{"title":"使用DOD-STD-2167A开发可信系统","authors":"Terry V. Benzel","doi":"10.1109/CSAC.1989.81048","DOIUrl":null,"url":null,"abstract":"A software development process for developing trusted systems under DOD-STD-2167A is described. The process is based on an approach that integrates trusted computer system evaluation criteria (TCSEC) requirements into the software development process required by DOD-STD-2167A. The process described focuses on development of DOD-STD-2167A data item deliverables, which have been tailored to include TCSEC deliverables. The author describes how these items can be produced in a manner which minimizes the impact on cost and budget, while increasing assurance in the product's trustworthiness.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"220 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Developing trusted systems using DOD-STD-2167A\",\"authors\":\"Terry V. Benzel\",\"doi\":\"10.1109/CSAC.1989.81048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A software development process for developing trusted systems under DOD-STD-2167A is described. The process is based on an approach that integrates trusted computer system evaluation criteria (TCSEC) requirements into the software development process required by DOD-STD-2167A. The process described focuses on development of DOD-STD-2167A data item deliverables, which have been tailored to include TCSEC deliverables. The author describes how these items can be produced in a manner which minimizes the impact on cost and budget, while increasing assurance in the product's trustworthiness.<<ETX>>\",\"PeriodicalId\":284420,\"journal\":{\"name\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"volume\":\"220 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1989.81048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A software development process for developing trusted systems under DOD-STD-2167A is described. The process is based on an approach that integrates trusted computer system evaluation criteria (TCSEC) requirements into the software development process required by DOD-STD-2167A. The process described focuses on development of DOD-STD-2167A data item deliverables, which have been tailored to include TCSEC deliverables. The author describes how these items can be produced in a manner which minimizes the impact on cost and budget, while increasing assurance in the product's trustworthiness.<>