -
Public budgeting: The compromises among the sound budgeting principles in contingency funding
Payne, Tara L. (Monterey, California: Naval Postgraduate School, 2017-06);The purpose of this thesis is to observe the budgeting practices of the government in funding contingency operations to determine to what extent a policy-maker's actions result in compromises among the sound public budgeting ...