A process-oriented methodology for assessing and improving software trustworthiness

  • Authors:
  • Edward Amoroso;Carol Taylor;John Watson;Jonathan Weiss

  • Affiliations:
  • AT&T Bell Laboratories;National Security Agency;Martin Marietta;AT&T Network Systems

  • Venue:
  • CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

A high-level, technical summary of the Trusted Software Methodology (TSM) is provided in this paper. The trust principles and trust classes that comprise the TSM are presented and several engineering investigations and case studies surrounding the TSM are outlined. Appendices are included that highlight important areas of the TSM.