{"title":"A structure approach to code correspondence analysis","authors":"J. Freeman, R. Neely","doi":"10.1109/CMPASS.1990.175407","DOIUrl":null,"url":null,"abstract":"Results from a code correspondence analysis task for the trusted computing base of an internet gateway system are reported. Analysis placement within the context of the overall assurance demonstration for the system is described, and the definition and employment of a method to increase the credibility of the code correspondence effort as compared with previous efforts are discussed. The method described is a refinement of the approach promulgated by a US Department of Defense standard. The integrated assurance demonstration approach is presented in a manner that is applicable to requirements that may be identified as critical, though not necessarily security related. The results obtained from applying specific techniques that make the integrated assurance demonstration real within a development project are summarized.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":" 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPASS.1990.175407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Results from a code correspondence analysis task for the trusted computing base of an internet gateway system are reported. Analysis placement within the context of the overall assurance demonstration for the system is described, and the definition and employment of a method to increase the credibility of the code correspondence effort as compared with previous efforts are discussed. The method described is a refinement of the approach promulgated by a US Department of Defense standard. The integrated assurance demonstration approach is presented in a manner that is applicable to requirements that may be identified as critical, though not necessarily security related. The results obtained from applying specific techniques that make the integrated assurance demonstration real within a development project are summarized.<>