Best Available Technologies (BATs) for Computer Security

reportActive / Technical Report | Accession Number: ADA109189 | Open PDF

Abstract:

Over more than a decade, government, industry, and academic centers have invested substantial resources in techniques for developing secure computer systems. The major projects to develop such systems are surveyed from the perspective of a system developer about to undertake the design and implementation of a secure software system. Experience with specific techniques and applications is summarized, and recommendations are given. Suggested approaches to each phase of the system life cycle are provided. The principal recommendations to developers are that they consider the security requirements of each system as part of its functional requirements, rather than as a separate set of requirements that they continue to think about security throughout the design and implementation of the system and that they use the best available software engineering technology. Author

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release

RECORD

Collection: TR
Identifying Numbers
Subject Terms