Outline for May 27, 2003
- Reference monitor
- Concept
- Reference validation mechanism
- Security kernel
- Trusted computing base
- Example of add-on vs. built-in: AT&T UNIX systems with MLS
- Policy specification
- What it is
- Using a standard
- Creating new policy
- Mapping into existing policy model
- Example: System X
- Justifying requirements
- Techniques to support design assurance
- Subsystem, subcomponent, module
- Design documents
- Security functions summary specification
- External functional specification
- Internal design description
- Justifying design meets requirements
- Formal methods
- Review
- Implementation assurance
- Programming language
- Modularity
- Security features (bounds checking, strong typing, etc.)
- Implementation management such as configuration management
- Security testing
- Functional testing (black box testing)
- Structural testing (white box testing)
This is available in Postscript
and PDF.